skip to main content
10.1145/2179298.2179356acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Information flow security in cyber-physical systems

Published:12 October 2011Publication History
First page image

References

  1. R. Akella, H. Tang, and B. McMillin. Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection, 3-4:157-173, December 2010.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Faza, S. Sedigh, and B. McMillin. Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure. In Proc. of the Int'l Conf. on Computer Safety, Reliability and Security (SAFECOMP'09), pages 257-269, September 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Gunter and et. al. Trustworthy cyber-infrastructure for power. In TAS 2006 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems (CRTES '06), San Jose, CA, USA, April 4 2006.Google ScholarGoogle Scholar
  4. A. Huang. Renewable energy system research and education at the NSF FREEDM systems center. In Power & Energy Society General Meeting, 2009. PES '09. IEEE, pages 1-6, July 2009.Google ScholarGoogle ScholarCross RefCross Ref
  5. E. A. Lee. Position Paper: Cyber-Physical Systems - Are Computing Foundations Adequate? In NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap, October 16 - 17, 2006.Google ScholarGoogle Scholar
  6. F. B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security TISSEC, 3(1):30-50, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. V. Srinivasan, J. Stankovic, and K. Whitehouse. Protecting your daily in-home activity information from a wireless snooping attack. In UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing, pages 202-211, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Information flow security in cyber-physical systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
        October 2011
        18 pages
        ISBN:9781450309455
        DOI:10.1145/2179298

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader