Definitions – Energy Efficiency Directive
Article 2 of the Energy Efficiency Directive (Directive 2012/27/EU of the European Parliament and of the Council of 25 October 2012 on energy efficiency) provides definitions. We list those definition in the following: ‘aggregator’ means a demand service provider that combines multiple short-duration consumer loads for…
ICSSE 2012 Keynote on "Energy-efficient buildings for a greener future"
Today, Stefan gave a keynote on „Energy-efficient buildings for a greener future“ at the ICSSE 2012 conference in Yogyakarta. Download the slides here.
Improving The Usability Of Energy Simulation Applications In Processing Common Building Performance Inquiries
Building performance simulation tools must be supplied with large amounts of information. Conventional approaches to gathering such information are often cumbersome and time-consuming. Hence, opportunities for in-depth simulation-supported exploration of design and retrofit options may not be optimally exploited. Thus, efforts are necessary to support…
Exploring the Utility of Semantic Web Technology in Building Performance Simulation
The simulation-based assessment and evaluation of alternative building design and retrofit options requires large amounts of information. Thus, efforts are necessary to support the process of data search and collection, such that building models for performance evaluation routines and applications could be efficiently populated. The…
Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation
The essential characteristics of cloud computing such as elasticity or broad network access provide many economic benefits for their users, but with these benefits also many security and privacy risks come along. These risks can be generally classied into legal and technical risks. The upcoming…
SEMERGY: Semantic Web Technology Support for Comprehensive Building Design Assessment
This paper explores developmental opportunities toward effective evaluation environments for comparative assessment of alternative building design and retrofit options. Such options are to be benchmarked in view of their functional, ecological, and economical performance. Thereby, multiple use cases are to be accommodated, involving a) novice…
Automated Transformation of Semi-Structured Text Elements
aisel.aisnet.org/amcis2012/proceedings/ISHealthcare/17 Interconnected systems, such as electronic health records (EHR), considerably improved the handling and processing of health information while keeping the costs at a controlled level. Since the EHR virtually stores all data in digitized form, personal medical documents are easily and swiftly available when…
SIEM-Based Framework for Security Controls Automation
www.emeraldinsight.com/journals.htm The purpose of this paper is to propose a framework for security controls automation, in order to achieve greater efficiency and reduce the complexity of information security management. This research reviewed the controls recommended by well known standards such as ISO/IEC 27001 and NIST…
PERiMETER – Pseudonymization and Personal Metadata Encryption for Privacy-Preserving Searchable Documents
[:en] The average costs of data leakage are steadily on the rise. Especially in healthcare, the disclosure of sensitive information may have unfavorable consequences for the patient. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to…
Using Semantic Technologies for Energy-Efficient Building Planning
The Directive 2002/91/EC of the European Parliament requires member states to calculate the energy performance of buildings with the overall goal of reducing their energy consumption. Existing tools for the calculation of building energy efficiency provide good results in calculating the energy level of a…
Recognition and Privacy Preservation of Paper-Based Health Records
ebooks.iospress.nl/publication/21844 While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are still produced on a daily basis. This data has to be stored for decades due to legal reasons but is of…
Ontological Mapping of Information Security Best-Practice Guidelines
[:en] Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation…