메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Designing secure SCADA systems using security patterns

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL INFRASTRUCTURE SYSTEMS; DAILY LIVES; KEY COMPONENT; NEW DIRECTIONS; POTENTIAL ATTACK; SECURE SYSTEM; SECURITY PATTERNS;

EID: 77951749326     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2010.139     Document Type: Conference Paper
Times cited : (21)

References (20)
  • 4
    • 58849164843 scopus 로고    scopus 로고
    • Security for process control systems: An overview
    • Nov.-Dec.
    • Braendle, M. and M. Naedele. Security for process control systems: An overview. IEEE Security & Privacy, Vol. 6, No 6, Nov.-Dec. 2008 pp.24-29
    • (2008) IEEE Security & Privacy , vol.6 , Issue.6 , pp. 24-29
    • Braendle, M.1    Naedele, M.2
  • 8
    • 22344444992 scopus 로고    scopus 로고
    • The myths and facts behind cyber security risks for industrial control systems
    • Byres, E. and J. Lowe, "The myths and facts behind cyber security risks for industrial control systems," in Proc. of VDE Congress, 2004.
    • Proc. of VDE Congress, 2004
    • Byres, E.1    Lowe, J.2
  • 9
    • 33845264120 scopus 로고    scopus 로고
    • Defining security requirements through misuse actions
    • DOI 10.1007/978-0-387-34831-5-10, Advances Software Engineering: Expanding the Frontiers of Software Technology: IFIP 19th World Computer Congress, First International Workshop on Advanced Software Engineering, Augst 2, Santiago, Chil
    • Fernandez, E. B. M. VanHilst, M. M. Larrondo-Petrie, and S. Huang, "Defining security requirements through misuse actions," in Advanced Software Engineering: Expanding the Frontiers of Software Technology, 219:123-137, 2006. (Pubitemid 44856848)
    • (2006) IFIP International Federation for Information Processing , vol.219 , pp. 123-137
    • Fernandez, E.B.1    Vanhilst, M.2    Petrie, M.M.L.3    Huang, S.4
  • 10
    • 33744905133 scopus 로고    scopus 로고
    • A pattern language for security models
    • Fernandez, E B. and R.Y. Pan, "A pattern language for security models," in Procs. of PLoP 2001, http://jerry.cs.uiuc.edu/~plop/plop2001/ accepted-submissions/accepted-papers.html
    • Procs. of PLoP 2001
    • Fernandez, E.B.1    Pan, R.Y.2
  • 13
    • 77951721388 scopus 로고    scopus 로고
    • Tropyc: A pattern language for cryptographic object-oriented software
    • Addison Wesley Publishing Company, Also in
    • "Tropyc: A pattern language for cryptographic object-oriented software". Addison Wesley Publishing Company, 1999. Also in Proc. of PLoP, 1998.
    • (1999) Proc. of PLoP, 1998
  • 15
    • 27644559364 scopus 로고    scopus 로고
    • Trends in process control systems security
    • DOI 10.1109/MSP.2005.136
    • Miller, A., "Trends in process control systems security," IEEE Security and Privacy, 3(5):57-60, 2005. (Pubitemid 41560446)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 57-60
    • Miller, A.1
  • 16
    • 77951703620 scopus 로고    scopus 로고
    • 21 steps to improve cyber security of SCADA networks
    • U.S. Department Of Energy. September 9
    • U.S. Department Of Energy. "21 steps to improve cyber security of SCADA networks. U.S. DoE Report. September 9, 2002. http://www.oe.netl.doe.gov/ docs/prepare/21stepsbooklet.pdf
    • (2002) U.S. DoE Report
  • 17
    • 70549106029 scopus 로고    scopus 로고
    • Electricity grid in U.S. penetrated by spies
    • April 8
    • Gorman, S., "Electricity grid in U.S. penetrated by spies," in The Wall Street Journal Online, April 8, 2009. http://online.wsj.com/article/ SB123914805204099085.html?mod=goog
    • (2009) The Wall Street Journal Online
    • Gorman, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.