메뉴 건너뛰기




Volumn 2, Issue 3, 2008, Pages 31-40

Cryptographic key management for SCADA systems, issues and: Perspectives

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC KEY MANAGEMENT; RESEARCH DIRECTIONS; SYSTEMS ENVIRONMENT; TECHNICAL PROPERTIES;

EID: 84858163848     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (42)
  • 1
    • 84858204063 scopus 로고    scopus 로고
    • Securing Scada Systems
    • (1st ed.) ISBN 0764597876
    • Ronald L. Krutz, Securing Scada Systems (1st ed.), John Wiley & Sons, 2005, ISBN 0764597876, 1-22.
    • (2005) John Wiley & Sons , pp. 1-22
    • Krutz, R.L.1
  • 3
    • 29944439716 scopus 로고    scopus 로고
    • Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification
    • IEC (International Electrotechnical Commission), Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification, 2007
    • (2007) IEC., (International Electrotechnical Commission)
  • 8
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. Needham, M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers" Communications of the ACM, Vol. 21, pp. 993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 9
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • G. Lowe, " An attack on the Needham-Schroeder public key authentication protocol" , Information Processing Letters, vol. 56(3), pp. 131-136, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 10
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • B. C. Neuman, Theodore Ts'o, " Kerberos: An Authentication Service for Computer Networks" , IEEE Communications, volume 32/9, 33-38, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Theodore, T.2
  • 13
    • 84889697750 scopus 로고    scopus 로고
    • ITU., (International Telecommunication Union), " Information Technology - Open Systems Interconnection -The Directory: Authentication Framework" , ITU-T., Recommendation, X., 509
    • ITU (International Telecommunication Union), " Information Technology - Open Systems Interconnection -The Directory: Authentication Framework" , ITU-T Recommendation X.509, 2005.
    • (2005)
  • 14
    • 84889712471 scopus 로고    scopus 로고
    • I.E.T.F., PKIX., Charter Requests For Comments (RFCs)
    • IETF, PKIX Charter Requests For Comments (RFCs), http://www.ietf.org/html.charters/pkix-charter.html
  • 15
    • 84889751050 scopus 로고    scopus 로고
    • X509 Style Guide, October
    • P. Gutmann, X509 Style Guide, October 2000, http://www.cs.auckland.ac.nz/~pgut001/
    • (2000)
    • Gutmann, P.1
  • 17
    • 84889695385 scopus 로고    scopus 로고
    • Everything you never wanted to know about PKI but have been forced to find out
    • P. Gutmann, "Everything you never wanted to know about PKI but have been forced to find out", 2001, http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf
    • (2001)
    • Gutmann, P.1
  • 20
    • 84889720809 scopus 로고    scopus 로고
    • DNP., User Group, Secure DNP3 specifications, DNP., User Group Library
    • DNP User Group, Secure DNP3 specifications, DNP User Group Library (www.dnp.org), 2007.
    • (2007)
  • 36
    • 51349086981 scopus 로고    scopus 로고
    • sSCADA: Securing SCADA Infrastructure Communications
    • Y. Wang, B. Chu, " sSCADA: Securing SCADA Infrastructure Communications" , IACR Eprint, 2004.
    • (2004) IACR Eprint
    • Wang, Y.1    Chu, B.2
  • 40
    • 34250659309 scopus 로고    scopus 로고
    • Key management for long-lived sensor networks in hostile environments
    • M. Chorzempa, J-M. Park, M.Eltoweissy, " Key management for long-lived sensor networks in hostile environments" , ACM Computer Communications, Volume 30, Issue 9, 1964-1979, 2007.
    • (2007) ACM Computer Communications , vol.30 , Issue.9 , pp. 1964-1979
    • Chorzempa, M.1    Park, J.-M.2    Eltoweissy, M.3
  • 42
    • 51249195966 scopus 로고    scopus 로고
    • Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
    • Springer
    • C. Alcaraz & R. Roman, " Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios" , Proceedings of CRITIS'06 Conference, Springer, 2006.
    • (2006) Proceedings of CRITIS'06 Conference
    • Alcaraz, C.1    Roman, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.