[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tellabi et al., 2018 - Google Patents

Overview of Authentication and Access Controls for I&C systems

Tellabi et al., 2018

Document ID
1966978357742063072
Author
Tellabi A
Sassmanhausen J
Bajramovic E
Ruland K
Publication year
Publication venue
2018 IEEE 16th International Conference on Industrial Informatics (INDIN)

External Links

Snippet

The integration of digital equipment and diverse automation platforms in modern power plants, including Nuclear Power Plants is due to the gradually increasing use of digital technologies. This development has raised new vulnerabilities that may endanger the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Coates et al. A trust system architecture for SCADA network security
Scarfone et al. Guide to enterprise password management (draft)
CN103310161A (en) Protection method and system for database system
CN109564603A (en) The system and method for the network configuration setting of multiplexer for safely changing in industrial control system
CN106603488A (en) Safety system based on power grid statistical data searching method
Conrad et al. Eleventh hour CISSP: study guide
CN102667792A (en) Method and device for accessing files of a secure fileserver
EP3902225A1 (en) Systems and methods for secure over-the-air updates for cyber-physical systems
Tellabi et al. Overview of Authentication and Access Controls for I&C systems
Martinelli et al. Improving security in industry 4.0 by extending OPC-UA with usage control
Muzzi et al. Using Botnets to provide security for safety critical embedded systems-a case study focused on UAVs
Fischer et al. IT security for functional resilience in energy systems: effect-centric IT security
Mir et al. Zero trust user access and identity security in smart grid based scada systems
Sadavarte et al. Data security and integrity in cloud computing: Threats and Solutions
US12039316B2 (en) Systems and methods for secure maintenance device for cyber-physical systems
Lee Considerations for cyber security implementation in autonomous vehicle systems
Dong et al. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Guo et al. Simulation Implementation and Verification of a Security Framework for ICS Based on SPD
Chen et al. A trusted biometric system
Dhondge Lifecycle IoT Security for Engineers
Tellabi et al. Safety, cybersecurity and interoperability aspects in modern nuclear power plants
Conte de Leon et al. Cybersecurity
Leszczyna et al. Security requirements and controls for incident information sharing in the polish power system
RU2571372C1 (en) System for protecting information containing state secrets from unauthorised access