메뉴 건너뛰기




Volumn 52, Issue , 2016, Pages 84-89

Efficiency and Security of Process Transparency in Production Networks - A View of Expectations, Obstacles and Potentials

Author keywords

performance; process transparency; Production networks; security

Indexed keywords

AGILE MANUFACTURING SYSTEMS; RECONFIGURABLE HARDWARE; SECURITY SYSTEMS; THROUGHPUT; TRANSPARENCY;

EID: 84992641053     PISSN: 22128271     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.procir.2016.07.018     Document Type: Conference Paper
Times cited : (6)

References (59)
  • 1
    • 84921300723 scopus 로고    scopus 로고
    • A cyber-physical systems architecture for industry 4.0-based manufacturing systems
    • Lee, J., Bagheri, B., Kao, H.A. A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters 2015;3:18-23.
    • (2015) Manufacturing Letters , vol.3 , pp. 18-23
    • Lee, J.1    Bagheri, B.2    Kao, H.A.3
  • 2
    • 84904510850 scopus 로고    scopus 로고
    • Cyber-physical production systems: Roots, expectations and R&D challenges
    • Variety Management in ManufacturingProceedings of the 47th CIRP Conf. on Manufacturing Systems.
    • Monostori, L. Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia CIRP 2014;17:9-13. Variety Management in ManufacturingProceedings of the 47th CIRP Conf. on Manufacturing Systems.
    • (2014) Procedia CIRP , vol.17 , pp. 9-13
    • Monostori, L.1
  • 3
    • 84914122490 scopus 로고    scopus 로고
    • chap. Die Vierte Industrielle Revolution - Der Weg in ein wertschaffendes Produktionsparadigma. Wiesbaden: Springer Fachmedien, Wiesbaden
    • Bauernhansl, T. Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration; chap. Die Vierte Industrielle Revolution - Der Weg in ein wertschaffendes Produktionsparadigma. Wiesbaden: Springer Fachmedien, Wiesbaden, ISBN., 978-3-658-04682-8, 2014, p. 5-35.
    • (2014) Industrie 4.0 in Produktion, Automatisierung und Logistik: Anwendung, Technologien, Migration , pp. 5-35
    • Bauernhansl, T.1
  • 5
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011;9(3):49-51. doi:10.1109/MSP. 2011.67.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 6
    • 84894191142 scopus 로고    scopus 로고
    • The cousins of stuxnet: Duqu, Flame, and Gauss
    • Bencsáth, B., Pék, G., Buttyán, L., Félegyházi, M. The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 2012;4(4):971. doi:10.3390/fi4040971.
    • (2012) Future Internet , vol.4 , Issue.4 , pp. 971
    • Bencsáth, B.1
  • 8
    • 84941569632 scopus 로고    scopus 로고
    • 1st ed.; Syngress Publishing 9781597494243.
    • Clarke, J. SQL Injection Attacks and Defense. 1st ed.; Syngress Publishing; 2009. ISBN 1597494240, 9781597494243.
    • (2009) SQL Injection Attacks and Defense
    • Clarke, J.1
  • 9
    • 77955046129 scopus 로고    scopus 로고
    • Hproxy: Client-side detection of SSL stripping attacks
    • Kreibich, C., Jahnke, M., editors DIMVA, 2010, Bonn, Germany, July 8-9, 2010. Proceedings; vol. 6201 of Lecture Notes in Computer Science. Springer
    • Nikiforakis, N., Younan, Y., Joosen, W. Hproxy: Client-side detection of SSL stripping attacks. In: Kreibich, C., Jahnke, M., editors. Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings; vol. 6201 of Lecture Notes in Computer Science. Springer. ISBN 978-3-642-14214-7; 2010, p. 200-218. doi:10.1007/978-3-642-14215-4 12.
    • (2010) Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference , pp. 200-218
    • Nikiforakis, N.1    Younan, Y.2    Joosen, W.3
  • 13
    • 84977150496 scopus 로고    scopus 로고
    • Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?
    • Ji, X., Wang, B., Liu, D., Dong, Z., Chen, G., Zhu, Z., et al. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks? Physica A: Statistical Mechanics and its Applications 2016;doi:http://dx.doi.org/10.1016/j.physa.2016.05.017.
    • (2016) Physica A: Statistical Mechanics and Its Applications
    • Ji, X.1    Wang, B.2    Liu, D.3    Dong, Z.4    Chen, G.5    Zhu, Z.6
  • 14
    • 84890348535 scopus 로고    scopus 로고
    • Cyber-physical security: A game theory model of humans interacting over control systems
    • Backhaus, S., Bent, R., Bono, J., Lee, R., Tracey, B., Wolpert, D., et al. Cyber-physical security: A game theory model of humans interacting over control systems. Smart Grid, IEEE Transactions on 2013;4(4):2320-2327.
    • (2013) Smart Grid, IEEE Transactions on , vol.4 , Issue.4 , pp. 2320-2327
    • Backhaus, S.1    Bent, R.2    Bono, J.3    Lee, R.4    Tracey, B.5    Wolpert, D.6
  • 16
    • 84897584743 scopus 로고    scopus 로고
    • Preventing private information inference attacks on social networks
    • Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M. Preventing private information inference attacks on social networks. IEEE Trans on Knowl and Data Eng 2013;25(8):1849-1862. doi:10.1109/TKDE. 2012.120.
    • (2013) IEEE Trans on Knowl and Data Eng , vol.25 , Issue.8 , pp. 1849-1862
    • Heatherly, R.1    Kantarcioglu, M.2    Thuraisingham, B.M.3
  • 17
    • 84999054175 scopus 로고    scopus 로고
    • Data protection compliance regulations and implications for smart factories of the future
    • London, United Kingdom, September 14-16 (to appear)
    • Preuveneers, D., Joosen, W., Ilie-Zudor, E. Data Protection Compliance Regulations and Implications for Smart Factories of the Future. In: 2016 International Conference on Intelligent Environments, IE 2016, London, United Kingdom, September 14-16. 2016 (to appear),.
    • (2016) 2016 International Conference on Intelligent Environments, IE 2016
    • Preuveneers, D.1    Joosen, W.2    Ilie-Zudor, E.3
  • 18
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest Link' - A Human/Computer Interaction Approach to Usable and Effective Security
    • Sasse, M.A., Brostoff, S., Weirich, D. Transforming the "Weakest Link' - a Human/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal 2001;19(3):122-131. doi:10.1023/A: 1011902718709.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 19
    • 84893502427 scopus 로고    scopus 로고
    • TrendLabs APT Research Team, Spear-Phishing Email: Most Favored APT Attack Bait Tech. Rep.; 2012 URL: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing.-email-most-favored-apt-attack-bait.pdf.
    • (2012) Spear-Phishing Email: Most Favored APT Attack Bait Tech. Rep.
  • 20
    • 84951909906 scopus 로고    scopus 로고
    • Advanced social engineering attacks
    • Krombholz, K., Hobel, H., Huber, M., Weippl, E. Advanced social engineering attacks. J Inf Secur Appl 2015; 22(C):113-122. doi:10.1016/j.jisa.2014.09.005.
    • (2015) J Inf Secur Appl , vol.22 , Issue.C , pp. 113-122
    • Krombholz, K.1    Hobel, H.2    Huber, M.3    Weippl, E.4
  • 21
    • 10044258933 scopus 로고    scopus 로고
    • Overcoming impediments to information sharing
    • Aviram, A., Tor, A. Overcoming impediments to information sharing. Ala L Rev 2003;55:231.
    • (2003) Ala L Rev , vol.55 , pp. 231
    • Aviram, A.1    Tor, A.2
  • 22
    • 84919438219 scopus 로고    scopus 로고
    • An empirical investigation of extensible information sharing in supply chains: Going beyond dyadic
    • Chengalur-Smith, I., Duchessi, P. An empirical investigation of extensible information sharing in supply chains: Going beyond dyadic. Information Resources Management Journal (IRMJ) 2014;27(4):1-22.
    • (2014) Information Resources Management Journal (IRMJ) , vol.27 , Issue.4 , pp. 1-22
    • Chengalur-Smith, I.1    Duchessi, P.2
  • 24
    • 84908573455 scopus 로고    scopus 로고
    • Effects of managerial ties and trust on supply chain information sharing and supplier opportunism
    • Wang, Z., Ye, F., Tan, K.H. Effects of managerial ties and trust on supply chain information sharing and supplier opportunism. International Journal of Production Research 2014;52(23):7046-7061.
    • (2014) International Journal of Production Research , vol.52 , Issue.23 , pp. 7046-7061
    • Wang, Z.1    Ye, F.2    Tan, K.H.3
  • 28
  • 30
    • 84878355718 scopus 로고    scopus 로고
    • Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
    • Washington, DC, USA: IEEE Computer Society
    • Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. SP "12; Washington, DC, USA: IEEE Computer Society. ISBN 978-0-7695-4681-0; 2012, p. 332-346. doi:10.1109/SP. 2012.28.
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy. SP "12 , pp. 332-346
    • Dyer, K.P.1    Coull, S.E.2    Ristenpart, T.3    Shrimpton, T.4
  • 31
    • 84945935753 scopus 로고    scopus 로고
    • Cloud-assisted industrial cyber-physical systems: An insight
    • Yue, X., Cai, H., Yan, H., Zou, C., Zhou, K. Cloud-assisted industrial cyber-physical systems: An insight. Microprocessors and Microsystems 2015;39(8):1262-1270.
    • (2015) Microprocessors and Microsystems , vol.39 , Issue.8 , pp. 1262-1270
    • Yue, X.1    Cai, H.2    Yan, H.3    Zou, C.4    Zhou, K.5
  • 32
    • 37149018890 scopus 로고    scopus 로고
    • A survey of lightweight-cryptography implementations
    • Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L. A survey of lightweight-cryptography implementations. IEEE Des Test 2007;24(6):522-533. doi:10.1109/MDT. 2007.178.
    • (2007) IEEE des Test , vol.24 , Issue.6 , pp. 522-533
    • Eisenbarth, T.1    Kumar, S.2    Paar, C.3    Poschmann, A.4    Uhsadel, L.5
  • 33
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a Cryptographic RFID Tag
    • Berkeley, CA, USA: USENIX Association
    • Nohl, K., Evans, D., Starbug, S., Plötz, H. Reverse-engineering a Cryptographic RFID Tag. In: Proceedings of the 17th Conference on Security Symposium. SS'08; Berkeley, CA, USA: USENIX Association; 2008, p. 185-193.
    • (2008) Proceedings of the 17th Conference on Security Symposium. SS'08 , pp. 185-193
    • Nohl, K.1
  • 34
    • 84921068804 scopus 로고    scopus 로고
    • Implementing public-key cryptography on passive RFID tags is practical
    • Arbit, A., Livne, Y., Oren, Y., Wool, A. Implementing public-key cryptography on passive rfid tags is practical. International Journal of Information Security 2015;14(1):85-99. doi:10.1007/s10207-014-0236-y.
    • (2015) International Journal of Information Security , vol.14 , Issue.1 , pp. 85-99
    • Arbit, A.1    Livne, Y.2    Oren, Y.3    Wool, A.4
  • 35
    • 84941265672 scopus 로고    scopus 로고
    • Long-term growth and persistence with obsolescence
    • Barañano, I., Romero-Àvila, D. Long-term growth and persistence with. obsolescence. Economic Modelling 2015; 51(C):328-339.
    • (2015) Economic Modelling , vol.51 , Issue.C , pp. 328-339
    • Barañano, I.1
  • 39
    • 84992574884 scopus 로고    scopus 로고
    • Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292)
    • Dacier, M., Kargl, F., König, H., Valdes, A. Network attack detection and defense: Securing industrial control systems for critical infrastructures (dagstuhl seminar 14292). Dagstuhl Reports 2014; 4(7).
    • (2014) Dagstuhl Reports , vol.4 , Issue.7
    • Dacier, M.1
  • 40
    • 49949112244 scopus 로고    scopus 로고
    • Uncover security design flaws using the STRIDE approach
    • Hernan, S., Lambert, S., Ostwald, T., Shostack, A. Uncover security design flaws using the STRIDE approach. MSDN Magazine 2006;URL: http://msdn.microsoft.com/en-us/magazine/cc163519.aspx.
    • (2006) MSDN Magazine
    • Hernan, S.1    Lambert, S.2    Ostwald, T.3    Shostack, A.4
  • 41
    • 84906950333 scopus 로고    scopus 로고
    • Empirical evaluation of a privacy- focused threat modeling methodology
    • Wuyts, K., Scandariato, R., Joosen, W. Empirical evaluation of a privacy- focused threat modeling methodology. Journal of Systems and Software 2014;96:122-138. doi:http://dx.doi.org/10.1016/j.jss.2014.05.075.
    • (2014) Journal of Systems and Software , vol.96 , pp. 122-138
    • Wuyts, K.1    Scandariato, R.2    Joosen, W.3
  • 44
    • 84969831650 scopus 로고    scopus 로고
    • A security survey of middleware for the Internet of Things
    • Fremantle, P., Scott, P. A security survey of middleware for the Internet of Things. PeerJ PrePrints 2015;3:e1521.
    • (2015) PeerJ PrePrints , vol.3 , pp. e1521
    • Fremantle, P.1    Scott, P.2
  • 45
    • 84959017815 scopus 로고    scopus 로고
    • AST: Activity-security-trust driven modeling of time varying networks
    • Wang, J., Xu, J., Liu, Y., Deng, W. AST: Activity-security-trust. driven modeling of time varying networks. Scientific reports 2016;6. doi:doi:10.1038/srep21352.
    • (2016) Scientific Reports , pp. 6
    • Wang, J.1    Xu, J.2    Liu, Y.3    Deng, W.4
  • 49
    • 84913580411 scopus 로고    scopus 로고
    • Scalable risk assessment method for cloud computing using game theory (ccram)
    • Furuncu, E., Sogukpinar, I. Scalable risk assessment method for cloud computing using game theory (ccram). Computer Standards & Interfaces 2015;38:44-50.
    • (2015) Computer Standards & Interfaces , vol.38 , pp. 44-50
    • Furuncu, E.1    Sogukpinar, I.2
  • 51
    • 84901721702 scopus 로고    scopus 로고
    • Cyber supply chain security practices DNA - Filling in the puzzle using a diverse set of disciplines
    • special Issue on Security in the Cyber Supply Chain.
    • Bartol, N. Cyber supply chain security practices DNA - filling in the puzzle using a diverse set of disciplines. Technovation 2014;34(7):354-361. doi:http://dx.doi.org/10.1016/j.technovation.2014.01.005; special Issue on Security in the Cyber Supply Chain.
    • (2014) Technovation , vol.34 , Issue.7 , pp. 354-361
    • Bartol, N.1
  • 52
    • 84891959392 scopus 로고    scopus 로고
    • Detection and mitigation of sinkhole attacks in wireless sensor networks
    • special Issue on Wireless Network Intrusion.
    • Shafiei, H., Khonsari, A., Derakhshi, H., Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences 2014;80(3):644-653. doi:http://dx.doi.org/10.1016/j.jcss.2013.06.016; special Issue on Wireless Network Intrusion.
    • (2014) Journal of Computer and System Sciences , vol.80 , Issue.3 , pp. 644-653
    • Shafiei, H.1    Khonsari, A.2    Derakhshi, H.3    Mousavi, P.4
  • 55
    • 84868557944 scopus 로고    scopus 로고
    • Smatt: Smart meter attestation using multiple target selection and copy-proof memory
    • Springer
    • Park, H., Seo, D., Lee, H., Perrig, A. Smatt: Smart meter attestation using multiple target selection and copy-proof memory. In: Computer Science and its Applications. Springer; 2012, p. 875-887.
    • (2012) Computer Science and Its Applications , pp. 875-887
    • Park, H.1    Seo, D.2    Lee, H.3    Perrig, A.4
  • 56
    • 84890860713 scopus 로고    scopus 로고
    • Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective
    • Wu, L., Chuang, C.H., Hsu, C.H. Information sharing and collaborative behaviors in enabling supply chain performance: A social exchange perspective. International Journal of Production Economics 2014;148:122-132.
    • (2014) International Journal of Production Economics , vol.148 , pp. 122-132
    • Wu, L.1    Chuang, C.H.2    Hsu, C.H.3
  • 57
    • 80055061655 scopus 로고    scopus 로고
    • Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration
    • Prajogo, D., Olhager, J. Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration. International Journal of Production Economics 2012;135(1):514-522.
    • (2012) International Journal of Production Economics , vol.135 , Issue.1 , pp. 514-522
    • Prajogo, D.1    Olhager, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.