Process Security Analysis : - Analysis and ý - Map

نویسندگان

  • Yinlun Huang
  • Helen H. Lou
چکیده

Chemical processes are often operated under high pressures, at high temperatures, and with fast material flows and complex manufacturing mechanisms. Thus, their operation is always more risky, environmentally more harmful, and potentially more dangerous than other types of manufacturing activities when abnormal or destructive situations arise. In the extreme, catastrophes, such as explosions, toxic release, and loss of life, will occur unexpectedly and rapidly, particularly when a premeditated attack is made by an adversary who has sufficient technical background on chemical operations. Obviously, such security-threatening situations must be detected early, the potential impacts on production must be precisely evaluated, and operational solutions must be quickly derived. However, systematic and effective methodologies are not available for the chemical process industries today. Scientists and engineers are greatly challenged to swiftly develop a knowledge base of process security that can fundamentally help the industry perform process-security analysis, assessŽ ment, and improvement Margiloff, 2001; Cunningham, 2002; . Ragan et al., 2002 . Process security is an extended concept and practice of process safety. Over the past decades, various process-safety techniques and tools have been developed and implemented Ž . in the industries. HAZOP HAZard and OPerability analysis , Ž . Ž LOPA Layer Of Protection Analysis , and FTA Fault Tree . Ž Analysis are among the most popular ones Dimitriadis et al., 1996; Lees, 1996; Allen and Shonnard, 2002; Crowl and . Louvar, 2002 . They are effective in identifying process malfunctions and deriving solutions to ensure safe production. The scientific tools for safety enhancement are mainly probability analysis and logical reasoning about the root causes of adverse conditions. Existing safety technologies are almost exclusively based on steady-state information. Solutions generally are derived on experience, and they are usually statistiŽ . cal and qualitative Dimitriadis et al., 1996; Dowell, 1998 .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

BANKS' PERFORMANCE EVALUATION MODEL BASED ON THE BALANCED SCORE CARD APPROACH, FUZZY DEMATEL AND ANALYTIC NETWORK PROCESS

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

BANKS' PERFORMANCE EVALUATION MODEL BASED ON THE BALANCED SCORE CARD APPROACH, FUZZY DEMATEL AND ANALYTIC NETWORK PROCESS

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

A Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map

Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003