International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 7 | Issue 5 | Year 2017 | Article Id. IJPTT-V7I5P407 | DOI : https://doi.org/10.14445/22492615/IJPTT-V7I5P407

A Case Study of Criticality Based Access Control in a Cyber Physical System


M.Sharada Varalakshmi

Citation :

M.Sharada Varalakshmi, "A Case Study of Criticality Based Access Control in a Cyber Physical System," International Journal of P2P Network Trends and Technology (IJPTT), vol. 7, no. 5, pp. 41-43, 2017. Crossref, https://doi.org/10.14445/22492615/IJPTT-V7I5P407

Abstract

This paper gives a brief description about the criticality situation in a Cyber Physical System(CPS). This study introduces a unique behavior of a CPS which changes its state at the time of criticality. Two states of CPS are introduced to access the control called as Normal state and Critical state. The CPS changes its state from Normal state to critical state at the time of crisis.

Keywords

Cyber Physical System, Access Control

References

[1] Adelstein, Frank, et al. Fundamentals of mobile and pervasive computing. Vol. 1. New York: McGraw-Hill, 2005.
[2] Simon, Richard T., and Mary Ellen Zurko. "Separation of duty in role-based environments." Computer Security Foundations Workshop, 1997. Proceedings., 10th. IEEE, 1997.
[3] Venkatasubramanian, Krishna K., Tridib Mukherjee, and Sandeep KS Gupta. "CAAC--an adaptive and proactive access control approach for emergencies in smart infrastructures." ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8.4 (2014): 20.
[4] S. Mehrotra, Kalashnikov, Dmitri V., et al. "Index for fast retrieval of uncertain spatial point data." Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. ACM, 2006.
[5] Schneier, Bruce, and John Kelsey. "Secure audit logs to support computer forensics." ACM Transactions on Information and System Security (TISSEC) 2.2 (1999): 159-176.