82 lines
5.3 KiB
BibTeX
82 lines
5.3 KiB
BibTeX
@ARTICLE{bas:sec0,
|
|
author={Granzer, W. and Praus, F. and Kastner, W.},
|
|
journal={Industrial Electronics, IEEE Transactions on},
|
|
title={Security in Building Automation Systems},
|
|
year={2010},
|
|
volume={57},
|
|
number={11},
|
|
pages={3622-3630},
|
|
keywords={building management systems;computer network security;home automation;message authentication;air conditioning control;building automation system;heating control;security critical service;security threat analysis;ventilation control;Air conditioning;Automatic control;Automation;Communication system control;Communication system security;Control systems;Heating;Lighting control;Temperature control;Ventilation;Building automation;embedded networks;integration;security},
|
|
doi={10.1109/TIE.2009.2036033},
|
|
ISSN={0278-0046},
|
|
month={Nov},}
|
|
|
|
@INPROCEEDINGS{bas:sec1,
|
|
author={Novak, T. and Treytl, A. and Palensky, P.},
|
|
booktitle={Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on},
|
|
title={Common approach to functional safety and system security in building automation and control systems},
|
|
year={2007},
|
|
pages={1141-1148},
|
|
keywords={building management systems;building automation;control systems;functional safety;modern automated buildings;product life;system security;Automatic control;Automation;Buildings;Communication system security;Computer network reliability;Computer security;Control systems;Data security;Health and safety;Protocols},
|
|
doi={10.1109/EFTA.2007.4416910},
|
|
month={Sept},}
|
|
|
|
@INPROCEEDINGS{bas:sec2,
|
|
author={Granzer, W. and Kastner, W. and Neugschwandtner, G. and Praus, F.},
|
|
booktitle={Factory Communication Systems, 2006 IEEE International Workshop on},
|
|
title={Security in networked building automation systems},
|
|
year={2006},
|
|
pages={283-292},
|
|
keywords={Automatic control;Automation;Communication system control;Communication system security;Control systems;Data security;Daylighting;Intelligent networks;Protocols;Spine},
|
|
doi={10.1109/WFCS.2006.1704168},
|
|
month={},}
|
|
|
|
@INPROCEEDINGS{bas:sec3,
|
|
author={Jacobsson, Andreas and Davidsson, Paul},
|
|
booktitle={Internet of Things (WF-IoT), 2015 IEEE 2nd World Forum on},
|
|
title={Towards a model of privacy and security for smart homes},
|
|
year={2015},
|
|
pages={727-732},
|
|
keywords={Automation;Logic gates;Privacy;Risk analysis;Security;Smart homes;Software;IoT;privacy;security;smart home},
|
|
doi={10.1109/WF-IoT.2015.7389144},
|
|
month={Dec},}
|
|
|
|
@INPROCEEDINGS{bas:sec4,
|
|
author={Brauchli, A. and Depeng Li},
|
|
booktitle={Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on},
|
|
title={A solution based analysis of attack vectors on smart home systems},
|
|
year={2015},
|
|
pages={1-6},
|
|
keywords={data privacy;home automation;security of data;attack vector solution based analysis;central Europe;digital STROM installation;home-automation solution;privacy constraints;secure smart home systems;Decision support systems;Home appliances;Privacy;Security;Servers;Smart homes;Smart phones},
|
|
doi={10.1109/SSIC.2015.7245682},
|
|
month={Aug},}
|
|
|
|
@article{bas:sec5,
|
|
title={A risk assessment framework and software toolkit for cloud service ecosystems},
|
|
author={Djemame, Karim and Armstrong, Django and Kiran, Mariam and Jiang, Ming},
|
|
journal={Cloud Computing},
|
|
pages={119--126},
|
|
year={2011},
|
|
publisher={Citeseer}
|
|
}
|
|
|
|
@INPROCEEDINGS{iot:healthcare0,
|
|
author={M. Thangaraj and P. P. Ponmalar and S. Anuradha},
|
|
booktitle={2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)},
|
|
title={Internet Of Things (IOT) enabled smart autonomous hospital management system - A real world health care use case with the technology drivers},
|
|
year={2015},
|
|
pages={1-8},
|
|
keywords={Internet of Things;biomedical equipment;database management systems;health care;hospitals;medical administrative data processing;middleware;protocols;IOT enabled smart autonomous hospital management system;Internet Of Things;application services;associated system data;critical incident data validation;data mapping;database;heterogeneous networking environment;medical devices data modeling;middleware;network architecture;process flow;real world health care use case;remote device coordination;standard communication protocol;technology drivers;workflow;Data models;Databases;Hospitals;Medical diagnostic imaging;Monitoring;Standards;Data Model;Healthcare;Hospital Management;IOT},
|
|
doi={10.1109/ICCIC.2015.7435678},
|
|
month={Dec},}
|
|
|
|
@INPROCEEDINGS{iot:healthcare1,
|
|
author={R. K. Kodali and G. Swamy and B. Lakshmi},
|
|
booktitle={2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS)},
|
|
title={An implementation of IoT for healthcare},
|
|
year={2015},
|
|
pages={411-416},
|
|
keywords={Internet of Things;Zigbee;cloud computing;energy consumption;health care;medical information systems;power aware computing;protocols;Internet;Internet of Things;IoT based in-hospital healthcare system;IoT empowered devices;IoT implementation;ZigBee mesh protocol;care quality;cloud computing;healthcare system implementation;in-hospital patients;information acquisition paradigm;microcontrollers;power consumption;protocol stacks;real time medical information analysis;real time medical information communication;sensors;transceivers;ubiquitous medical information access;Biomedical monitoring;Internet of things;Medical services;Monitoring;Sensors;Wireless sensor networks;Healthcare;IoT;ZigBee;eHealth},
|
|
doi={10.1109/RAICS.2015.7488451},
|
|
month={Dec},}
|