ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 18 Issue 2, December 2015

Integrity Attacks on Real-Time Pricing in Electric Power Grids
Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk
Article No.: 5
DOI: 10.1145/2790298

Modern information and communication technologies used by electric power grids are subject to cyber-security threats. This article studies the impact of integrity attacks on real-time pricing (RTP), an emerging feature of advanced power grids that...

Model Checking Distributed Mandatory Access Control Policies
Perry Alexander, Lee Pike, Peter Loscocco, George Coker
Article No.: 6
DOI: 10.1145/2785966

This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting virtual machines. Specifically, we examine how local access control policies implemented in individual virtual...

Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure*
Muhammad Qasim Ali, Ehab Al-Shaer
Article No.: 7
DOI: 10.1145/2814936

Smart grid deployment initiatives have been witnessed in recent years. Smart grids provide bidirectional communication between meters and head-end systems through Advanced Metering Infrastructure (AMI). Recent studies highlight the threats...

Using Architecture to Reason about Information Security
Stephen Chong, Ron Van Der Meyden
Article No.: 8
DOI: 10.1145/2829949

We demonstrate, by a number of examples, that information flow security properties can be proved from abstract architectural descriptions, which describe only the causal structure of a system and local properties of trusted components. We specify...