{"id":"https://openalex.org/W2056176571","doi":"https://doi.org/10.1145/1619258.1619276","title":"Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems","display_name":"Modular over-the-wire configurable security for long-lived critical infrastructure monitoring systems","publication_year":2009,"publication_date":"2009-07-06","ids":{"openalex":"https://openalex.org/W2056176571","doi":"https://doi.org/10.1145/1619258.1619276","mag":"2056176571"},"language":"en","primary_location":{"id":"doi:10.1145/1619258.1619276","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1619258.1619276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third ACM International Conference on Distributed Event-Based Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085432651","display_name":"Erik Solum","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Erik Solum","raw_affiliation_strings":["Washington State University, Pullman"],"affiliations":[{"raw_affiliation_string":"Washington State University, Pullman","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002873584","display_name":"Carl Hauser","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl Hauser","raw_affiliation_strings":["Washington State University, Pullman"],"affiliations":[{"raw_affiliation_string":"Washington State University, Pullman","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040842225","display_name":"Rasika Chakravarthy","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rasika Chakravarthy","raw_affiliation_strings":["Washington State University, Pullman"],"affiliations":[{"raw_affiliation_string":"Washington State University, Pullman","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111431329","display_name":"D.E. Bakken","orcid":null},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dave Bakken","raw_affiliation_strings":["Washington State University, Pullman"],"affiliations":[{"raw_affiliation_string":"Washington State University, Pullman","institution_ids":["https://openalex.org/I72951846"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085432651"],"corresponding_institution_ids":["https://openalex.org/I72951846"],"apc_list":null,"apc_paid":null,"fwci":5.2869,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.9576512,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7375404834747314},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6370250582695007},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.568845272064209},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5337570309638977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5192415714263916},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5079708695411682},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5008420944213867},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4772084355354309},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4666934609413147},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.444701611995697},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4303743541240692},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4249882102012634},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.41525983810424805},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.26075810194015503},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.18719199299812317},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15176764130592346},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09373652935028076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7375404834747314},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6370250582695007},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.568845272064209},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5337570309638977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5192415714263916},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5079708695411682},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5008420944213867},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4772084355354309},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4666934609413147},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.444701611995697},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4303743541240692},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4249882102012634},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.41525983810424805},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.26075810194015503},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.18719199299812317},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15176764130592346},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09373652935028076},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1619258.1619276","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1619258.1619276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third ACM International Conference on Distributed Event-Based Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1696988310","display_name":null,"funder_award_id":"CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G6184503365","display_name":null,"funder_award_id":"CNS 05-24695 (CT-CS: Trustworthy Cyber Infrastructure for the Power Grid (TCIP))","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338354","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W47288598","https://openalex.org/W1156332219","https://openalex.org/W1527701244","https://openalex.org/W1530975225","https://openalex.org/W1558317064","https://openalex.org/W1570879214","https://openalex.org/W1964656484","https://openalex.org/W1978338995","https://openalex.org/W2010939995","https://openalex.org/W2018330445","https://openalex.org/W2027340820","https://openalex.org/W2096302206","https://openalex.org/W2113892728","https://openalex.org/W2146749986","https://openalex.org/W2250579314","https://openalex.org/W2733133902","https://openalex.org/W2916086000","https://openalex.org/W2972026645","https://openalex.org/W4254644153","https://openalex.org/W6775821356"],"related_works":["https://openalex.org/W2365099716","https://openalex.org/W2085142160","https://openalex.org/W2020796848","https://openalex.org/W2167911131","https://openalex.org/W2039419108","https://openalex.org/W1502833256","https://openalex.org/W1814578808","https://openalex.org/W2112397448","https://openalex.org/W2189488096","https://openalex.org/W4238669181"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,102],"modular,":[4],"software-based,":[5],"over-the-wire":[6],"configurable,":[7],"end-to-end":[8],"security":[9,37,48,76],"architecture":[10,17,49],"for":[11,54,60,79,85],"critical":[12],"infrastructure":[13],"monitoring":[14],"systems.":[15],"The":[16,66],"provides":[18,71],"mechanisms":[19],"allowing":[20,36],"it":[21],"to":[22,39],"evolve,":[23],"during":[24],"operation,":[25],"over":[26],"the":[27,80,90,93],"long":[28,99],"lifetimes":[29],"typically":[30],"encountered":[31],"in":[32,89],"these":[33,51],"systems":[34],"by":[35],"modules":[38,59,70],"be":[40],"securely":[41],"added":[42],"and":[43,64,75,78],"replaced":[44],"at":[45],"runtime.":[46],"Our":[47],"addresses":[50],"systems'":[52],"need":[53],"high-performance":[55],"secure":[56,103],"multi-cast":[57],"with":[58],"confidentiality,":[61],"integrity,":[62],"authentication,":[63],"obfuscation.":[65],"variety":[67],"of":[68,92],"available":[69],"tradeoffs":[72],"between":[73],"performance":[74,83],"now":[77],"future.":[81],"Experimental":[82],"results":[84],"various":[86],"existing":[87],"modules,":[88],"context":[91],"architecture,":[94],"are":[95],"presented.":[96],"To":[97],"achieve":[98],"system":[100],"lifetime":[101],"management":[104],"system,":[105],"using":[106],"protocols":[107],"based":[108],"on":[109],"symmetric-key":[110],"cryptography,":[111],"is":[112],"described.":[113]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
