-
1
-
-
17744375662
-
-
C. Schwaiger and A. Treytl, Smart Card Based Security for Fieldbus Systems, 2003 IEEE Conference on Emerging Technologies and Factory Automation, Lisbon,16.-19. Sep. 2003, pp. 398-406, 2003.
-
C. Schwaiger and A. Treytl, "Smart Card Based Security for Fieldbus Systems", 2003 IEEE Conference on Emerging Technologies and Factory Automation, Lisbon,16.-19. Sep. 2003, pp. 398-406, 2003.
-
-
-
-
2
-
-
17744372555
-
-
A. Treytl, T. Sauter, and C. Schwaiger, Security Measures for Industrial Fieldbus Systems - State of the Art and Solutions for IP-based Approaches, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 201-209.
-
A. Treytl, T. Sauter, and C. Schwaiger, "Security Measures for Industrial Fieldbus Systems - State of the Art and Solutions for IP-based Approaches", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 201-209.
-
-
-
-
3
-
-
0033284577
-
-
M. Knizak, M. Kunes, M. Manninger, and T. Sauter, Modular Agent Design for Fieldbus Management, IEEE International Conference on Emerging Technologies and Factory Automation, Barcelona, 18.-21. Oct. 1999, pp. 857-864.
-
M. Knizak, M. Kunes, M. Manninger, and T. Sauter, "Modular Agent Design for Fieldbus Management", IEEE International Conference on Emerging Technologies and Factory Automation", Barcelona, 18.-21. Oct. 1999, pp. 857-864.
-
-
-
-
4
-
-
0030714531
-
Network security considerations in TCP/IP-based manufacturing automation
-
M.S. DePriest, Network security considerations in TCP/IP-based manufacturing automation", ISA Transactions, vol. 36, no. 1, 1997, pp. 37-48.
-
(1997)
ISA Transactions
, vol.36
, Issue.1
, pp. 37-48
-
-
DePriest, M.S.1
-
8
-
-
0036949728
-
Security Strategies for Field Area Networks
-
Nov
-
C. Schwaiger and T. Sauter, "Security Strategies for Field Area Networks", 28th Annual Conference of the IEEE Industrial Electronics Society (IECON), Sevilla, S.-S. Nov. 2002, pp. 2915-2920.
-
(2002)
28th Annual Conference of the IEEE Industrial Electronics Society (IECON), Sevilla, S.-S
, pp. 2915-2920
-
-
Schwaiger, C.1
Sauter, T.2
-
9
-
-
84890787673
-
-
E. Byres, J. Lowe, The Myths and Facts behind Cyber Security Risks for Industrial Control Systems, VDE Kongress 2004, Berlin, pp. 213-218.
-
E. Byres, J. Lowe, "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE Kongress 2004, Berlin, pp. 213-218.
-
-
-
-
10
-
-
0009954130
-
-
R. Roger and S. Meyers Eds, Sams.net Publishing
-
R. Roger and S. Meyers (Eds.), "Maximum Security", Sams.net Publishing, 1997.
-
(1997)
Maximum Security
-
-
-
12
-
-
17744367485
-
-
A.C. Weaver, Enforcing Distributed Data Security via Web Services, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 397-402.
-
A.C. Weaver, "Enforcing Distributed Data Security via Web Services", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 397-402.
-
-
-
-
13
-
-
17744370175
-
Maintenance Portals in Automation Networks - Requirements, Structures and Model for Web-based Solutions
-
M. Wollschlaeger, T. Bangemann, "Maintenance Portals in Automation Networks - Requirements, Structures and Model for Web-based Solutions", WFCS 2004, pp. 193-199.
-
(2004)
WFCS
, pp. 193-199
-
-
Wollschlaeger, M.1
Bangemann, T.2
-
14
-
-
22444432757
-
Hacker jailed for revenge sewage attacks [online]
-
Oktober, available at
-
T. Smith, "Hacker jailed for revenge sewage attacks" [online]. The Register, 31. Oktober 2001 [available at] http://www.theregister. co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/
-
(2001)
The Register
, vol.31
-
-
Smith, T.1
-
16
-
-
84890792263
-
-
Auguste Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, IX, pp. 5-38, Janvier 1883, pp. 161-191, Février 1883.
-
Auguste Kerckhoffs, "La cryptographie militaire", Journal des sciences militaires, vol. IX, pp. 5-38, Janvier 1883, pp. 161-191, Février 1883.
-
-
-
-
17
-
-
84890798779
-
-
SELMA, Project for secure electronic metering data interchange, Available at
-
SELMA - Project for secure electronic metering data interchange, 2003. [Available at] http://www.selma-project.de
-
(2003)
-
-
-
18
-
-
17744364928
-
-
A. Treytl, N. Roberts, G.P. Hancke, Security Architecture for Power-line Metering System, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 393-396.
-
A. Treytl, N. Roberts, G.P. Hancke, "Security Architecture for Power-line Metering System", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 393-396.
-
-
-
-
21
-
-
3543146378
-
Firewall technologies
-
vo
-
R. Zalenski, "Firewall technologies", IEEE Potentials, vo. 21, no. 1, 2002, pp. 24-29.
-
(2002)
IEEE Potentials
, vol.21
, Issue.1
, pp. 24-29
-
-
Zalenski, R.1
-
22
-
-
1442280190
-
Architecture for Web-based services integration
-
Roanoke
-
V. Kapsalis, K. Charatsis, M. Georgoudakis, G. Papadopoulos, "Architecture for Web-based services integration," in Proc. 29th Annual Conference of the IEEE Industrial Electronics Society Vol. 1, Roanoke, 2003, pp. 866-871.
-
(2003)
Proc. 29th Annual Conference of the IEEE Industrial Electronics Society
, vol.1
, pp. 866-871
-
-
Kapsalis, V.1
Charatsis, K.2
Georgoudakis, M.3
Papadopoulos, G.4
-
23
-
-
0030086382
-
Role Based Access Control Models
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, C. E.Youman, "Role Based Access Control Models", IEEE Computers, vol.29, 1996, pp. 38-47
-
(1996)
IEEE Computers
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
84890795752
-
Virtual Private Infrastructure (VPI) Initiative - An Industry Consortium for Unified and Secure Web Control with Embedded Devices
-
A. Sikora, P. Brügger, "Virtual Private Infrastructure (VPI) Initiative - An Industry Consortium for Unified and Secure Web Control with Embedded Devices", ETFA 2003, vol. 1, pp. 288-291.
-
(2003)
ETFA
, vol.1
, pp. 288-291
-
-
Sikora, A.1
Brügger, P.2
-
25
-
-
33847253596
-
-
The Cisco Press
-
C. Paquet, W. Saxe, "Business Case for Network Security: Advocacy, Governance, and ROI", The Cisco Press, 2004.
-
(2004)
Business Case for Network Security: Advocacy, Governance, and ROI
-
-
Paquet, C.1
Saxe, W.2
-
26
-
-
84890795786
-
-
T. Dierks and C. Allen, RFC 2246: The TLS Protocol, Version 1.0. The Internet Society, January 1999, Available at
-
T. Dierks and C. Allen, "RFC 2246: The TLS Protocol", Version 1.0. The Internet Society, January 1999. [Available at] http://www.rfc-editor.org.
-
-
-
-
30
-
-
84890789024
-
-
E. Rescorla, RFC 2818: HTTP Over TLS, The Internet Society, May 2000. [Available at] http://www.rfc-editor.org
-
E. Rescorla, "RFC 2818: HTTP Over TLS", The Internet Society, May 2000. [Available at] http://www.rfc-editor.org
-
-
-
-
31
-
-
84890807163
-
-
J. Hodges, R. Morgan, M. Wahl, RFC 2830: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security, The Internet Society, May 2000. [Available at] http://www.rfc-editor.org.
-
J. Hodges, R. Morgan, M. Wahl, "RFC 2830: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security", The Internet Society, May 2000. [Available at] http://www.rfc-editor.org.
-
-
-
-
32
-
-
84890793678
-
-
U. Blumenthal and B. Wijnen, RFC 2574: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), The Internet Society, April 1999. [Available at] http://www.rfc-editor.org.
-
U. Blumenthal and B. Wijnen, "RFC 2574: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", The Internet Society, April 1999. [Available at] http://www.rfc-editor.org.
-
-
-
-
33
-
-
84890804302
-
-
W3C, SOAP Version 1.2 Part 0: Primer, W3C Recommendation 24 June 2003, Available at
-
W3C, "SOAP Version 1.2 Part 0: Primer", W3C Recommendation 24 June 2003, [Available at] http://www.w3.org/TR/soap12-part0/
-
-
-
-
34
-
-
84890805346
-
-
Franks et al., RFC 2617, HTTP Authentication: Basic and Digest Access Authentication, The Internet Society, June 1999. [Available at] http://www.rfc-editor.org.
-
Franks et al., "RFC 2617, HTTP Authentication: Basic and Digest Access Authentication", The Internet Society, June 1999. [Available at] http://www.rfc-editor.org.
-
-
-
-
35
-
-
84890789041
-
HTTP Digest Authentication in Embedded Automation Systems
-
T.P. von Hoff, M. Crevatin, "HTTP Digest Authentication in Embedded Automation Systems", ETFA 2003, vol. 1, pp. 390-397.
-
(2003)
ETFA
, vol.1
, pp. 390-397
-
-
von Hoff, T.P.1
Crevatin, M.2
-
36
-
-
1942532238
-
XML-Based Specification for Web Services Document Security
-
R. Bhatti, E. Bertino, A. Ghafoor, J.B.D. Joshi, "XML-Based Specification for Web Services Document Security", IEEE Computer, 2004, pp. 41-49.
-
(2004)
IEEE Computer
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.B.D.4
-
37
-
-
0003406377
-
-
2nd ed, Prentice Hall PTR
-
Naganand Doraswamy, Dan Harkins, "IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks", 2nd ed., Prentice Hall PTR, 2003
-
(2003)
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
-
-
Doraswamy, N.1
Harkins, D.2
|