2014
DOI: 10.14257/ijsia.2014.8.3.20
|View full text |Cite
|
Sign up to set email alerts
|

Sequence Composition Analysis of Noninterference in Cyber-Physical System with Petri Net

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…For example, [7] establishes an attack model of CPS attack model by using Petri nets, and gives a hierarchical modeling method. [17] explains the analysis and verification issues in the CPS information security model, and Petri nets are used to model CPS information flow security attributes and their composition. The author in [16] constructs a CPS security model by using time automata, which includes components and their relationships, attackers and recovery mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…For example, [7] establishes an attack model of CPS attack model by using Petri nets, and gives a hierarchical modeling method. [17] explains the analysis and verification issues in the CPS information security model, and Petri nets are used to model CPS information flow security attributes and their composition. The author in [16] constructs a CPS security model by using time automata, which includes components and their relationships, attackers and recovery mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…There are various specification techniques of control processes [ 10 ], including Petri nets (PN) [ 11 , 12 , 13 ], statecharts [ 14 ] and diagrams of the Unified Modelling Language (UML) [ 15 , 16 ]. There are also some approaches to using these specification techniques in the domain of cyber-physical systems, such as [ 17 , 18 , 19 , 20 , 21 , 22 , 23 ]. Each specification technique has its advantages and disadvantages.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, authors also introduce how to perform this operation offline. In [5], Petri net is used as a formal tool for nondeterministic non-interference security model specification of cyber-physical system and is shown to be applicable to abstract pipeline distribution flow network system. A generalized Petri net model is presented in [6] to formulate the manufacturing processes, and a traceability model is automatically built by model transformation.…”
Section: Introductionmentioning
confidence: 99%