You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

81 lines
5.3 KiB

@ARTICLE{bas:sec0,
author={Granzer, W. and Praus, F. and Kastner, W.},
journal={Industrial Electronics, IEEE Transactions on},
title={Security in Building Automation Systems},
year={2010},
volume={57},
number={11},
pages={3622-3630},
keywords={building management systems;computer network security;home automation;message authentication;air conditioning control;building automation system;heating control;security critical service;security threat analysis;ventilation control;Air conditioning;Automatic control;Automation;Communication system control;Communication system security;Control systems;Heating;Lighting control;Temperature control;Ventilation;Building automation;embedded networks;integration;security},
doi={10.1109/TIE.2009.2036033},
ISSN={0278-0046},
month={Nov},}
@INPROCEEDINGS{bas:sec1,
author={Novak, T. and Treytl, A. and Palensky, P.},
booktitle={Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on},
title={Common approach to functional safety and system security in building automation and control systems},
year={2007},
pages={1141-1148},
keywords={building management systems;building automation;control systems;functional safety;modern automated buildings;product life;system security;Automatic control;Automation;Buildings;Communication system security;Computer network reliability;Computer security;Control systems;Data security;Health and safety;Protocols},
doi={10.1109/EFTA.2007.4416910},
month={Sept},}
@INPROCEEDINGS{bas:sec2,
author={Granzer, W. and Kastner, W. and Neugschwandtner, G. and Praus, F.},
booktitle={Factory Communication Systems, 2006 IEEE International Workshop on},
title={Security in networked building automation systems},
year={2006},
pages={283-292},
keywords={Automatic control;Automation;Communication system control;Communication system security;Control systems;Data security;Daylighting;Intelligent networks;Protocols;Spine},
doi={10.1109/WFCS.2006.1704168},
month={},}
@INPROCEEDINGS{bas:sec3,
author={Jacobsson, Andreas and Davidsson, Paul},
booktitle={Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on},
title={Towards a model of privacy and security for smart homes},
year={2015},
pages={727-732},
keywords={Automation;Logic gates;Privacy;Risk analysis;Security;Smart homes;Software;IoT;privacy;security;smart home},
doi={10.1109/WF-IoT.2015.7389144},
month={Dec},}
@INPROCEEDINGS{bas:sec4,
author={Brauchli, A. and Depeng Li},
booktitle={Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on},
title={A solution based analysis of attack vectors on smart home systems},
year={2015},
pages={1-6},
keywords={data privacy;home automation;security of data;attack vector solution based analysis;central Europe;digital STROM installation;home-automation solution;privacy constraints;secure smart home systems;Decision support systems;Home appliances;Privacy;Security;Servers;Smart homes;Smart phones},
doi={10.1109/SSIC.2015.7245682},
month={Aug},}
@article{bas:sec5,
title={A risk assessment framework and software toolkit for cloud service ecosystems},
author={Djemame, Karim and Armstrong, Django and Kiran, Mariam and Jiang, Ming},
journal={Cloud Computing},
pages={119--126},
year={2011},
publisher={Citeseer}
}
@INPROCEEDINGS{iot:healthcare0,
author={M. Thangaraj and P. P. Ponmalar and S. Anuradha},
booktitle={2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)},
title={Internet Of Things (IOT) enabled smart autonomous hospital management system - A real world health care use case with the technology drivers},
year={2015},
pages={1-8},
keywords={Internet of Things;biomedical equipment;database management systems;health care;hospitals;medical administrative data processing;middleware;protocols;IOT enabled smart autonomous hospital management system;Internet Of Things;application services;associated system data;critical incident data validation;data mapping;database;heterogeneous networking environment;medical devices data modeling;middleware;network architecture;process flow;real world health care use case;remote device coordination;standard communication protocol;technology drivers;workflow;Data models;Databases;Hospitals;Medical diagnostic imaging;Monitoring;Standards;Data Model;Healthcare;Hospital Management;IOT},
doi={10.1109/ICCIC.2015.7435678},
month={Dec},}
@INPROCEEDINGS{iot:healthcare1,
author={R. K. Kodali and G. Swamy and B. Lakshmi},
booktitle={2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS)},
title={An implementation of IoT for healthcare},
year={2015},
pages={411-416},
keywords={Internet of Things;Zigbee;cloud computing;energy consumption;health care;medical information systems;power aware computing;protocols;Internet;Internet of Things;IoT based in-hospital healthcare system;IoT empowered devices;IoT implementation;ZigBee mesh protocol;care quality;cloud computing;healthcare system implementation;in-hospital patients;information acquisition paradigm;microcontrollers;power consumption;protocol stacks;real time medical information analysis;real time medical information communication;sensors;transceivers;ubiquitous medical information access;Biomedical monitoring;Internet of things;Medical services;Monitoring;Sensors;Wireless sensor networks;Healthcare;IoT;ZigBee;eHealth},
doi={10.1109/RAICS.2015.7488451},
month={Dec},}