{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:32:06Z","timestamp":1755599526881,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754936","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000143-000148","source":"Crossref","is-referenced-by-count":12,"title":["T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems"],"prefix":"10.1109","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[]},{"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]},{"given":"Vassilis","family":"Chrissikopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"An architecture for differentiated services","volume":"2475","author":"blake","year":"1998","journal-title":"RFC"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8128-6_16"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.2.1.27-38"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.1"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"21","article-title":"Resource reservation protocol (RSVP)-Version 1 message processing rules","volume":"2209","author":"braden","year":"1997","journal-title":"RFC"},{"key":"20","article-title":"Integrated services in the internet architecture: An overview","volume":"1633","author":"shenker","year":"1994","journal-title":"RFC"},{"journal-title":"Power Systems Management and Associated Information Exchange-Data and Communications Security","year":"0","key":"22"},{"journal-title":"Communication Networks and Systems for Power Utility Automation","year":"0","key":"23"},{"journal-title":"Trusted Network Connect Architecture for Interoperability","year":"2008","key":"24"},{"key":"25","article-title":"Techniques for securing substation automation systems","author":"guidry","year":"2012","journal-title":"7th Int Workshop on Crit Inform Infrastr Secur (CRITIS 2012)"},{"journal-title":"Cisco and SISCO Collaborate on Open Source Synchrophasor Framework","year":"2011","key":"26"},{"key":"27","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","article-title":"Challenges and research directions in medical cyber-physical systems","volume":"100","author":"lee","year":"2012","journal-title":"Proc IEEE"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1213\/01.ane.0000204385.01983.61"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"3","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-0-387-88523-0_6","article-title":"Towards a taxonomy of attacks against energy control systems","volume":"290","author":"fleury","year":"2009","journal-title":"Critical Infrastructure Protection II"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"1","article-title":"Cyber security for smart grid, cryptography, and privacy","volume":"2011","author":"swapna","year":"2011","journal-title":"International Journal of Digital Multimedia Broadcasting"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Secure Computer System Unified Exposition and Multics Interpretation"},{"journal-title":"Diagnosis and Fault-Tolerant Control","year":"2006","author":"blanke","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.08.002"},{"key":"4","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"cardenas","year":"2011","journal-title":"6th ACM Symp on In! Compo and Comm Sec ACM"},{"journal-title":"Department of Defense Trusted Computer System Evaluation Criteria","year":"1986","author":"latham","key":"9"},{"journal-title":"Integrity Considerations for Secure Computer Systems","year":"1977","author":"biba","key":"8"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754936.pdf?arnumber=6754936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T04:02:18Z","timestamp":1565236938000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754936","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}