메뉴 건너뛰기




Volumn 2 2 OF 2 VOL, Issue , 2005, Pages 847-856

Security measures in automation systems - A practice-oriented approach

Author keywords

[No Author keywords available]

Indexed keywords

ADD-ON SERVICE; AUTOMATION SYSTEMS; RESOURCE LIMITATIONS; SYSTEM LEVELS;

EID: 33847298654     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (37)
  • 1
    • 17744375662 scopus 로고    scopus 로고
    • C. Schwaiger and A. Treytl, Smart Card Based Security for Fieldbus Systems, 2003 IEEE Conference on Emerging Technologies and Factory Automation, Lisbon,16.-19. Sep. 2003, pp. 398-406, 2003.
    • C. Schwaiger and A. Treytl, "Smart Card Based Security for Fieldbus Systems", 2003 IEEE Conference on Emerging Technologies and Factory Automation, Lisbon,16.-19. Sep. 2003, pp. 398-406, 2003.
  • 2
    • 17744372555 scopus 로고    scopus 로고
    • A. Treytl, T. Sauter, and C. Schwaiger, Security Measures for Industrial Fieldbus Systems - State of the Art and Solutions for IP-based Approaches, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 201-209.
    • A. Treytl, T. Sauter, and C. Schwaiger, "Security Measures for Industrial Fieldbus Systems - State of the Art and Solutions for IP-based Approaches", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 201-209.
  • 3
    • 0033284577 scopus 로고    scopus 로고
    • M. Knizak, M. Kunes, M. Manninger, and T. Sauter, Modular Agent Design for Fieldbus Management, IEEE International Conference on Emerging Technologies and Factory Automation, Barcelona, 18.-21. Oct. 1999, pp. 857-864.
    • M. Knizak, M. Kunes, M. Manninger, and T. Sauter, "Modular Agent Design for Fieldbus Management", IEEE International Conference on Emerging Technologies and Factory Automation", Barcelona, 18.-21. Oct. 1999, pp. 857-864.
  • 4
    • 0030714531 scopus 로고    scopus 로고
    • Network security considerations in TCP/IP-based manufacturing automation
    • M.S. DePriest, Network security considerations in TCP/IP-based manufacturing automation", ISA Transactions, vol. 36, no. 1, 1997, pp. 37-48.
    • (1997) ISA Transactions , vol.36 , Issue.1 , pp. 37-48
    • DePriest, M.S.1
  • 9
    • 84890787673 scopus 로고    scopus 로고
    • E. Byres, J. Lowe, The Myths and Facts behind Cyber Security Risks for Industrial Control Systems, VDE Kongress 2004, Berlin, pp. 213-218.
    • E. Byres, J. Lowe, "The Myths and Facts behind Cyber Security Risks for Industrial Control Systems", VDE Kongress 2004, Berlin, pp. 213-218.
  • 10
    • 0009954130 scopus 로고    scopus 로고
    • R. Roger and S. Meyers Eds, Sams.net Publishing
    • R. Roger and S. Meyers (Eds.), "Maximum Security", Sams.net Publishing, 1997.
    • (1997) Maximum Security
  • 12
    • 17744367485 scopus 로고    scopus 로고
    • A.C. Weaver, Enforcing Distributed Data Security via Web Services, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 397-402.
    • A.C. Weaver, "Enforcing Distributed Data Security via Web Services", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 397-402.
  • 13
    • 17744370175 scopus 로고    scopus 로고
    • Maintenance Portals in Automation Networks - Requirements, Structures and Model for Web-based Solutions
    • M. Wollschlaeger, T. Bangemann, "Maintenance Portals in Automation Networks - Requirements, Structures and Model for Web-based Solutions", WFCS 2004, pp. 193-199.
    • (2004) WFCS , pp. 193-199
    • Wollschlaeger, M.1    Bangemann, T.2
  • 14
    • 22444432757 scopus 로고    scopus 로고
    • Hacker jailed for revenge sewage attacks [online]
    • Oktober, available at
    • T. Smith, "Hacker jailed for revenge sewage attacks" [online]. The Register, 31. Oktober 2001 [available at] http://www.theregister. co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/
    • (2001) The Register , vol.31
    • Smith, T.1
  • 16
    • 84890792263 scopus 로고    scopus 로고
    • Auguste Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, IX, pp. 5-38, Janvier 1883, pp. 161-191, Février 1883.
    • Auguste Kerckhoffs, "La cryptographie militaire", Journal des sciences militaires, vol. IX, pp. 5-38, Janvier 1883, pp. 161-191, Février 1883.
  • 17
    • 84890798779 scopus 로고    scopus 로고
    • SELMA, Project for secure electronic metering data interchange, Available at
    • SELMA - Project for secure electronic metering data interchange, 2003. [Available at] http://www.selma-project.de
    • (2003)
  • 18
    • 17744364928 scopus 로고    scopus 로고
    • A. Treytl, N. Roberts, G.P. Hancke, Security Architecture for Power-line Metering System, IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 393-396.
    • A. Treytl, N. Roberts, G.P. Hancke, "Security Architecture for Power-line Metering System", IEEE International Workshop on Factory Communication Systems (WFCS), Wien, 22.-24. Sep. 2004, pp. 393-396.
  • 21
    • 3543146378 scopus 로고    scopus 로고
    • Firewall technologies
    • vo
    • R. Zalenski, "Firewall technologies", IEEE Potentials, vo. 21, no. 1, 2002, pp. 24-29.
    • (2002) IEEE Potentials , vol.21 , Issue.1 , pp. 24-29
    • Zalenski, R.1
  • 24
    • 84890795752 scopus 로고    scopus 로고
    • Virtual Private Infrastructure (VPI) Initiative - An Industry Consortium for Unified and Secure Web Control with Embedded Devices
    • A. Sikora, P. Brügger, "Virtual Private Infrastructure (VPI) Initiative - An Industry Consortium for Unified and Secure Web Control with Embedded Devices", ETFA 2003, vol. 1, pp. 288-291.
    • (2003) ETFA , vol.1 , pp. 288-291
    • Sikora, A.1    Brügger, P.2
  • 26
    • 84890795786 scopus 로고    scopus 로고
    • T. Dierks and C. Allen, RFC 2246: The TLS Protocol, Version 1.0. The Internet Society, January 1999, Available at
    • T. Dierks and C. Allen, "RFC 2246: The TLS Protocol", Version 1.0. The Internet Society, January 1999. [Available at] http://www.rfc-editor.org.
  • 30
    • 84890789024 scopus 로고    scopus 로고
    • E. Rescorla, RFC 2818: HTTP Over TLS, The Internet Society, May 2000. [Available at] http://www.rfc-editor.org
    • E. Rescorla, "RFC 2818: HTTP Over TLS", The Internet Society, May 2000. [Available at] http://www.rfc-editor.org
  • 31
    • 84890807163 scopus 로고    scopus 로고
    • J. Hodges, R. Morgan, M. Wahl, RFC 2830: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security, The Internet Society, May 2000. [Available at] http://www.rfc-editor.org.
    • J. Hodges, R. Morgan, M. Wahl, "RFC 2830: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security", The Internet Society, May 2000. [Available at] http://www.rfc-editor.org.
  • 32
    • 84890793678 scopus 로고    scopus 로고
    • U. Blumenthal and B. Wijnen, RFC 2574: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), The Internet Society, April 1999. [Available at] http://www.rfc-editor.org.
    • U. Blumenthal and B. Wijnen, "RFC 2574: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", The Internet Society, April 1999. [Available at] http://www.rfc-editor.org.
  • 33
    • 84890804302 scopus 로고    scopus 로고
    • W3C, SOAP Version 1.2 Part 0: Primer, W3C Recommendation 24 June 2003, Available at
    • W3C, "SOAP Version 1.2 Part 0: Primer", W3C Recommendation 24 June 2003, [Available at] http://www.w3.org/TR/soap12-part0/
  • 34
    • 84890805346 scopus 로고    scopus 로고
    • Franks et al., RFC 2617, HTTP Authentication: Basic and Digest Access Authentication, The Internet Society, June 1999. [Available at] http://www.rfc-editor.org.
    • Franks et al., "RFC 2617, HTTP Authentication: Basic and Digest Access Authentication", The Internet Society, June 1999. [Available at] http://www.rfc-editor.org.
  • 35
    • 84890789041 scopus 로고    scopus 로고
    • HTTP Digest Authentication in Embedded Automation Systems
    • T.P. von Hoff, M. Crevatin, "HTTP Digest Authentication in Embedded Automation Systems", ETFA 2003, vol. 1, pp. 390-397.
    • (2003) ETFA , vol.1 , pp. 390-397
    • von Hoff, T.P.1    Crevatin, M.2
  • 36
    • 1942532238 scopus 로고    scopus 로고
    • XML-Based Specification for Web Services Document Security
    • R. Bhatti, E. Bertino, A. Ghafoor, J.B.D. Joshi, "XML-Based Specification for Web Services Document Security", IEEE Computer, 2004, pp. 41-49.
    • (2004) IEEE Computer , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.B.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.