메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1235-1240

Towards a Model Driven Security for critical infrastructures using OrBAC

Author keywords

Critical Infrastructure; Electrical Grid; Model Driven Architecture; Model Driven Security; Organization Based Access Control

Indexed keywords

ACCESS CONTROL; CRITICAL INFRASTRUCTURES; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; PUBLIC WORKS; SOFTWARE DESIGN;

EID: 84928731266     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMCS.2014.6911301     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 34548178043 scopus 로고    scopus 로고
    • A novel approach to building secure systems
    • Reliability and Security (ARES). April
    • D. Vidakovic and D. Simic, "A Novel Approach to Building Secure Systems", in the Second International Conference on Availability, Reliability and Security (ARES), April 2007, pp. 1074-1084
    • (2007) The Second International Conference on Availability , pp. 1074-1084
    • Vidakovic, D.1    Simic, D.2
  • 3
    • 79955163100 scopus 로고    scopus 로고
    • UML 2002-The Unified Modeling Language, J.-M. Jezequel, H. Hussmann and S. Cook, Ed, Springer Berlin Heidelberg
    • J. Jlirjens, "UMLsec: Extending UML for Secure Systems Development", in UML 2002-The Unified Modeling Language, J.-M. Jezequel, H. Hussmann and S. Cook, Ed. Springer Berlin Heidelberg, 2002, pp. 412-425
    • (2002) UMLsec: Extending UML for Secure Systems Development , pp. 412-425
    • Jlirjens, J.1
  • 10
    • 58049169429 scopus 로고    scopus 로고
    • Model driven security
    • M. Broy, J. Grlinbauer, D. Harel and T. Hoare, Ed Springer Netherlands
    • D. Basin, J. Doser and T. Lodderstedt, "Model Driven Security", in Engineering Theories of Software Intensive Systems, vol. 195, M. Broy, J. Grlinbauer, D. Harel and T. Hoare, Ed. Springer Netherlands, 2005, pp. 353-398
    • (2005) Engineering Theories of Software Intensive Systems , vol.195 , pp. 353-398
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 14
    • 84928715240 scopus 로고    scopus 로고
    • Unified Modeling Language
    • "Unified Modeling Language http://www.uml.org/. UML". Available on:
  • 16
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • September
    • R. S. Sandhuet and P. Samarati, "Access control: principle and practice", IEEE Commun. Mag., vol. 32, nO 9, September 1994, pp. 40-48
    • (1994) IEEE Commun. Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhuet, R.S.1    Samarati, P.2
  • 17
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • S. Sandhu, E. J. Coyne, H. J. Feinstein and C. E. Youman, "Role-Based Access Control Models", Computer, vol. 29, nO 2, February 1996, pp. 38-47
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, S.1    Coyne, E.J.2    Feinstein, H.J.3    Youman, C.E.4
  • 19
    • 84928722126 scopus 로고    scopus 로고
    • Object Management
    • "Object Management http://www.omg.org/. Group-OMG". Available on:
  • 20
    • 84928724281 scopus 로고    scopus 로고
    • MetaObject Facility-MOF
    • "MetaObject Facility-MOF". Available on: http://www.omg.org/mof/
  • 21
    • 84928710762 scopus 로고    scopus 로고
    • Extensible Markup Language (XML) 1.0 (Fifth Edition)
    • "Extensible Markup Language (XML) 1.0 (Fifth Edition)". Available on: http://www.w3.org/TRlREC-xml/
  • 22
    • 84928752219 scopus 로고    scopus 로고
    • XML Metadata Interchange (XMI) 2.4.1
    • "XML Metadata Interchange (XMI) 2.4.1". Available on: http://www.omg.org/spec/XMII2.4.I/
  • 23
    • 84928728141 scopus 로고    scopus 로고
    • Xml metadata interchange
    • J. LlU and M. T. OZSU, Ed, Springer US
    • M. Weiss, "XML Metadata Interchange", in Encyclopedia of Database Systems, J. LlU and M. T. OZSU, Ed. Springer US, 2009, pp. 3597
    • (2009) Encyclopedia of Database Systems , pp. 3597
    • Weiss, M.1
  • 24
    • 84855764719 scopus 로고    scopus 로고
    • Critical infrastructure security modelling and resci-monitor: A risk based critical infrastructure model
    • May
    • T. Schaberreiter, J. Aubert and D. Khadraoui, "Critical infrastructure security modelling and RESCI-MONITOR: A risk based critical infrastructure model", in 1ST-Africa Conference Proceedings, May 2011, pp. 1-8
    • (2011) 1ST-Africa Conference Proceedings , pp. 1-8
    • Schaberreiter, T.1    Aubert, J.2    Khadraoui, D.3
  • 25
    • 42549114684 scopus 로고    scopus 로고
    • Enhancing the reliability and security of the information infrastructure used to manage the power system
    • June
    • F. Cleveland, "Enhancing the Reliability and Security of the Information Infrastructure Used to Manage the Power System", in IEEE Power Engineering Society General Meeting, June 2007, pp. 1-8.
    • (2007) IEEE Power Engineering Society General Meeting , pp. 1-8
    • Cleveland, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.