{"id":"https://openalex.org/W2898769832","doi":"https://doi.org/10.1109/etfa.2018.8502507","title":"Security and Privacy Implementations within the AnyPLACE Energy Management Solution","display_name":"Security and Privacy Implementations within the AnyPLACE Energy Management Solution","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2898769832","doi":"https://doi.org/10.1109/etfa.2018.8502507","mag":"2898769832"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2018.8502507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035147549","display_name":"Christian Kudera","orcid":"https://orcid.org/0000-0003-1772-039X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Christian Kudera","raw_affiliation_strings":["Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039820068","display_name":"Viktor Ullmann","orcid":"https://orcid.org/0000-0002-6827-1814"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Viktor Ullmann","raw_affiliation_strings":["Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080231755","display_name":"Markus Kammerstetter","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Markus Kammerstetter","raw_affiliation_strings":["Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089919338","display_name":"Wolfgang K\u00e4stner","orcid":"https://orcid.org/0000-0001-5420-404X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wolfgang Kastner","raw_affiliation_strings":["Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"Research Division of Automation Systems, Institute of Computer Engineering, Vienna, Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035147549"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1839,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51300843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"100","issue":null,"first_page":"861","last_page":"868"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.76761794090271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7455219626426697},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5953478217124939},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5527566075325012},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4892115592956543},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4850005805492401},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4531148672103882},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.434592068195343},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4334307909011841},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.35023167729377747},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10422810912132263},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10084417462348938}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76761794090271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7455219626426697},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5953478217124939},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5527566075325012},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4892115592956543},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4850005805492401},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4531148672103882},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.434592068195343},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4334307909011841},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.35023167729377747},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10422810912132263},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10084417462348938},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2018.8502507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321987","display_name":"European Union Agency for Network and Information Security","ror":"https://ror.org/00wqx6897"},{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W195831538","https://openalex.org/W1508796064","https://openalex.org/W1529728259","https://openalex.org/W1591098212","https://openalex.org/W1981108443","https://openalex.org/W1981737703","https://openalex.org/W1982457390","https://openalex.org/W1983712198","https://openalex.org/W1988197807","https://openalex.org/W2029079598","https://openalex.org/W2046102897","https://openalex.org/W2047764386","https://openalex.org/W2114579498","https://openalex.org/W2121185760","https://openalex.org/W2149209089","https://openalex.org/W2157078218","https://openalex.org/W2550671963","https://openalex.org/W2552951814","https://openalex.org/W2621530037","https://openalex.org/W2621932216","https://openalex.org/W2737196555","https://openalex.org/W2751060688","https://openalex.org/W2773945839","https://openalex.org/W2951152347","https://openalex.org/W4206987129","https://openalex.org/W4230716992","https://openalex.org/W4399339983","https://openalex.org/W6678098748","https://openalex.org/W6729469866","https://openalex.org/W6949647210"],"related_works":["https://openalex.org/W2033357182","https://openalex.org/W2065250680","https://openalex.org/W2336014427","https://openalex.org/W2092708554","https://openalex.org/W2353177111","https://openalex.org/W2608550600","https://openalex.org/W139145738","https://openalex.org/W2495229164","https://openalex.org/W2027552121","https://openalex.org/W2800653357"],"abstract_inverted_index":{"With":[0],"the":[1,13,47,52,56,88,96,107,113],"increasing":[2],"number":[3],"of":[4,76,98,112],"energy":[5,8,69],"aware":[6],"devices,":[7],"management":[9,70],"solutions":[10],"can":[11],"provide":[12],"necessary":[14],"means":[15],"to":[16,43,62],"visualize,":[17],"overlook":[18],"and":[19,35,39,49,66,80,83,105,109],"automate":[20],"devices":[21],"as":[22,24],"well":[23],"communication":[25],"with":[26],"external":[27],"services.":[28],"To":[29],"protect":[30],"users":[31],"from":[32,51],"malicious":[33],"attacks":[34],"data":[36],"abuse,":[37],"security":[38,65,82,108],"privacy":[40,67,84,110],"aspects":[41],"need":[42],"be":[44],"included":[45],"into":[46],"design":[48],"implementation":[50,103],"very":[53],"beginning.":[54],"Within":[55],"AnyPLACE":[57,114],"solution,":[58],"we":[59,101],"set":[60],"out":[61],"create":[63],"a":[64,74],"centric":[68],"solution.":[71],"We":[72],"present":[73,106],"survey":[75],"best":[77],"practice":[78],"guidelines":[79],"EU-wide":[81],"regulatory":[85],"frameworks":[86],"including":[87],"General":[89],"Data":[90],"Protection":[91],"Regulation":[92],"(GDPR).":[93],"Based":[94],"on":[95],"results":[97],"our":[99],"survey,":[100],"defined":[102],"requirements":[104],"architecture":[111],"implementation.":[115]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
