@ARTICLE{bas:sec0, author={Granzer, W. and Praus, F. and Kastner, W.}, journal={Industrial Electronics, IEEE Transactions on}, title={Security in Building Automation Systems}, year={2010}, volume={57}, number={11}, pages={3622-3630}, keywords={building management systems;computer network security;home automation;message authentication;air conditioning control;building automation system;heating control;security critical service;security threat analysis;ventilation control;Air conditioning;Automatic control;Automation;Communication system control;Communication system security;Control systems;Heating;Lighting control;Temperature control;Ventilation;Building automation;embedded networks;integration;security}, doi={10.1109/TIE.2009.2036033}, ISSN={0278-0046}, month={Nov},} @INPROCEEDINGS{bas:sec1, author={Novak, T. and Treytl, A. and Palensky, P.}, booktitle={Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on}, title={Common approach to functional safety and system security in building automation and control systems}, year={2007}, pages={1141-1148}, keywords={building management systems;building automation;control systems;functional safety;modern automated buildings;product life;system security;Automatic control;Automation;Buildings;Communication system security;Computer network reliability;Computer security;Control systems;Data security;Health and safety;Protocols}, doi={10.1109/EFTA.2007.4416910}, month={Sept},} @INPROCEEDINGS{bas:sec2, author={Granzer, W. and Kastner, W. and Neugschwandtner, G. and Praus, F.}, booktitle={Factory Communication Systems, 2006 IEEE International Workshop on}, title={Security in networked building automation systems}, year={2006}, pages={283-292}, keywords={Automatic control;Automation;Communication system control;Communication system security;Control systems;Data security;Daylighting;Intelligent networks;Protocols;Spine}, doi={10.1109/WFCS.2006.1704168}, month={},} @INPROCEEDINGS{bas:sec3, author={Jacobsson, Andreas and Davidsson, Paul}, booktitle={Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on}, title={Towards a model of privacy and security for smart homes}, year={2015}, pages={727-732}, keywords={Automation;Logic gates;Privacy;Risk analysis;Security;Smart homes;Software;IoT;privacy;security;smart home}, doi={10.1109/WF-IoT.2015.7389144}, month={Dec},} @INPROCEEDINGS{bas:sec4, author={Brauchli, A. and Depeng Li}, booktitle={Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on}, title={A solution based analysis of attack vectors on smart home systems}, year={2015}, pages={1-6}, keywords={data privacy;home automation;security of data;attack vector solution based analysis;central Europe;digital STROM installation;home-automation solution;privacy constraints;secure smart home systems;Decision support systems;Home appliances;Privacy;Security;Servers;Smart homes;Smart phones}, doi={10.1109/SSIC.2015.7245682}, month={Aug},} @article{bas:sec5, title={A risk assessment framework and software toolkit for cloud service ecosystems}, author={Djemame, Karim and Armstrong, Django and Kiran, Mariam and Jiang, Ming}, journal={Cloud Computing}, pages={119--126}, year={2011}, publisher={Citeseer} } @INPROCEEDINGS{iot:healthcare0, author={M. Thangaraj and P. P. Ponmalar and S. Anuradha}, booktitle={2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)}, title={Internet Of Things (IOT) enabled smart autonomous hospital management system - A real world health care use case with the technology drivers}, year={2015}, pages={1-8}, keywords={Internet of Things;biomedical equipment;database management systems;health care;hospitals;medical administrative data processing;middleware;protocols;IOT enabled smart autonomous hospital management system;Internet Of Things;application services;associated system data;critical incident data validation;data mapping;database;heterogeneous networking environment;medical devices data modeling;middleware;network architecture;process flow;real world health care use case;remote device coordination;standard communication protocol;technology drivers;workflow;Data models;Databases;Hospitals;Medical diagnostic imaging;Monitoring;Standards;Data Model;Healthcare;Hospital Management;IOT}, doi={10.1109/ICCIC.2015.7435678}, month={Dec},} @INPROCEEDINGS{iot:healthcare1, author={R. K. Kodali and G. Swamy and B. Lakshmi}, booktitle={2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS)}, title={An implementation of IoT for healthcare}, year={2015}, pages={411-416}, keywords={Internet of Things;Zigbee;cloud computing;energy consumption;health care;medical information systems;power aware computing;protocols;Internet;Internet of Things;IoT based in-hospital healthcare system;IoT empowered devices;IoT implementation;ZigBee mesh protocol;care quality;cloud computing;healthcare system implementation;in-hospital patients;information acquisition paradigm;microcontrollers;power consumption;protocol stacks;real time medical information analysis;real time medical information communication;sensors;transceivers;ubiquitous medical information access;Biomedical monitoring;Internet of things;Medical services;Monitoring;Sensors;Wireless sensor networks;Healthcare;IoT;ZigBee;eHealth}, doi={10.1109/RAICS.2015.7488451}, month={Dec},}