Team for Research in
Ubiquitous Secure Technology

Critical Infrastructure Protection and Privacy-Aware Design
Stephen Wicker

Citation
Stephen Wicker. "Critical Infrastructure Protection and Privacy-Aware Design". Talk or presentation, 29, November, 2009.

Abstract
During this talk I will discuss recent advances in sensor networking and their potential for monitoring, controlling, and securing physical infrastructure. As part of this presentation I will discuss current efforts to secure and control the U.S. electrical power grid. I will then present a series of design rules for exploiting these new technologies while minimizing the potential threat to privacy. I will conclude with a brief outline of the ethical and pedagogical implications of these design rules.

Electronic downloads

  • 5%20-%20Wicker.pptx · application/vnd.openxmlformats-officedocument.presentationml.pre · 425 kbytes
Citation formats  
  • HTML
    Stephen Wicker. <a
    href="http://www.truststc.org/pubs/635.html"
    ><i>Critical Infrastructure Protection and
    Privacy-Aware Design</i></a>, Talk or
    presentation,  29, November, 2009.
  • Plain text
    Stephen Wicker. "Critical Infrastructure Protection and
    Privacy-Aware Design". Talk or presentation,  29,
    November, 2009.
  • BibTeX
    @presentation{Wicker09_CriticalInfrastructureProtectionPrivacyAwareDesign,
        author = {Stephen Wicker},
        title = {Critical Infrastructure Protection and
                  Privacy-Aware Design},
        day = {29},
        month = {November},
        year = {2009},
        abstract = {During this talk I will discuss recent advances in
                  sensor networking and their potential for
                  monitoring, controlling, and securing physical
                  infrastructure. As part of this presentation I
                  will discuss current efforts to secure and control
                  the U.S. electrical power grid. I will then
                  present a series of design rules for exploiting
                  these new technologies while minimizing the
                  potential threat to privacy. I will conclude with
                  a brief outline of the ethical and pedagogical
                  implications of these design rules.},
        URL = {http://www.truststc.org/pubs/635.html}
    }
    

Posted by Larry Rohrbough on 5 Nov 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.