The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electronic coding of products and documents using RFID backed by the ubiquitous computing brings new business and secure life styles. The world smallest wireless silicon IC "mu-chip" storing a unique 128 bits ROM ID code number has been developed for a reliable automatic authentication through a network based secure ID management. Its extremely small size chip (0.4 mmtimes0.4 mm) with 50...
Information system security for industrial plants is a topic of increasing importance. Effective and cost-efficient security solutions require some kind of industry consensus or standardization. This paper examines the interests of the various stakeholders in the industrial security field (e.g. society, plant owners, service providers, automation vendors, and consultants) and evaluates some of the...
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture based upon Web services that supports authentication,...
Often security is seen as an add-on service for automation systems that frequently conflicts with other goals such as efficient transmission or resource limitations. This article goes for a practice-oriented approach to security in automation systems. It analysis common threats to automation systems and automation networks in particular, sets up a model to classify systems with respect to security...
Key replacement in cryptographic building blocks (algorithms and protocols) is a required operation in order to meet the security requirements. The common practice is to have only one cryptographic key valid for any given time moment and periodically change this key. We propose a scheme that allows multiple keys to be valid at any moment and describe a method that allows the receiver to identify the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.