Publications --a selection  


Cyber-Physical Systems, Critical Infrastructures

  1. Jonathan Jenkins, Sean Easton, David Guidry, Mike Burmester, Xiuwen Liu, Xin Yuan, Joshua Lawrence, and Sereyvathana Ty. Trusted Group Key Management For Real-Time Critical Infrastructure Protection. IEEE Military and Commercial Communications Conference (MILCOM), November 2013, San Diego. Early draft (pdf version).
  2. Mike Burmester, Emmanouil Magkos, Vassilis Chrissikopoulos, T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability in Highly Dynamic Systems, IEEE Symposium on Computers and Communications (ISCC), July 2013, Split, Croatia. Early draft (pdf version).
  3. Mike Burmester. A Trusted Computing Architecture for Critical Infrastructure Protection. Fourth International Conference on Information, Intelligence, Systems and Applications, IISA 2013, Piraeus, Greece, July 2013. Early draft (pdf version).
  4. Mike Burmester. An Architecture for Trusted Clouds. DIMACS/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in Cloud (TAFC), June 2013, Málaga, Spain, Early draft (pdf version). Critical Infrastructure Panel (photo). Final Workshop Report (link).
  5. Jonathan Jenkins, Mike Burmester. Protecting infrastructure assets from real-time and run-time threats. Chapter 6, Critical Infrastructure Protection VII, 2013, Springer. Early draft (pdf version).
  6. Mike Burmester, Joshua Laurence, David Guidry, Sean Easton, Sereyvathana Ty, Xiuwen Liu, Xin Yan, and Jonathan Jenkins. Towards a Secure Electricity Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP (2013). Melbourne, Australia. Early draft. (pdf version)
  7. David Guidry, Mike Burmester, Xin Yuan, Xiuwen Liu, Jonathan Jenkins, and Sen Easton. Techniques for Securing Substation Automation Systems. In 7th International Workshop on Critical Information Infrastructures Security, CRITIS (2012). Lillehammer, Norway. Early draft. (pdf version)
  8. Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. Modeling security in cyber physical systems. Int. J. Critical Infrastructure Protection, Elsevier, 5(3-4), 118-126 (2012). Early draft. (pdf version)
  9. Mike Burmester, Emmanouil Magkos, and Vassilis Chrissikopoulos. Secure and Privacy-preserving, Timed Vehicular Communication. Int. J. Ad Hoc and Ubiquitous Computing, Inderscience, 10(4), 219-229 (2012) Early draft. (pdf version)