The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture based upon Web services that supports authentication,...
In modern industrial automation systems each user is assigned a set of authorizations (permissions) to configure and operate the automation system or an automation device. Users are authenticated at log-on, and no further authentication is done on actual access of the objects. It remains possible for an individual insider user to attack the system, once he has been authenticated, e.g. by sending malicious...
The use of firewalls between business and process control networks is often suggested as an ideal solution for plant floor cyber security. But research shows that few firewalls are properly configured and that many control system security incidents bypass the firewall. If firewalls are to be effective, guidance on how to deploy them in industrial settings is badly needed. The authors conducted a survey...
In recent years, concerns about the safety and security of critical infrastructures have increased enormously. These infrastructures can easily become subjects of physical and cyber attacks. In this paper, we propose a software architecture named security and protection architecture for physical infrastructures (SPAPI) for the protection of these critical infrastructures and for other non-military...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.