Design for Process Security

نویسندگان

  • Korkut Uygun
  • Yinlun Huang
  • Helen Lou
چکیده

Chemical process security has been an area of interest due to the potential of process industries as a possible terrorism target. As a result, model-based process security analysis methods that try to detect process vulnerabilities in a fundamental way have been proposed. The design aspect of the problem, however, has not been addressed yet. In this work, an adverse-MPC approach, which enables estimation of security vulnerability for a given process is proposed, and is coupled by a secure-design problem that retrofits the design to minimize the vulnerability. The proposed method is realized using a bi-level formulation, where the security evaluation is posed as a constraint in the outer design problem. The method described in this work enables design of processes that are inherently less vulnerable to security threats. Further, the method can be extended to combine economics into the security problem, hence enabling design of optimal designs in terms of both security and cost efficiency. The algorithm can also be utilized for design of robust security systems. The application potential of the approach is demonstrated by a runaway reactor example.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Environment Security and Decrease of Crimes with CPTED Approach Critical and Analytical Discussion

Crime and the fear of crime are pervasive and endemic concerns in modern post-industrial society and criminal justice systems are clearly failing to tackle both issues. In this research after mentioning the abstract for motivation and the vital opinion in the security public, the role of city framework (programming the environmental design) in the decrease and prediction of crimes in the city...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004