Research on Trusted Industrial Control Ethernet Network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of trusted network technology to industrial control networks

Interconnections between industrial control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest h...

متن کامل

Research on Trust Evaluation Access Control Model Based on Dynamic Bayesian Network in Trusted Domain

Aiming at solving the difficulties of interaction synergism and insecurity of the multi-agent system, a trusted evaluation access control model based on dynamic Bayesian network is proposed in this paper. The model establishes trust domains according to the interaction records of agent itself and the history. The influences of time and interactive behavior on trust evaluation are also considere...

متن کامل

Security in Industrial Ethernet

Ethernet has become increasingly popular in automation, due to its easy integration with other networks but also for its low costs and commercial availability. Characteristics like real-time capabilities required in automation have also been added and now form Industrial Ethernet allowing its deployment in application areas formerly reserved for dedicated fieldbus systems. Due to the vertical i...

متن کامل

Advantages of Industrial Ethernet

iv 1 Industrial Communication 1 1.1 Automation Pyramid . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Fieldbuses . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Industrial Ethernet . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.2 Other layers . . . . . . . . . . . . . . . . . . . . . . . 5 1.3.3 Solutions ....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Network and Information Security

سال: 2010

ISSN: 2074-9090,2074-9104

DOI: 10.5815/ijcnis.2010.02.06