Goitom K. WeldehawaryatNorwegian University of Life Sciences (NMBU)
Goitom K. Weldehawaryat
PhD
About
13
Publications
6,832
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
99
Citations
Publications
Publications (13)
System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against
security failure and attacks. Alongside the significant benefits of security assurance, the evolution of new information and communication technology...
The article [8] described the derivation and adaptation of the applied π-calculus to enable the integration of an explicit adversarial action model. In this, we had relied on earlier works by the authors as well as a contribution by Lanotte et al. [4,5]. Several additional and related contributions to the applied π-calculus may, however, also be no...
Cyber-Physical Systems (CPS) are distributed systems in which the state of the physical system is generally not observable in non-trivial cases, and where state transitions of this physical system can also occur without resulting in immediate changes to observable variables. This poses challenges for the bidirectional synchronisation of the discret...
Security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediateand enforce the security policy and are resilient against security failure and attacks. Alongside the significant benefits of securityassurance, the evolution of new information and communication technology (ICT) int...
Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication networks and systems for power utility automation in particular not only requires distributed processing, but in case of the gener...
The need for effective and efficient evaluation schemes of security assurance is growing in many organizations, especially Small and Medium Enterprises (SMEs). Although there are several approaches and standards for evaluating application security assurance, they are qualitative in nature and depend to a great extent on manually processing. This pa...
Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude of application domains. In this article, we examine the current state of obtained knowledge on military SDN by conducting a sy...
We consider a micro-grid architecture that is distributed in nature and reliant on renewable energy. In standard grid architectures, demand management is handled via scheduling protocols that are centrally coordinated. Centralised approaches are however computationally intensive, thus not suited to distributed grid architectures with limited comput...
The interdependence of critical infrastructures, particularly of information and telecommunication networks and systems and electrical power networks has been studied intensively employing a number of different methods ranging from semi-qualitative Leontief models via percolation models and related approaches from statistical physics to agent and g...
Consensus problems are of great interest in distributed systems research, especially in the presence of Byzantine faults. While asynchronous message passing is an interesting network model, Fischer, et al. [17] have shown that deterministic algorithms do not exist even for single faults, requiring the use of randomization as proposed by Ben-Or [6]....
While the fundamental problem of consensus in distrbuted systems has been studied extensively, this has mostly focused on shared-memory and to a lesser extent on asynchronous message-passing models. However, a natural extension is to consider the case of a asynchronous message-passing model over non-complete graphs. In this paper, we study the prob...