enter search term and/or author name
Integrity Attacks on Real-Time Pricing in Electric Power Grids
Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk
Article No.: 5
Modern information and communication technologies used by electric power grids are subject to cyber-security threats. This article studies the impact of integrity attacks on real-time pricing (RTP), an emerging feature of advanced power grids that...
Model Checking Distributed Mandatory Access Control Policies
Perry Alexander, Lee Pike, Peter Loscocco, George Coker
Article No.: 6
This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting virtual machines. Specifically, we examine how local access control policies implemented in individual virtual...
Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure*
Muhammad Qasim Ali, Ehab Al-Shaer
Article No.: 7
Smart grid deployment initiatives have been witnessed in recent years. Smart grids provide bidirectional communication between meters and head-end systems through Advanced Metering Infrastructure (AMI). Recent studies highlight the threats...
Using Architecture to Reason about Information Security
Stephen Chong, Ron Van Der Meyden
Article No.: 8
We demonstrate, by a number of examples, that information flow security properties can be proved from abstract architectural descriptions, which describe only the causal structure of a system and local properties of trusted components. We specify...