• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 518
Next 10 →

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 615 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

Design and Operation of Secure Cyber-Physical Systems

by Fabio Pasqualetti, Qi Zhu
"... Abstract—This paper proposes a holistic framework to de-sign and operate secure, real-time, and computationally effi-cient cyber-physical systems. The proposed framework com-bines control-theoretic methods, information security notions and computational models to characterize tradeoffs among differe ..."
Abstract - Add to MetaCart
Abstract—This paper proposes a holistic framework to de-sign and operate secure, real-time, and computationally effi-cient cyber-physical systems. The proposed framework com-bines control-theoretic methods, information security notions and computational models to characterize tradeoffs among

Secure Border Gateway Protocol (S-BGP

by Stephen Kent, Charles Lynn, Joanne Mikkelson, Karen Seo - IEEE Journal on Selected Areas in Communications , 2000
"... The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure. Secure BGP (S-BGP) addresses critical BGP vulnerabilities by providing a scalable means of verifying the authenticity and ..."
Abstract - Cited by 270 (4 self) - Add to MetaCart
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure. Secure BGP (S-BGP) addresses critical BGP vulnerabilities by providing a scalable means of verifying the authenticity

1Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation

by Thoshitha T. Gamage, Bruce M. Mcmillin, Thomas P. Roth
"... Abstract—This paper presents a general theory of event com-pensation as an information flow security enforcement mech-anism for Cyber-Physical Systems (CPSs). The fundamental research problem, in a broader sense, being investigated is the fact that externally observable events in modern CPSs have th ..."
Abstract - Add to MetaCart
Abstract—This paper presents a general theory of event com-pensation as an information flow security enforcement mech-anism for Cyber-Physical Systems (CPSs). The fundamental research problem, in a broader sense, being investigated is the fact that externally observable events in modern CPSs have

Traceability of Information Flow Requirements in Cyber-Physical Systems Engineering

by Christopher Gerking
"... Abstract. The secure information flow between a cyber-physical system and its environment has evolved into a critical factor. To comply with security regulations, engineers of cyber-physical systems need to trace information flow requirements from their specification to the software design. However ..."
Abstract - Add to MetaCart
Abstract. The secure information flow between a cyber-physical system and its environment has evolved into a critical factor. To comply with security regulations, engineers of cyber-physical systems need to trace information flow requirements from their specification to the software design

The slam calculus: programming with secrecy and integrity

by Nevin Heintze, Jon G. Riecke - In POPL ’98: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , 1998
"... The SLam calculus is a typed λ-calculus that maintains security information as well as type information. The type system propagates security information for each object in four forms: the object’s creators and readers, and the object’s indirect creators and readers (i.e., those agents who, through f ..."
Abstract - Cited by 274 (1 self) - Add to MetaCart
The SLam calculus is a typed λ-calculus that maintains security information as well as type information. The type system propagates security information for each object in four forms: the object’s creators and readers, and the object’s indirect creators and readers (i.e., those agents who, through

Virtual Synchrony Guarantees for Cyber-Physical Systems

by unknown authors
"... Abstract—By integrating computational and physical elements through feedback loops, CPSs implement a wide range of safetycritical applications, from high-confidence medical systems to critical infrastructure control. Deployed systems must therefore provide highly dependable operation against unpredi ..."
Abstract - Add to MetaCart
Abstract—By integrating computational and physical elements through feedback loops, CPSs implement a wide range of safetycritical applications, from high-confidence medical systems to critical infrastructure control. Deployed systems must therefore provide highly dependable operation against

On the Use of Cyber-Physical Hierarchy for Smart Grid Security and Efficient Control

by Jin Wei, Deepa Kundur, Takis Zourntos - in IEEE Canadian Conference on Electrical and Computer Engineering (CCECE , 2012
"... We study the application of cyber-physical hierarchy on a class of smart grid systems to improve scalability. Our framework employs a multi-agent flocking-based approach to study the transient stability problem in emerging power systems. An agent in this context em-bodies a coherent group of system ..."
Abstract - Cited by 6 (6 self) - Add to MetaCart
WECC system demonstrating its lower overhead and greater robust-ness to cyber attacks resulting in information delay. Index Terms — cyber-physical system security, smart grid hier-archy, flocking theory. 1.

Secure Information Flow by Self-Composition

by Gilles Barthe, Pedro R. D’Argenio, Tamara Rezk - UNDER CONSIDERATION FOR PUBLICATION IN MATH. STRUCT. IN COMP. SCIENCE , 2010
"... Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking or inferenc ..."
Abstract - Cited by 138 (15 self) - Add to MetaCart
Information flow policies are confidentiality policies that control information leakage through program execution. A common means to enforce secure information flow is through information flow type systems. Although type systems are compositional and usually enjoy decidable type checking

Observing for Changes: Nondeducibility Based Analysis of Cyber-Physical Systems

by unknown authors
"... Preserving Information Flow properties in a Cyber-Physical System (CPS) is challenging because cyber domain decisions and changes manifest themselves as visible changes in the physical domain. In this paper, a nondeducibility based observability analysis for CPSs is presented. In many such systems a ..."
Abstract - Add to MetaCart
Preserving Information Flow properties in a Cyber-Physical System (CPS) is challenging because cyber domain decisions and changes manifest themselves as visible changes in the physical domain. In this paper, a nondeducibility based observability analysis for CPSs is presented. In many such systems
Next 10 →
Results 1 - 10 of 518
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University