Ahrens J, Hendrickson B, Long G, Miller S, Ross R, Williams D (2011) Data-intensive science in the US DOE: case studies and future challenges. Comput Sci Eng 13(6):14–24
Article
Google Scholar
Álvarez A, Ioannidis S, Schlehuber C, Rodríguez F, Vallero V (2017) CIPSEC Project [Online]. https://upcommons.upc.edu/handle/2117/106378
Bastow MD (2014) Cyber security of the railway signalling & control system. IRSE ASPECT
Bloomfield R, Bendele M, Bishop P, Stroud R, Tonks S (2016) The risk assessment of ERTMS-based railway systems from a cyber security perspective: methodology and lessons learned. In: International conference on reliability, safety and security of railway systems. Springer, pp 3–19
Bullock A (1999) Space: spatial access control for collaborative virtual environments. Doctoral dissertation, University of Nottingham
Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233
Article
Google Scholar
Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston
Google Scholar
CARONTE project: creating an agenda for research on transportation security. In: CIT2016—XII Congreso de Ingeniería del Transporte, València, Universitat Politècnica de València (2016)
Chernov AV, Butakova MA, Karpenko EV (2015) Security incident detection technique for multilevel intelligent control systems on railway transport in Russia. In: 23rd Telecommunications forum telfor (TELFOR), 2015. IEEE, pp 1–4
Covington MJ, Long W, Srinivasan S, DEV AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies 2001. ACM, pp 10–20
Donaldson S, Siegel S, Williams CK, Aslam A (2015) Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. Apress, New York
Book
Google Scholar
Edwards WK (1996) Policies and roles in collaborative applications. In: Proceedings of the 1996 ACM conference on computer supported cooperative work 1996. ACM, pp 11–20
ENISA (2015) Cyber security and resilience of intelligent public transport. Good practices and recommendations, European Union Agency for Network and Information Security. https://www.enisa.europa.eu/publications/good-practices-recommendations. Accessed 25 Feb 2018
Fischer EA (2016) Cybersecurity issues and challenges: in brief. Congressional research service
CSA Top Threats Working Group (2016) The treacherous 12: cloud computing top threats in 2016. Cloud Security Alliance (CSA), Feb
Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of “big data” on cloud computing: review and open research issues. Inf Syst 47:98–115
Article
Google Scholar
ISO/IEC (2007) 27001:2005, Information technology—security techniques—information security management systems—requirements
Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: Eighth IEEE international conference on dependable, autonomic and secure computing, 2009, DASC’09. IEEE, pp 711–716
Karim R (2008) A service-oriented approach to e-maintenance of complex technical systems (Doctoral dissertation, Luleå tekniska universitet)
Katal A, Wazid M, Goudar RH (2013) Big data: issues, challenges, tools and good practices. In: Sixth international conference on contemporary computing (IC3), 2013. IEEE, pp 404–409
Kissel R (2013) Glossary of key information security terms. NIST Interagency Reports NIST IR, 7298(3)
Kostopoulos G (2017) Cyberspace and cybersecurity. CRC Press, Boca Raton
Google Scholar
Kotenko IVE, Saenko IB, Chernov AV, Butakova MA (2013) The construction of a multi-level intelligent information security system for automated systems of railway transport. Trudy SPIIRAN 30:7–25
Google Scholar
Kumar V, Srivastava J, Lazarevic A (eds) (2006) Managing cyber threats: issues, approaches, and challenges, vol 5. Springer, Berlin
Google Scholar
Levy-Bencheton C, Darra E (2015) Cyber security and resilience of intelligent public transport: good practices and recommendations. ENISA, Heraklion
Lin HY, Tzeng WG (2012) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995–1003
Article
Google Scholar
Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing—The business perspective. Decis Support Syst 51(1):176–189
Article
Google Scholar
Masson É, Gransart C (2017) Cyber security for railways–a huge challenge–Shift2Rail perspective. In: International workshop on communication technologies for vehicles. Springer, Cham, pp 97–104
Matt B (2006) Introduction to computer security. Pearson Education India
Nagurney A, Daniele P, Shukla S (2017) A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints. Ann Oper Res 248(1–2):405–427
MathSciNet
Article
MATH
Google Scholar
Nowakowski W, Bojarczak P, Łukasik Z (2017) Performance analysis of data security algorithms used in the railway traffic control systems. In: International conference on information and digital technologies (IDT), 2017. IEEE, pp 281–287
Priscoli FD, Giorgio AD, Esposito M, Fiaschetti A, Flammini F, Mignanti S, Pragliola C (2017) Ensuring cyber-security in smart railway surveillance with SHIELD. Int J Crit Comput Based Syst 7(2):138–170
Article
Google Scholar
PROTECTRAIL (2014) Key Lessons for the Railway Sector on PROTECTRAIL Security Architecture, White Paper
Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48
Article
Google Scholar
SECRET (2015) Security of railways against electromagnetic attacks, White Paper
SECUR-ED (2014) SECured URban transportation–European Demonstration, White Paper
Shi H (2014) Railway information sharing platform security requirements analysis. In: ICLEM 2014: system planning, supply chain management, and safety. pp 1116–1121
Smith M, Szongott C, Henne B, Von Voigt G (2012) Big data privacy issues in public social media. In: 6th IEEE international conference on digital ecosystems technologies (DEST), 2012. IEEE, pp 1–6
Söderholm P, Karim R (2010) An enterprise risk management framework for evaluation of eMaintenance. Int J Syst Assur Eng Manag 1(3):219
Article
Google Scholar
Thales (2016) Cybersecurity for rail: not a single-shot approach, applying the NIST approach to rail transportation, White Paper
The Local (2017) https://www.thelocal.se/20171012/swedish-transport-agencies-targeted-in-cyber-attack. Accessed 11 Jan 2018
Thomas RK (1997) Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the second ACM workshop on role-based access control 1997. ACM, pp 13–19
Thomas RK, Sandhu RS (1998) Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. Database security XI. Springer, Berlin, pp 166–181
Google Scholar
Tolone W, Ahn G, Pai T, Hong S (2005) Access control in collaborative systems. ACM Comput Surv (CSUR) 37(1):29–41
Article
Google Scholar
Wegner A, Graham J, Ribble E (2017) A new approach to cyberphysical security in industry 4.0. In: Thames L, Schaefer D (eds) Cybersecurity for industry 4.0. Springer, Berlin, pp 59–72
Chapter
Google Scholar
Wijesekera D, Jajodia S (2003) A propositional policy algebra for access control. ACM Trans Inf Syst Secur (TISSEC) 6(2):286–325
Article
Google Scholar
Willett KD (2008) Information assurance architecture. CRC Press, Boca Raton
Book
Google Scholar
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: proceedings IEEE Infocom, 2010. IEEE, pp 1–9
Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192–1202
Article
Google Scholar
Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583–592
Article
Google Scholar