Index

0-9, and Symbols

μ TESLA-based schemes, 240–241
ent-diversity-based techniques
anonymity, 443
defined, 443
illustrated, 444

A

ABE (attribute-based encryption), 403, 758
abstraction transformations, 337
access classes, 577
access compatibility, 233
access control
administration, 575
binary decision diagrams, 589
concepts, 574–585
content-based, 578, 580–581
for critical infrastructures, 589–590
electronic health records (EHRs), 682–683
EXAM system, 586–587
fine-grained, 692–694
formal methods, 588
generic architecture, 574
Health Information Privacy and Sharing (HIPS), 686, 697

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.