메뉴 건너뛰기




Volumn 6712 LNCS, Issue , 2011, Pages 93-103

A formal adversary capability model for SCADA environments

Author keywords

[No Author keywords available]

Indexed keywords

ADVERSARIAL AGENT; ADVERSARY MODELS; CAPABILITY MODEL; COMMUNICATION CAPABILITIES; COMMUNICATION EFFECTS; COMMUNICATION MODELS; CRYPTOGRAPHIC PROTOCOLS; DOLEV-YAO MODEL; NETWORK COMMUNICATIONS; REALTIME PROCESSING; SUPERVISORY CONTROL AND DATA ACQUISITION;

EID: 84857408165     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21694-7_8     Document Type: Conference Paper
Times cited : (13)

References (13)
  • 1
    • 35048833887 scopus 로고    scopus 로고
    • A structured operational modelling of the dolev-yao threat model
    • Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. Springer, Heidelberg
    • Mao, W.: A structured operational modelling of the dolev-yao threat model. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 34-46. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2845 , pp. 34-46
    • Mao, W.1
  • 2
    • 77956569636 scopus 로고    scopus 로고
    • From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
    • ePrint Archive, Report 2009/079
    • Basin, D., Cremers, C.: From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. Cryptology ePrint Archive, Report 2009/079 (2009), http://eprint.iacr.org/
    • (2009) Cryptology
    • Basin, D.1    Cremers, C.2
  • 3
    • 18044369652 scopus 로고    scopus 로고
    • Process Algebra for Hybrid Systems
    • Bergstra, J.A., Middleburg, C.A.: Process Algebra for Hybrid Systems. Theor. Comput. Sci. 335(2-3), 215-280 (2005)
    • (2005) Theor. Comput. Sci. , vol.335 , Issue.2-3 , pp. 215-280
    • Bergstra, J.A.1    Middleburg, C.A.2
  • 4
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking Security Properties, Threat Models, and the Design Space in Sensor Networks: A Case Study in Scada Systems
    • Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking Security Properties, Threat Models, and the Design Space in Sensor Networks: A Case Study in Scada Systems. Ad Hoc Netw. 7(8), 1434-1447 (2009)
    • (2009) Ad Hoc Netw. , vol.7 , Issue.8 , pp. 1434-1447
    • Cardenas, A.A.1    Roosta, T.2    Sastry, S.3
  • 7
    • 0027561446 scopus 로고
    • A Plant-Wide Industrial Process Control Problem
    • Downs, J.J., Vogel, E.F.: A Plant-Wide Industrial Process Control Problem. Computers & Chemical Engineering 17(3), 245-255 (1993)
    • (1993) Computers & Chemical Engineering , vol.17 , Issue.3 , pp. 245-255
    • Downs, J.J.1    Vogel, E.F.2
  • 13
    • 50649107305 scopus 로고    scopus 로고
    • Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
    • Verba, M., Milvich, J.: Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In: IEEE Conference on Technologies for Homeland Security, pp. 469-473 (2008)
    • (2008) IEEE Conference on Technologies for Homeland Security , pp. 469-473
    • Verba, M.1    Milvich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.