O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

0-9, and Symbols

μ TESLA-based schemes, 240–241
ent-diversity-based techniques
anonymity, 443
defined, 443
illustrated, 444

A

ABE (attribute-based encryption), 403, 758
abstraction transformations, 337
access classes, 577
access compatibility, 233
access control
administration, 575
binary decision diagrams, 589
concepts, 574–585
content-based, 578, 580–581
for critical infrastructures, 589–590
electronic health records (EHRs), 682–683
EXAM system, 586–587
fine-grained, 692–694
formal methods, 588
generic architecture, 574
Health Information Privacy and Sharing (HIPS), 686, 697

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required