Power and permission in security systems

被引:0
|
作者
Firozabadi, BS [1 ]
Sergot, M [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London SW7 2BZ, England
来源
SECURITY PROTOCOLS | 2000年 / 1796卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [1] Power and permission in computer systems
    Firozabadi, BS
    SECURITY PROTOCOLS, 2000, 1796 : 54 - 59
  • [2] Android Security: Permission Based Attacks
    Jain, Arushi
    Prachi
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2754 - 2759
  • [3] Power systems security analysis
    Sterpu, S.
    Lu, W.
    Besanger, Y.
    HadjSaid, N.
    2006 POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-9, 2006, : 4358 - 4362
  • [4] Generating Permission-Based Security Policies
    Li, Xin
    Hua Vy Le Thanh
    Deng, Yuxin
    Dolby, Julian
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 1 - 7
  • [5] Permission based Android security: Issues and countermeasures
    Fang, Zheran
    Han, Weili
    Li, Yingjiu
    COMPUTERS & SECURITY, 2014, 43 : 205 - 218
  • [6] A new threat to power systems security
    Pinto, LMVG
    Szczupak, J
    Drummond, MA
    Macedo, LH
    2004 IEEE/PES TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION: LATIN AMERICA, 2004, : 776 - 781
  • [7] SECURITY FOR SPACE POWER-SYSTEMS
    KUSIC, GL
    ALLEN, WH
    GHOLDSTON, EW
    BEACH, RF
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1990, 5 (01) : 140 - 147
  • [8] Impact of security on power systems operation
    Shahidehpour, M
    Tinney, WF
    Fu, Y
    PROCEEDINGS OF THE IEEE, 2005, 93 (11) : 2013 - 2025
  • [9] Power systems cyclic security analysis
    Harsan, H
    Hadjsaid, N
    Pruvot, P
    ELECTRIC POWER SYSTEMS RESEARCH, 1996, 38 (03) : 223 - 229
  • [10] On security criteria in power systems operation
    Zima, M
    Andersson, G
    2005 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS, 1-3, 2005, : 3089 - 3093