MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Exploring adaptability of secure group communication using formal prototyping techniques
ARM '04 Proceedings of the 3rd workshop on Adaptive and reflective middleware
ACM SIGMOBILE Mobile Computing and Communications Review
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Constraint refinement for online verifiable cross-layer system adaptation
Proceedings of the conference on Design, automation and test in Europe
Quality-driven cross layer design for multimedia security over resource constrained wireless sensor networks
Toward distributed declarative control of networked cyber-physical systems
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
An Application Framework for Loosely Coupled Networked Cyber-Physical Systems
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms
IEEE Wireless Communications
IEEE Journal on Selected Areas in Communications
Maximizing availability of content in disruptive environments by cross-layer optimization
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
Situation- and resource-aware security is essential for the process control systems, composed of networked entities with sensors and actuators, that monitor and control the national critical infrastructure. However, security cannot be addressed at a single layer because of the inherent dependencies and tradeoffs among crosscutting concerns. Techniques applied at one layer to improve security affect security, timing, and power consumption at other layers. This paper argues for an integrated treatment of security across multiple layers of abstraction (application, middleware, operating system including network stack, and hardware). An important step in realizing this integrated treatment of situationand resource-aware security is first understanding the cross-layer interactions between security policies and then exploiting these interactions to design efficient adaptation strategies (i) to balance security, quality of service, and energy needs, and (ii) to maximize system availability. We propose a novel approach that employs a compositional method within an iterative tuning framework based on lightweight formal methods with dynamic adaptation.