-
1
-
-
21644440888
-
Security for industrial communication systems
-
DOI 10.1109/JPROC.2005.849714, Industrial Communication Systems
-
D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, 2005 (Pubitemid 40928634)
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
3
-
-
84871964962
-
Review of security issues in industrial networks
-
M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, 2013
-
(2013)
IEEE Trans. Ind. Informat.
, vol.9
, Issue.1
, pp. 277-293
-
-
Cheminod, M.1
Durante, L.2
Valenzano, A.3
-
4
-
-
78650891506
-
Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
-
L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Delivery., vol. 26, no. 1, pp. 161-172, 2011
-
(2011)
IEEE Trans. Power Delivery.
, vol.26
, Issue.1
, pp. 161-172
-
-
Piètre-Cambacédès, L.1
Tritschler, M.2
Ericsson, G.N.3
-
5
-
-
77954325007
-
Taxonomy of wireless sensor network security attacks in the oil and gas industries
-
Perth, Apr 20-23
-
P. Radmand, A. Talevski, S. Petersen, and S. Carlsen, "Taxonomy of wireless sensor network security attacks in the oil and gas industries," in Proc. 24th IEEE Int. Conf. Advanced Information Networking Applications (AINA), Perth, Apr. 20-23, 2010, pp. 949-957
-
(2010)
Proc. 24th IEEE Int. Conf. Advanced Information Networking Applications (AINA)
, pp. 949-957
-
-
Radmand, P.1
Talevski, A.2
Petersen, S.3
Carlsen, S.4
-
6
-
-
67651162241
-
Improving the cybersecurity of SCADA communication networks
-
S. C. Patel, G. D. Bhatt, and J. H. Graham, "Improving the cybersecurity of SCADA communication networks," Commun. ACM, vol. 52, no. 7, pp. 139-142, 2009
-
(2009)
Commun ACM
, vol.52
, Issue.7
, pp. 139-142
-
-
Patel, S.C.1
Bhatt, G.D.2
Graham, J.H.3
-
7
-
-
52349119748
-
Cybersecurity issues for advanced metering infrastructure (AMI)
-
Pittsburgh, PA July 20-24
-
F. M. Cleveland, "Cybersecurity issues for advanced metering infrastructure (AMI)," in Proc. IEEE Power Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, July 20-24, 2008, pp. 1-5
-
(2008)
Proc IEEE Power Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-5
-
-
Cleveland, F.M.1
-
8
-
-
84893572193
-
Security and privacy issues in smart grids
-
J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. P. Chen, "Security and privacy issues in smart grids," IEEE Commun. Surv. Tutorials, vol. 14, no. 4, pp. 981-997, 2012
-
(2012)
IEEE Commun. Surv. Tutorials
, vol.14
, Issue.4
, pp. 981-997
-
-
Liu, J.1
Xiao, Y.2
Li, S.3
Liang, W.4
Chen, C.L.P.5
-
9
-
-
80055028776
-
Challenges for securing cyberphysical systems
-
22-24 July) [Online]. Available:
-
A. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. (2009, 22-24 July). "Challenges for securing cyberphysical systems," in Proc. Workshop Future Directions Cyber-Physical Systems Security [Online]. Available: http://cimic.rutgers.edu/positionPapers/ cps-security-challenges- Cardenas.pdf
-
(2009)
Proc. Workshop Future Directions Cyber-Physical Systems Security
-
-
Cardenas, A.A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
10
-
-
77954005795
-
Cybersecurity and power system communication-Essential parts of a smart grid infrastructure
-
G. N. Ericsson, "Cybersecurity and power system communication- Essential parts of a smart grid infrastructure," IEEE Trans. Power Delivery, vol. 25, no. 3, pp. 1501-1507, 2010
-
(2010)
IEEE Trans. Power Delivery
, vol.25
, Issue.3
, pp. 1501-1507
-
-
Ericsson, G.N.1
-
11
-
-
33847298654
-
Security measures in automation systems-A practiceoriented approach
-
Sept. 18-21
-
A. Treytl, T. Sauter, and C. Schwaiger, "Security measures in automation systems-A practiceoriented approach," in Proc. 10th IEEE Int. Conf. Emerging Technologies Factory Automation (ETFA), Catania, Sept. 18-21, 2005, pp. 847-855
-
(2005)
Proc. 10th IEEE Int. Conf. Emerging Technologies Factory Automation (ETFA), Catania
, pp. 847-855
-
-
Treytl, A.1
Sauter, T.2
Schwaiger, C.3
-
12
-
-
84890069861
-
Information Technology-Security Techniques-Information Security Management Systems-Requirements
-
Information Technology-Security Techniques-Information Security Management Systems-Requirements, ISO/IEC Std. 27 001, 2005
-
(2005)
ISO/IEC Std 27 001
-
-
-
13
-
-
24944551836
-
Recommended Security Controls for Federal Information Systems and Organizations
-
Recommended Security Controls for Federal Information Systems and Organizations, NIST SP 800-53 rev. 3, 2010
-
(2010)
NIST SP 800-53 Rev
, vol.3
-
-
-
14
-
-
84903149317
-
-
Industrial Communication Networks-Network and System Security-Part 1-1: Terminology
-
Industrial Communication Networks-Network and System Security-Part 1-1: Terminology, Concepts and Models, IEC/TS 62443-1-1, 2009
-
(2009)
Concepts and Models, IEC/TS 62443
, pp. 1-1
-
-
-
15
-
-
84889037774
-
Secure design of engineering software tools in industrial automation and control systems
-
Bochum, July
-
A. Hristova, S. Obermeier, and R. Schlegel, "Secure design of engineering software tools in industrial automation and control systems," in Proc. 11th IEEE Int. Conf. Industrial Informatics (INDIN), Bochum, July 2013, pp. 695-700
-
(2013)
Proc. 11th IEEE Int. Conf. Industrial Informatics (INDIN)
, pp. 695-700
-
-
Hristova, A.1
Obermeier, S.2
Schlegel, R.3
-
16
-
-
0016984825
-
Protection in operating systems
-
M. H. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976
-
(1976)
Commun ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
17
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Bedford, MA
-
D. E. Bell and L. J. LaPadula, "Secure computer systems: Mathematical foundations," Tech. Rep. ESD-TR-278, The Mitre Corporation, Bedford, MA, 1973
-
(1973)
Tech. Rep. ESD-TR-278, the Mitre Corporation
-
-
Bell, D.E.1
Lapadula, L.J.2
-
18
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, MA
-
K. J. Biba, "Integrity considerations for secure computer systems," Tech. Rep. TR-3153, The Mitre Corporation, Bedford, MA, 1977
-
(1977)
Tech. Rep. TR-3153, the Mitre Corporation
-
-
Biba, K.J.1
-
19
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Computer., vol. 29, no. 2, pp. 38-47, 1996
-
(1996)
IEEE Computer.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
20
-
-
24644450643
-
Role Based Access Control
-
Role Based Access Control, ANSI INCITS 359-2012, 2012
-
(2012)
ANSI INCITS 359-2012
-
-
-
21
-
-
84903188318
-
Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 8: Role-Based Access Control
-
Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 8: Role-Based Access Control, IEC/TS 62351-8, 2011
-
(2011)
IEC/TS 62351-8
-
-
-
22
-
-
84883377107
-
Role-based access control model supporting regional division in smart grid system
-
Madrid, June 6-7
-
D. Rosic, U. Novak, and S. Vukmirovic, " Role-based access control model supporting regional division in smart grid system," in Proc. 5th IEEE Int. Conf. Computational Intelligence, Communication Systems Networks (CICSyN), Madrid, June 6-7, 2013, pp. 197-201
-
(2013)
Proc. 5th IEEE Int. Conf. Computational Intelligence, Communication Systems Networks (CICSyN)
, pp. 197-201
-
-
Rosic, D.1
Novak, U.2
Vukmirovic, S.3
-
23
-
-
37349091904
-
Conformance checking of access control policies specified in XACML
-
DOI 10.1109/COMPSAC.2007.96, 4291136, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
-
V. C. Hu, E. Martin, J. Hwang, and T. Xie, "Conformance checking of access control policies specified in XACML," in Proc. 31st IEEE Annual Int. Computer Software Applications Conf. (COMPSAC), Beijing, July 23-27, 2007, pp. 275-280 (Pubitemid 350301805)
-
(2007)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 275-280
-
-
Hu, V.C.1
Martin, E.2
Hwang, J.3
Xie, T.4
-
24
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
St. Louis, May 15-21
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, "Verification and change-impact analysis of access-control policies," in Proc. 27th ACM Int. Conf. Software Engineering (ICSE), St. Louis, May 15-21, 2005, pp. 196-205
-
(2005)
Proc. 27th ACM Int. Conf. Software Engineering (ICSE)
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
25
-
-
77952740950
-
Conformance testing of temporal role-based access control systems
-
M. Masood, A. Ghafoor, and A. Mathur, "Conformance testing of temporal role-based access control systems," IEEE Trans. Dependable Secure Comput., vol. 7, no. 2, pp. 144-158, 2010
-
(2010)
IEEE Trans. Dependable Secure Comput.
, vol.7
, Issue.2
, pp. 144-158
-
-
Masood, M.1
Ghafoor, A.2
Mathur, A.3
-
26
-
-
85044090708
-
RBAC in UNIX administration
-
Fairfax, VA Oct. 28-29
-
G. Faden, "RBAC in UNIX administration," in Proc. 4th ACM Workshop Role-Based Access Control, Fairfax, VA, Oct. 28-29, 1999, pp. 95-101
-
(1999)
Proc. 4th ACM Workshop Role-Based Access Control
, pp. 95-101
-
-
Faden, G.1
-
27
-
-
84884999344
-
Application-sensitive access control evaluation using parameterized expressiveness
-
CSF), New Orleans, LA, June 26-28
-
T. L. Hinrichs, D. Martinoia, W. C. Garrison, A. J. Lee, A. Panebianco, and L. Zuck, "Application-sensitive access control evaluation using parameterized expressiveness," in Proc. 26th IEEE Computer Security Foundations Symp. (CSF), New Orleans, LA, June 26-28, 2013, pp. 145-160
-
(2013)
Proc. 26th IEEE Computer Security Foundations Symp
, pp. 145-160
-
-
Hinrichs, T.L.1
Martinoia, D.2
Garrison, W.C.3
Lee, A.J.4
Panebianco, A.5
Zuck, L.6
-
28
-
-
84890559430
-
Verification and enforcement of access control policies
-
A. Cau, H. Janicke, and B. Moszkowski, "Verification and enforcement of access control policies," Formal Meth. Syst. Des., vol. 43, no. 3, pp. 450-492, 2013
-
(2013)
Formal Meth. Syst. Des.
, vol.43
, Issue.3
, pp. 450-492
-
-
Cau, A.1
Janicke, H.2
Moszkowski, B.3
-
30
-
-
58849130197
-
Usable global network access policy for process control systems
-
D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 30-36, 2008
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.6
, pp. 30-36
-
-
Nicol, D.M.1
Sanders, W.H.2
Singh, S.3
Seri, M.4
-
31
-
-
77951758583
-
Experiences validating the access policy tool in industrial settings
-
Koloa, HI, Jan 8-10
-
D. M. Nicol, W. H. Sanders, M. Seri, and S. Singh, "Experiences validating the access policy tool in industrial settings," in Proc. 43rd IEEE Hawaii Int. Conf. System Sciences (HICSS), Koloa, HI, Jan. 8-10, 2010, pp. 1-8
-
(2010)
Proc. 43rd IEEE Hawaii Int. Conf. System Sciences (HICSS)
, pp. 1-8
-
-
Nicol, D.M.1
Sanders, W.H.2
Seri, M.3
Singh, S.4
-
32
-
-
74049119313
-
Policy globe: A framework for integrating network and operating system security policies
-
Chicago, IL Nov. 9-13
-
H. Okhravi, R. H. Kagin, and D. M. Nicol, "Policy globe: A framework for integrating network and operating system security policies," in Proc. 2nd ACM Workshop Assurable Usable Security Configuration (SafeConfig), Chicago, IL, Nov. 9-13, 2009, pp. 53-62
-
(2009)
Proc. 2nd ACM Workshop Assurable Usable Security Configuration (SafeConfig)
, pp. 53-62
-
-
Okhravi, H.1
Kagin, R.H.2
Nicol, D.M.3
-
33
-
-
77957550874
-
Automatic analysis of security policies in industrial networks
-
Nancy, France, May 18-21
-
M. Cheminod, I. Cibrario Bertolotti, L. Durante, and A. Valenzano, "Automatic analysis of security policies in industrial networks," in Proc. 8th IEEE Int. Workshop Factory Communication Systems (WFCS), Nancy, France, May 18-21, 2010, pp. 109-118
-
(2010)
Proc. 8th IEEE Int. Workshop Factory Communication Systems (WFCS)
, pp. 109-118
-
-
Cheminod, M.1
Cibrario Bertolotti, I.2
Durante, L.3
Valenzano, A.4
-
34
-
-
84903965575
-
A model for the analysis of security policies in industrial networks
-
Leicester, Sept 16-17
-
I. Cibrario Bertolotti, L. Durante, T. Hu, and A. Valenzano, "A model for the analysis of security policies in industrial networks," in Proc. 1st Int. Symp. ICS SCADA Cybersecurity (ICS-CSR), Leicester, Sept. 16-17, 2013, pp. 1-11
-
(2013)
Proc. 1st Int. Symp. ICS SCADA Cybersecurity (ICS-CSR)
, pp. 1-11
-
-
Cibrario Bertolotti, I.1
Durante, L.2
Hu, T.3
Valenzano, A.4
-
35
-
-
84870175876
-
System configuration check against security policies in industrial networks
-
Karlsruhe, Germany, June 20-22
-
M. Cheminod, L. Durante, and A. Valenzano, "System configuration check against security policies in industrial networks," in Proc. 7th IEEE Int. Symp. Industrial Embedded Systems (SIES), Karlsruhe, Germany, June 20-22, 2012, pp. 247-265
-
(2012)
Proc. 7th IEEE Int. Symp. Industrial Embedded Systems (SIES
, pp. 247-265
-
-
Cheminod, M.1
Durante, L.2
Valenzano, A.3
-
36
-
-
84903201632
-
A twofold model for the description of access policies in industrial systems
-
Torino, Italy, Dec
-
I. Cibrario Bertolotti, L. Durante, L. Seno, and A. Valenzano, "A twofold model for the description of access policies in industrial systems," CNR-IEIIT Tech. Rep. CENG/2013-12/01, Torino, Italy, Dec. 2013
-
(2013)
CNR-IEIIT Tech. Rep. CENG/2013-12/01
-
-
Cibrario Bertolotti, I.1
Durante, L.2
Seno, L.3
Valenzano, A.4
-
37
-
-
84903975767
-
On the description of access control policies in networked industrial systems
-
Toulouse, France, May to appear
-
M. Cheminod, L. Durante, L. Seno, and A. Valenzano, "On the description of access control policies in networked industrial systems," in Proc. 10th IEEE Int. Workshop Factory Communication Systems (WFCS), Toulouse, France, May 5-7, 2014, to appear.
-
(2014)
Proc. 10th IEEE Int. Workshop Factory Communication Systems (WFCS)
, pp. 5-7
-
-
Cheminod, M.1
Durante, L.2
Seno, L.3
Valenzano, A.4
|