Data Privacy for the Smart Grid
Privacy for the Smart Grid provides easy-to-understand guidance on data privacy issues and the implications for creating privacy risk management programs, along with privacy policies and practices required to ensure Smart Grid privacy. It addresses privacy in electric, natural gas, and water grids f...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book Chapter |
Published: |
Taylor & Francis
2015
|
Subjects: | |
Online Access: | Get Fullteks DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02191naaaa2200529uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_26360 | ||
005 | 20210210 | ||
020 | |a b18005 | ||
024 | 7 | |a 10.1201/b18005 |c doi | |
041 | 0 | |a English | |
042 | |a dc | ||
072 | 7 | |a KJM |2 bicssc | |
072 | 7 | |a UB |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
100 | 1 | |a Herold, Rebecca |4 auth | |
700 | 1 | |a Hertzog, Christine |4 auth | |
245 | 1 | 0 | |a Data Privacy for the Smart Grid |
260 | |b Taylor & Francis |c 2015 | ||
300 | |a 1 electronic resource (250 p.) | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Privacy for the Smart Grid provides easy-to-understand guidance on data privacy issues and the implications for creating privacy risk management programs, along with privacy policies and practices required to ensure Smart Grid privacy. It addresses privacy in electric, natural gas, and water grids from two different perspectives of the topic, one from a Smart Grid expert and another from a privacy and information security expert. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine applications. | ||
540 | |a Creative Commons |f by-nc-nd/4.0 |2 cc |4 http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a English | ||
650 | 7 | |a Management & management techniques |2 bicssc | |
650 | 7 | |a Information technology: general issues |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
653 | |a IT Security | ||
653 | |a Management of IT | ||
653 | |a Security Services | ||
653 | |a BUSINESS/MANAGEMENT | ||
653 | |a InfoSECURITY | ||
653 | |a SCI-TECH | ||
653 | |a ITECH | ||
653 | |a INFORMATIONSCIENCE | ||
653 | |a STM | ||
653 | |a appliances | ||
653 | |a custodian | ||
653 | |a demand | ||
653 | |a energy | ||
653 | |a meter | ||
653 | |a response | ||
653 | |a risks | ||
653 | |a technologies | ||
653 | |a transactive | ||
653 | |a usage | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/20.500.12657/41688/1/9781466573383.pdf |7 0 |z Get Fullteks |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/26360 |7 0 |z DOAB: description of the publication |