SlideShare uma empresa Scribd logo
1 de 67
Baixar para ler offline
Web Technologies and Privacy Policies
for the Smart Grid
Sebastian Speiser† , Andreas Wagner† , Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013
I NSTITUTE

OF

A PPLIED I NFORMATICS

AND

KIT – University of the State of Baden-Wuerttemberg and
National Laboratory of the Helmholtz Association

F ORMAL D ESCRIPTION M ETHODS†

AND

¨
Z ENTRUM F UR A NGEWANDTE R ECHTSWISSENSCHAFT‡

www.kit.edu
Agenda
1

Introduction

2

ICT Architecture and Data Model

3

Use-Case I

4

Policies for a Privacy-aware Smart Grid

5

Use-Case II

6

Evaluation

7

Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

2/41
Introduction

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

3/41
(Some) Key ICT Requirements

Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

4/41
(Some) Key ICT Requirements

Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

4/41
(Some) Key ICT Requirements

Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

4/41
(Some) Key ICT Requirements

Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

4/41
(Some) Key ICT Requirements

Requirements, see [2, 3]
R1 Lightweight data access.
R2 Open and flexible data model.
R3 Distinction between syntactic and
semantic data content.
R4 Users decide what data in which
granularity to expose to whom.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

4/41
Contributions

R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

5/41
Contributions

R1-R3: Semantic Web communication architecture (Section 2).
R4: Policy model (Section 4).

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

5/41
Communication Architecture

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

6/41
Overview: A Semantic Web-based
Communication Architecture I

Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

7/41
Overview: A Semantic Web-based
Communication Architecture I

Data access layers
URIs for identification of participants.
TCP/IP stack with HTTP as transfer protocol.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

7/41
Overview of a Semantic Web-based
Communication Architecture II

Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

8/41
Overview of a Semantic Web-based
Communication Architecture II

Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

8/41
Overview of a Semantic Web-based
Communication Architecture II

Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

8/41
Overview of a Semantic Web-based
Communication Architecture II

Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

8/41
Overview of a Semantic Web-based
Communication Architecture II

Data representation layers
RDF(S) (if necessary extended with OWL features) for
machine-interpretable data encoding.
Linked Data principles for data access:
Use (HTTP) URIs for identification of entities.
When someone looks up a URI, provide useful (RDF) data.
Include links to other URIs.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

8/41
Use-Case I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

9/41
Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management I

Service
Requests

Smart
Traffic
Navigator

Service
Platform

Smart
Meter
Analyzer

...

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

10/41
Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management II
car:uamp760e1

car:uamp760e2

RDF
Data

car:uamp760e3

RDF
Data

car:uamp760e rdf:type sg:Vehicle ;
foaf:name "UltraAmp 760e" .
geo:location _:loc20130331 .
_:loc20100331 dc:date "2013-03-31T12:23:45";
geo:lat "49.0047222" ;
geo:lon "8.3858333" .

RDF
Data

Get additional
data

Data logging

Linked Data
Endpoint
Service
Requests

Smart
Traffic
Navigator

RDF
Data

Service
Platform

Smart
Meter
Analyzer

...

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

11/41
Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management III
Smart home at KIT

car:uamp760e2
car:uamp760e3

car:uamp760e1
RDF
Data

RDF
Data

RDF
Data

Get additional
data

Smart
Traffic
Navigator

RDF
Data

sm:apt

Get additional
RDF
data sm:meter
Data
Service
Platform

Smart
Meter
Analyzer

Get additional
data

RDF
Data

Data logging

Linked Data
Endpoint
Service
Requests

Future work

RDF
RDF

RDF
data logging

...

TCP/IP/HTTP
RDF
RDF
Data

WWW

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

12/41
Use-Case I (iZEUS) – Smart Grid/Traffic
Service Platform – Data Management IV
Smart home at KIT

car:uamp760e2
car:uamp760e3

car:uamp760e1
RDF
Data

RDF
Data

RDF
Data

Get additional
data

Smart
Traffic
Navigator

RDF
Data

sm:apt

Get additional
RDF
data sm:meter
Data

RDF
RDF

Service
Platform

TCP/IP/HTTP

Data logging

Smart
Meter
Analyzer

Get additional
data

RDF
Data

Data logging

Linked Data
Endpoint
Service
Requests

Future work

...

Gridpedia as
data model

RDF
RDF
Data

WWW

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

13/41
Privacy Policies

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

14/41
Policy Model

Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

15/41
Policy Model

Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

15/41
Policy Model

Intuition
Policies model user intent, thus, they help to preserve data privacy.
A Policy is bound to its associated data.
Policies are taken into account whenever data is accessed.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

15/41
Policy Model II

Policy
validFrom
Date

validTo

allows

Usage
purpose

recipient
perspective

Purpose

Perspective

Agent
Description

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

16/41
Policy-aware Data Access

Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

17/41
Policy-aware Data Access

Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

17/41
Policy-aware Data Access

Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

17/41
Policy-aware Data Access

Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

17/41
Policy-aware Data Access

Access procedure
i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e).
ii) Web server returns an authorisation required response.
iii) Requestor sends a request, i.e., a specification of identity and
purpose.
iv) Device matches the request with an applicable policy (either a
law-based or a user policy) → if request and policy match, requested
data and (signed) policy is sent.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

17/41
Use-Case II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

18/41
Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

19/41
Use-Case II (iZEUS) – Smart Grid/Traffic
Service Platform – Data Privacy II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

20/41
Evaluation

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

21/41
Scope of Evaluation

Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

22/41
Scope of Evaluation

Our previous works aimed at evaluation of privacy policies via
German privacy laws [1, 4].
This works evaluates the practical feasibility of privacy policies stored
(matched) on lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

22/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
Evaluation Setting

We implemented a policy matcher based on Rasqal1 .
Two hardware platforms:
2.4 GHz Core2Duo laptop with 4 GB RAM.
SheevaPlug device with an 1.2 GHz ARM processor and 512 MB
RAM.

We created of varying sizes policies, i.e., we varied # allowed usages
between 1 and 75.
For each size, 10 policies with random allowed usages were matched
against every request.2

1
2

http://librdf.org/rasqal/
Test data and source code at http://code.google.com/p/polen/.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

23/41
matching time in seconds

Evaluation Results
0.7

Allowed Core2Duo
Denied Core2Duo
Allowed ARM
Denied ARM

0.6
0.5
0.4
0.3
0.2
0.1
0
0

10

20

30

40
50
policy size

60

70

80

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

24/41
Conclusion

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

25/41
Conclusion

By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

26/41
Conclusion

By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

26/41
Conclusion

By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

26/41
Conclusion

By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

26/41
Conclusion

By means of real-world use-cases we showed that ...
... Semantic Web technologies are applicable and highly useful ...
... Linked Data allows for efficient data access ...
... policies give effective means for technical privacy enforcement ...

... in a Smart Grid setting.
We evaluated our policy approach in terms of technical feasibility
w.r.t. lower-power devices.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

26/41
Slides will be available at http://slideshare.net/
Paper will be available at http://aifb.kit.edu/

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

27/41
Acknowledgements: iZEUS Project

This work was supported by the German Federal Ministry of Economics and
Technology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsible
for the content of the presentation.
Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

28/41
References

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

29/41
References I

Oliver Raabe.
Datenschutz im SmartGrid.
Datenschutz und Datensicherheit, 2010.
S. Rohjans, C. Danekas, and M. Uslar.
Requirements for Smart Grid ICT-architectures.
In ISGT, 2012.
Andreas Wagner, Sebastian Speiser, and Andreas Harth.
Semantic Web Technologies for a Smart Energy Grid: Requirements
and Challenges.
In ISWC, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

30/41
References II

Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas
Harth.
Linked Data for a Privacy-aware Smart Grid.
In GI Jahrestagung, 2010.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

31/41
Backup Slides

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

32/41
Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia I

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

33/41
Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia II

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

34/41
Use-Case I (iZEUS) – Collaborative
Smart Grid Ontology – Gripedia III

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

35/41
Linked Data for the Smart Grid –
Example

Customer
Legend
Communication
Flow

Charging
Station
(off-premise)

Electric Vehicle
ex:uamp760e

Domain

ex:Mary

Metering Provider B
(third party provider)

Clearing

Markets

Cool Wash Inc.

Energy Efficiency
Service Provider

Premise
ex:apt

Actor

Network

Washing Machine
ex:coolWash

Smart Meter
ex:sm

Metering Provider
A

Billing

Service Provider

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

36/41
Linked Data for the Smart Grid –
Example II

Mary’s Linked Data
/ / lookup on ex : coolWash ; data r e s i d e s a t washing machine
ex : coolWash
r d f : t y p e sg : A p p l i a n c e ;
sg : m a n u f a c t u r e r < h t t p : / / coolWash . com / company >;
sg : owner ex : mary ;
sg : washingData washer : program40 ;
sg : consumption sm : data20100310 .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

37/41
Linked RDF Data for the Smart Grid III

Mary’s Linked Data II
/ / lookup on sm : data20100310 ; data r e s i d e s a t smart meter
sm : data20100310
r d f : t y p e sg : Consumption ;
r d f : v a l u e ” 1 . 0 4 ” ˆ ˆ sg : kWh ;
i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ;
i c a l : dtend
”2010−03−10T01 : 0 0 : 0 0 ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

38/41
Policy-aware Data Access II

Matching procedure
The matching procedure is implemented as a rule, checking whether . . .
i) requestor is subsumed by the recipient description and
ii) the requested purpose is subsumed by the allowed purpose (both
w.r.t. the applicable policy)
Assumption: the same purpose and recipient definition is employed →
subclass-of or same-as check is sufficient for realising the subsume
operation.

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

39/41
Policy Model III

An example policy for Mary’s UltraAmp 760e I
washer : eCarPol r d f : t y p e sg : P o l i c y ;
i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ;
i c a l : dtend
”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ;
sg : a l l o w s #ultraAmpUse .
#ultraAmpUse r d f : t y p e sg : Usage ;
sg : purpose gov : Purpose# s e r v i c e ;
sg : r e c i p i e n t < h t t p : / / ultraAmp . com / company >;
sg : p e r s p e c t i v e # u l t r a A m p P e r s p e c t i v e .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

40/41
Policy Model IV

An example policy for Mary’s Mary’s UltraAmp 760e II
# u l t r a A m p P e r s p e c t i v e r d f : t y p e sg : P e r s p e c t i v e ;
sg : d e f i n i t i o n ” PREFIX . . . CONSTRUCT { ?s ?p ?o }
WHERE { ?s r d f : t y p e sg : A p p l i a n c e .
?s sg : m a n u f a c t u r e r < h t t p : / / ultraAmp . com / company >.
?s ?p ?o .
FILTER ( ? p ! = sg : consumption ) } ” .

Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides
Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid

Energieinformatik 2013

41/41

Mais conteúdo relacionado

Mais procurados

Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Amélie Gyrard
 
Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1iotest
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Amélie Gyrard
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of ThingsPayamBarnaghi
 
Tennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionTennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionMaynooth University
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhDPhdtopiccom
 
Semantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of ThingsSemantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of ThingsPayamBarnaghi
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
2B-Schutz Presentation Wireless and IoT
2B-Schutz Presentation Wireless and IoT2B-Schutz Presentation Wireless and IoT
2B-Schutz Presentation Wireless and IoTRobert Schutz
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsAmélie Gyrard
 
Towards a Resource Slice Interoperability Hub for IoT
Towards a Resource Slice Interoperability Hub for IoTTowards a Resource Slice Interoperability Hub for IoT
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesPayamBarnaghi
 
Probabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasProbabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasNetwork Simulation Tools
 
CPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform ArchitectureCPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform ArchitectureStephan Haller
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
 

Mais procurados (20)

Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2Presentation aina2016 seg3.0_methodology_v2
Presentation aina2016 seg3.0_methodology_v2
 
Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1Semantic IoT Semantic Inter-Operability Practices - Part 1
Semantic IoT Semantic Inter-Operability Practices - Part 1
 
Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2Fi cloudpresentationgyrardaugust2015 v2
Fi cloudpresentationgyrardaugust2015 v2
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 
Tennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionTennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtion
 
Research Topics in Network Security for PhD
Research Topics in Network Security for PhDResearch Topics in Network Security for PhD
Research Topics in Network Security for PhD
 
Semantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of ThingsSemantic Technolgies for the Internet of Things
Semantic Technolgies for the Internet of Things
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
2B-Schutz Presentation Wireless and IoT
2B-Schutz Presentation Wireless and IoT2B-Schutz Presentation Wireless and IoT
2B-Schutz Presentation Wireless and IoT
 
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
Hassle-free IoT projects with DeviceHive — Artyom Sorokin (Tech Stage)
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Towards a Resource Slice Interoperability Hub for IoT
Towards a Resource Slice Interoperability Hub for IoTTowards a Resource Slice Interoperability Hub for IoT
Towards a Resource Slice Interoperability Hub for IoT
 
Engage Project on Open Data
Engage Project on Open DataEngage Project on Open Data
Engage Project on Open Data
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
 
Probabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasProbabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project Ideas
 
CPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform ArchitectureCPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform Architecture
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN
 

Destaque

Linked Data Tutorial
Linked Data TutorialLinked Data Tutorial
Linked Data Tutorialtomasknap
 
Ontologies in architecture, engineering and construction (AEC)
Ontologies in architecture, engineering and construction (AEC)Ontologies in architecture, engineering and construction (AEC)
Ontologies in architecture, engineering and construction (AEC)Pieter Pauwels
 
Interlinking Online Communities and Enriching Social Software with the Semant...
Interlinking Online Communities and Enriching Social Software with the Semant...Interlinking Online Communities and Enriching Social Software with the Semant...
Interlinking Online Communities and Enriching Social Software with the Semant...John Breslin
 
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)Benjamin Nowack
 
Querying Linked Data on Android
Querying Linked Data on AndroidQuerying Linked Data on Android
Querying Linked Data on AndroidEUCLID project
 
Building Linked Data Applications
Building Linked Data ApplicationsBuilding Linked Data Applications
Building Linked Data ApplicationsEUCLID project
 

Destaque (6)

Linked Data Tutorial
Linked Data TutorialLinked Data Tutorial
Linked Data Tutorial
 
Ontologies in architecture, engineering and construction (AEC)
Ontologies in architecture, engineering and construction (AEC)Ontologies in architecture, engineering and construction (AEC)
Ontologies in architecture, engineering and construction (AEC)
 
Interlinking Online Communities and Enriching Social Software with the Semant...
Interlinking Online Communities and Enriching Social Software with the Semant...Interlinking Online Communities and Enriching Social Software with the Semant...
Interlinking Online Communities and Enriching Social Software with the Semant...
 
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)
RDF and SPARQL for PHP Developers (at New York Semantic Web Meetup)
 
Querying Linked Data on Android
Querying Linked Data on AndroidQuerying Linked Data on Android
Querying Linked Data on Android
 
Building Linked Data Applications
Building Linked Data ApplicationsBuilding Linked Data Applications
Building Linked Data Applications
 

Semelhante a Web Techologies and Privacy policies for the Smart Grid

SEMANCO - Integrating multiple data sources, domains and tools in urban ener...
SEMANCO - Integrating multiple data sources, domains and tools in  urban ener...SEMANCO - Integrating multiple data sources, domains and tools in  urban ener...
SEMANCO - Integrating multiple data sources, domains and tools in urban ener...Álvaro Sicilia
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentCSCJournals
 
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...IJDKP
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
Call for Research Articles - 4th International Conference on Cloud, Big Data ...
Call for Research Articles - 4th International Conference on Cloud, Big Data ...Call for Research Articles - 4th International Conference on Cloud, Big Data ...
Call for Research Articles - 4th International Conference on Cloud, Big Data ...ijistjournal
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
 
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...Submit Your Research Articles - 4th International Conference on Cloud, Big Da...
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...IJNSA Journal
 
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Tracy Drey
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
 
11th International Conference on Parallel, Distributed Computing Technologies...
11th International Conference on Parallel, Distributed Computing Technologies...11th International Conference on Parallel, Distributed Computing Technologies...
11th International Conference on Parallel, Distributed Computing Technologies...IJCSEA Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...IIRindia
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET Journal
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 

Semelhante a Web Techologies and Privacy policies for the Smart Grid (20)

Ck34520526
Ck34520526Ck34520526
Ck34520526
 
SEMANCO - Integrating multiple data sources, domains and tools in urban ener...
SEMANCO - Integrating multiple data sources, domains and tools in  urban ener...SEMANCO - Integrating multiple data sources, domains and tools in  urban ener...
SEMANCO - Integrating multiple data sources, domains and tools in urban ener...
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
 
Mobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approachMobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approach
 
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
PAPER SUBMISSION START NOW-4th International Conference on Cloud, Big Data an...
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final
 
Call for Research Articles - 4th International Conference on Cloud, Big Data ...
Call for Research Articles - 4th International Conference on Cloud, Big Data ...Call for Research Articles - 4th International Conference on Cloud, Big Data ...
Call for Research Articles - 4th International Conference on Cloud, Big Data ...
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...Submit Your Research Articles - 4th International Conference on Cloud, Big Da...
Submit Your Research Articles - 4th International Conference on Cloud, Big Da...
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...
Analytical Review On The Stakeholders Perceptions About IPv6 Readiness And Th...
 
Lecture 2_IoT.pptx
Lecture 2_IoT.pptxLecture 2_IoT.pptx
Lecture 2_IoT.pptx
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
 
11th International Conference on Parallel, Distributed Computing Technologies...
11th International Conference on Parallel, Distributed Computing Technologies...11th International Conference on Parallel, Distributed Computing Technologies...
11th International Conference on Parallel, Distributed Computing Technologies...
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
IRJET- Security and QoS Aware Dynamic Clustering (SQADC) Routing Protocol for...
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 

Último

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 

Último (20)

How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 

Web Techologies and Privacy policies for the Smart Grid

  • 1. Web Technologies and Privacy Policies for the Smart Grid Sebastian Speiser† , Andreas Wagner† , Oliver Raabe‡ and Andreas Harth† | Energieinformatik 2013 I NSTITUTE OF A PPLIED I NFORMATICS AND KIT – University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association F ORMAL D ESCRIPTION M ETHODS† AND ¨ Z ENTRUM F UR A NGEWANDTE R ECHTSWISSENSCHAFT‡ www.kit.edu
  • 2. Agenda 1 Introduction 2 ICT Architecture and Data Model 3 Use-Case I 4 Policies for a Privacy-aware Smart Grid 5 Use-Case II 6 Evaluation 7 Conclusion Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 2/41
  • 3. Introduction Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 3/41
  • 4. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  • 5. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  • 6. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  • 7. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  • 8. (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 4/41
  • 9. Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
  • 10. Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 5/41
  • 11. Communication Architecture Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 6/41
  • 12. Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
  • 13. Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 7/41
  • 14. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  • 15. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  • 16. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  • 17. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  • 18. Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 8/41
  • 19. Use-Case I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 9/41
  • 20. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management I Service Requests Smart Traffic Navigator Service Platform Smart Meter Analyzer ... Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 10/41
  • 21. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management II car:uamp760e1 car:uamp760e2 RDF Data car:uamp760e3 RDF Data car:uamp760e rdf:type sg:Vehicle ; foaf:name "UltraAmp 760e" . geo:location _:loc20130331 . _:loc20100331 dc:date "2013-03-31T12:23:45"; geo:lat "49.0047222" ; geo:lon "8.3858333" . RDF Data Get additional data Data logging Linked Data Endpoint Service Requests Smart Traffic Navigator RDF Data Service Platform Smart Meter Analyzer ... Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 11/41
  • 22. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management III Smart home at KIT car:uamp760e2 car:uamp760e3 car:uamp760e1 RDF Data RDF Data RDF Data Get additional data Smart Traffic Navigator RDF Data sm:apt Get additional RDF data sm:meter Data Service Platform Smart Meter Analyzer Get additional data RDF Data Data logging Linked Data Endpoint Service Requests Future work RDF RDF RDF data logging ... TCP/IP/HTTP RDF RDF Data WWW Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 12/41
  • 23. Use-Case I (iZEUS) – Smart Grid/Traffic Service Platform – Data Management IV Smart home at KIT car:uamp760e2 car:uamp760e3 car:uamp760e1 RDF Data RDF Data RDF Data Get additional data Smart Traffic Navigator RDF Data sm:apt Get additional RDF data sm:meter Data RDF RDF Service Platform TCP/IP/HTTP Data logging Smart Meter Analyzer Get additional data RDF Data Data logging Linked Data Endpoint Service Requests Future work ... Gridpedia as data model RDF RDF Data WWW Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 13/41
  • 24. Privacy Policies Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 14/41
  • 25. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  • 26. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  • 27. Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 15/41
  • 28. Policy Model II Policy validFrom Date validTo allows Usage purpose recipient perspective Purpose Perspective Agent Description Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 16/41
  • 29. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  • 30. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  • 31. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  • 32. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  • 33. Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) → if request and policy match, requested data and (signed) policy is sent. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 17/41
  • 34. Use-Case II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 18/41
  • 35. Use-Case II (iZEUS) – Smart Grid/Traffic Service Platform – Data Privacy I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 19/41
  • 36. Use-Case II (iZEUS) – Smart Grid/Traffic Service Platform – Data Privacy II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 20/41
  • 37. Evaluation Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 21/41
  • 38. Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
  • 39. Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 22/41
  • 40. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 41. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 42. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 43. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 44. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 45. Evaluation Setting We implemented a policy matcher based on Rasqal1 . Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request.2 1 2 http://librdf.org/rasqal/ Test data and source code at http://code.google.com/p/polen/. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 23/41
  • 46. matching time in seconds Evaluation Results 0.7 Allowed Core2Duo Denied Core2Duo Allowed ARM Denied ARM 0.6 0.5 0.4 0.3 0.2 0.1 0 0 10 20 30 40 50 policy size 60 70 80 Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 24/41
  • 47. Conclusion Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 25/41
  • 48. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  • 49. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  • 50. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  • 51. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  • 52. Conclusion By means of real-world use-cases we showed that ... ... Semantic Web technologies are applicable and highly useful ... ... Linked Data allows for efficient data access ... ... policies give effective means for technical privacy enforcement ... ... in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 26/41
  • 53. Slides will be available at http://slideshare.net/ Paper will be available at http://aifb.kit.edu/ Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 27/41
  • 54. Acknowledgements: iZEUS Project This work was supported by the German Federal Ministry of Economics and Technology (E-Energy iZEUS, Grant 01 ME12013). The authors are responsible for the content of the presentation. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 28/41
  • 55. References Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 29/41
  • 56. References I Oliver Raabe. Datenschutz im SmartGrid. Datenschutz und Datensicherheit, 2010. S. Rohjans, C. Danekas, and M. Uslar. Requirements for Smart Grid ICT-architectures. In ISGT, 2012. Andreas Wagner, Sebastian Speiser, and Andreas Harth. Semantic Web Technologies for a Smart Energy Grid: Requirements and Challenges. In ISWC, 2010. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 30/41
  • 57. References II Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas Harth. Linked Data for a Privacy-aware Smart Grid. In GI Jahrestagung, 2010. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 31/41
  • 58. Backup Slides Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 32/41
  • 59. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia I Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 33/41
  • 60. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia II Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 34/41
  • 61. Use-Case I (iZEUS) – Collaborative Smart Grid Ontology – Gripedia III Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 35/41
  • 62. Linked Data for the Smart Grid – Example Customer Legend Communication Flow Charging Station (off-premise) Electric Vehicle ex:uamp760e Domain ex:Mary Metering Provider B (third party provider) Clearing Markets Cool Wash Inc. Energy Efficiency Service Provider Premise ex:apt Actor Network Washing Machine ex:coolWash Smart Meter ex:sm Metering Provider A Billing Service Provider Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 36/41
  • 63. Linked Data for the Smart Grid – Example II Mary’s Linked Data / / lookup on ex : coolWash ; data r e s i d e s a t washing machine ex : coolWash r d f : t y p e sg : A p p l i a n c e ; sg : m a n u f a c t u r e r < h t t p : / / coolWash . com / company >; sg : owner ex : mary ; sg : washingData washer : program40 ; sg : consumption sm : data20100310 . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 37/41
  • 64. Linked RDF Data for the Smart Grid III Mary’s Linked Data II / / lookup on sm : data20100310 ; data r e s i d e s a t smart meter sm : data20100310 r d f : t y p e sg : Consumption ; r d f : v a l u e ” 1 . 0 4 ” ˆ ˆ sg : kWh ; i c a l : d t s t a r t ”2010−03−10T00 : 0 0 : 0 0 ” ; i c a l : dtend ”2010−03−10T01 : 0 0 : 0 0 ” . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 38/41
  • 65. Policy-aware Data Access II Matching procedure The matching procedure is implemented as a rule, checking whether . . . i) requestor is subsumed by the recipient description and ii) the requested purpose is subsumed by the allowed purpose (both w.r.t. the applicable policy) Assumption: the same purpose and recipient definition is employed → subclass-of or same-as check is sufficient for realising the subsume operation. Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 39/41
  • 66. Policy Model III An example policy for Mary’s UltraAmp 760e I washer : eCarPol r d f : t y p e sg : P o l i c y ; i c a l : d t s t a r t ”2010−01−01T00 : 0 0 : 0 0 ” ˆ ˆ xs : dateTime ; i c a l : dtend ”2010−12−31T23 : 5 9 : 5 9 ” ˆ ˆ xs : dateTime ; sg : a l l o w s #ultraAmpUse . #ultraAmpUse r d f : t y p e sg : Usage ; sg : purpose gov : Purpose# s e r v i c e ; sg : r e c i p i e n t < h t t p : / / ultraAmp . com / company >; sg : p e r s p e c t i v e # u l t r a A m p P e r s p e c t i v e . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 40/41
  • 67. Policy Model IV An example policy for Mary’s Mary’s UltraAmp 760e II # u l t r a A m p P e r s p e c t i v e r d f : t y p e sg : P e r s p e c t i v e ; sg : d e f i n i t i o n ” PREFIX . . . CONSTRUCT { ?s ?p ?o } WHERE { ?s r d f : t y p e sg : A p p l i a n c e . ?s sg : m a n u f a c t u r e r < h t t p : / / ultraAmp . com / company >. ?s ?p ?o . FILTER ( ? p ! = sg : consumption ) } ” . Introduction Communication Architecture Use-Case I Privacy Policies Use-Case II Evaluation Conclusion References Backup Slides Speiser et al. – Web Technologies and Privacy Policies for the Smart Grid Energieinformatik 2013 41/41