Software Security in Virtualized Infrastructures — The Smart Meter Example
نویسندگان
چکیده
منابع مشابه
Software Security in Virtualized Infrastructures
Future infrastructures for energy, traffic, and computing will be virtualized: they will consist of decentralized, self-organizing, dynamically adaptive, and open collections of physical resources such as virtual power plants or computing clouds. Challenges to software dependability, in particular software security will be enourmous. While the problems in this domain transcend any specific inst...
متن کاملSmart meter security: a survey
Europe’s smart metering initiative may be the largest engineering project ever undertaken in the region; it is significantly larger than the Channel Tunnel. The European Parliament mandated the replacement of electricity meters with new ‘smart’ meters by 2022, except in Member States who certify this year that it would be uneconomic. This project could cost over $100 billion, and will involve n...
متن کاملCloud Service Feature driven Security Policies for Virtualized Infrastructures
With the increasing maturity of various cloud service delivery models ( Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)) and deployment models (Private, Community, Public, Hybrid), the security risk profile of each cloud service configuration is coming into focus. In this paper, we take up the example of a Public Infrastructure as a Service (Iaas) ...
متن کاملSmart Meter: Applications, Security Issues and Challenges
The smart meter is an important intelligent device on the Smart Grid that has the capability to report information related to power consumption, billing and other significant readings. The protection of smart meter communications against attacks is essential to ensure reliable operations of the Smart Grid. In this paper, we give an overview of smart meter applications, and we discuss the securi...
متن کاملData protection in heterogeneous distributed systems: A smart meter example
Usage control is concerned with how data is used after access has been granted. Enforcement mechanisms have been implemented for distributed systems like web based social networks (WBSN) at various levels of abstraction. We extend data usage control to heterogeneous distributed systems by implementing a policy enforcement mechanism for a smart meter connected to a WBSN. The idea is to provide u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: it - Information Technology
سال: 2011
ISSN: 1611-2776
DOI: 10.1524/itit.2011.0636