Power and permission in security systems

被引:0
|
作者
Firozabadi, BS [1 ]
Sergot, M [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London SW7 2BZ, England
来源
SECURITY PROTOCOLS | 2000年 / 1796卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:48 / 53
页数:6
相关论文
共 50 条
  • [31] EQUIVALENTS FOR SECURITY ANALYSIS OF POWER SYSTEMS.
    Savulescu, Savu C.
    Radiophysics and Quantum Electronics (English Translation of Izvestiya Vysshikh Uchebnykh Zavedenii, Radiofizika), 1980,
  • [32] Sequential Islanding of Power Systems as a Security Strategy
    Moreno, Ricardo
    Torres, Alvaro
    Anders, George
    Rios, Mario A.
    INTERNATIONAL REVIEW OF ELECTRICAL ENGINEERING-IREE, 2011, 6 (07): : 3058 - 3064
  • [33] Overview of the Power Systems Security with Regard to Cyberattacks
    Tranchita, C.
    Hadjsaid, N.
    Torres, A.
    CRIS: 4TH INTERNATIONAL CONFERENCE ON CRITICAL INFRASTRUCTURE, 2009, : 66 - 73
  • [34] DYNAMIC SECURITY REGIONS OF POWER-SYSTEMS
    KAYE, RJ
    WU, FF
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 1982, 29 (09): : 612 - 623
  • [35] Protection Security Assessment for Large Power Systems
    Jaeger, J.
    Lubiatowski, R.
    Ziegler, G.
    Krebs, R.
    2009 IEEE BUCHAREST POWERTECH, VOLS 1-5, 2009, : 1269 - +
  • [36] EQUIVALENTS FOR SECURITY ANALYSIS OF POWER-SYSTEMS
    SAVULESCU, SC
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1980, 99 (04): : 1322 - 1322
  • [37] SECURITY CONSTRAINED OPTIMIZATION OF POWER SYSTEMS.
    Khan, M.A.
    Pai, M.A.
    1975,
  • [38] Preventive control for dynamic security of power systems
    Li, WP
    Bose, A
    CONTROL OF POWER PLANTS AND POWER SYSTEMS (SIPOWER'95), 1996, : 379 - 383
  • [39] A formal approach for detection of security flaws in the android permission system
    Bagheri, Hamid
    Kang, Eunsuk
    Malek, Sam
    Jackson, Daniel
    FORMAL ASPECTS OF COMPUTING, 2018, 30 (05) : 525 - 544
  • [40] Automated analysis of permission-based security using UMLsec
    Juerjens, Jan
    Schreck, Joerg
    Yu, Yijun
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2008, 4961 : 292 - 295