Cyber Security Working Group / Energy Market - Power Trading / EMCS ESI Interface Remote Management / Customer Energy Resources / Developing Open Source Software / Secure AttributeBased Systems / Amazon / Demand / Lawrence Berkeley National Laboratory / C. Remote Management / IEEE Journal / Intel / /
Country
KOREA / Taiwan / United States / / /
Event
Company Expansion / Environmental Issue / /
Facility
Facility Smart Grid Information Model / Building Automation / Electric Power Research Institute / Smart Green Building / Korea Institute of Energy Research / MDMS Customer Facility / National Institute of Standards and Technology / Facility Service Interface / /
IndustryTerm
energy service data / energy management service / encrypted energy data / authorization protocol / exchange energy data / energy load / response service server / meter data processing / energy usage patterns / large / decryption algorithm / heterogeneous systems / energy data / deployed energy loads / remote energy management service / energy usage data / neighborhood area network / grid services / model complex energy data / user / software component / web service interface / energy usage / energy / smart grid infrastructure / external energy services / network optimization algorithms / aggregated energy usage / energy service interface / energy gateway / customer systems / remote site / energy consumption / utility meter / controlled energy loads / Internet Technology / energy efficiency benchmark / electricity cost / electrical and mechanical systems / cloud technology / interoperable energy services / internal systems / energy management system / energy management / energy curtailment / aggregated energy usage data / communication protocols / grid stabilization services / generation technologies / private networks / database management / energy services / inter-domain communications / local energy needs / stores encrypted energy data / external energy service / remote energy management services / energy needs / energy service scenarios / Web Architecture / physical devices / external systems / physical device / smart equipment / customer equipment / energy assets / power supplier / Web service / remote management / energy consumption decreases / energy information / clean energy / energy resource / service using internal energy data / Web service w/ REST style / greenhouse gas emission / energy resources / electricity / individual energy loads / energy usage collection / energy service / electricity generation / energy cost / energy object / aggregated energy usage information / energy loads / internal energy loads / energy usage information / legacy systems / customer-engaged energy services / energy usage activities / internal energy services / converged smart grid networks / energy consumer / external services / secured computing resource / encryption algorithm / transmission infrastructure / data mining technology / historical energy usage data / internal energy resources / interconnected communications / power infrastructure / web services / /
Movie
D. V / /
Organization
UCLA / Los Angeles / Henry Samueli School of Engineering and Applied Science / EIS Alliance / Korea Institute of Energy Research / National Institute of Standards and Technology / U.S. Energy Information Administration / Central Intelligence Agency / KIER Joint Research Project / ESI / Federal Aviation Administration / Semantic Model Working Party / Electric Power Research Institute / European Organization for the Safety of Air Navigation / Actors for Customer Interoperation To / Smart Grid Architecture Committee / North American Energy Standards Board / /
Person
Mario Gerla / ESI D ESIGN / Eun-Kyu Lee / Rajit Gadh / / /
Position
Forward control request / data producer / Forward / /
Product
Resource Centric Security (RCSec) / /
ProgrammingLanguage
XML / /
ProvinceOrState
California / /
Technology
600 1380 229 800 1389 230 1000 1399 240 DATA ENCRYPTION / XML / network optimization algorithms / encryption algorithm / API / laptop computer / Quality of Service / Access Control List / Attribute-based encryption / encryption / authorization protocol / cryptography / 2 Duo processor / decryption algorithm / generation technologies / Data encryption / private key / Cloud technology / DBMS / Fuel Cell / Ethernet / public key / data mining technology / Cloud technologies / HTTP / two technologies / communication protocols / /