dc.contributor.author | Hadjicostis, Christoforos N. | en |
dc.creator | Hadjicostis, Christoforos N. | en |
dc.date.accessioned | 2019-04-08T07:46:02Z | |
dc.date.available | 2019-04-08T07:46:02Z | |
dc.date.issued | 2010 | |
dc.identifier.isbn | 978-1-4244-8214-6 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/43535 | |
dc.description.abstract | Enhancing the security and reliability of automated systems that control vital national infrastructures, such as energy and water distribution systems, has recently emerged as a critical aspect of maintaining, protecting, and securing such infrastructures against interference or possibly malicious activity. Examples of such automated systems include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and networks of embedded sensors and actuators, most of which were designed without anticipating the security threats that arise due to increasing reliance on common software, public telecommunication networks, and the Internet. In this paper, we discuss how state-based notions of opacity in finite automata models can be used to capture security properties of interest in automated systems that can be modeled as controlled finite automata subject to external disturbances.We also describe when and how control objectives can be achieved while enforcing desirable security and/or privacy objectives. ©2010 IEEE. | en |
dc.source | 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 | en |
dc.source | 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79952397402&doi=10.1109%2fALLERTON.2010.5707108&partnerID=40&md5=d307719e2405659ad448986b4bf18b8a | |
dc.subject | Telecommunication networks | en |
dc.subject | Distributed parameter control systems | en |
dc.subject | Automation | en |
dc.subject | Control objectives | en |
dc.subject | Distributed parameter networks | en |
dc.subject | Automated systems | en |
dc.subject | Common software | en |
dc.subject | Critical infrastructures | en |
dc.subject | Distributed control systems | en |
dc.subject | Embedded sensors | en |
dc.subject | Embedded software | en |
dc.subject | Embedded systems | en |
dc.subject | Finite automata model | en |
dc.subject | Malicious activities | en |
dc.subject | Multimedia services | en |
dc.subject | National infrastructure | en |
dc.subject | Scada systems | en |
dc.subject | Security properties | en |
dc.subject | Security threats | en |
dc.subject | State-based | en |
dc.subject | Supervisory control and data acquisition systems | en |
dc.subject | Supervisory control strategy | en |
dc.subject | System security | en |
dc.subject | Water supply systems | en |
dc.title | Supervisory control strategies for enhancing system security and privacy | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1109/ALLERTON.2010.5707108 | |
dc.description.startingpage | 1622 | |
dc.description.endingpage | 1627 | |
dc.author.faculty | Πολυτεχνική Σχολή / Faculty of Engineering | |
dc.author.department | Τμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering | |
dc.type.uhtype | Conference Object | en |
dc.contributor.orcid | Hadjicostis, Christoforos N. [0000-0002-1706-708X] | |
dc.gnosis.orcid | 0000-0002-1706-708X | |