A Distributed Ledger Approach to Digital Twin Secure Data Sharing
暂无分享,去创建一个
[1] Fei Tao,et al. Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.
[2] Karuna Pande Joshi,et al. Generating Digital Twin Models using Knowledge Graphs for Industrial Production Lines , 2017 .
[3] Jan Mendling,et al. Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.
[4] Arthur Gervais,et al. Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).
[5] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[6] Luca Fumagalli,et al. Flexible Automation and Intelligent Manufacturing , FAIM 2017 , 27-30 June 2017 , Modena , Italy A review of the roles of Digital Twin in CPS-based production systems , 2017 .
[7] Rupert J. Baumgartner,et al. Nachhaltiges Produktmanagement durch die Kombination physischer und digitaler Produktlebenszyklen als Treiber für eine Kreislaufwirtschaft , 2018 .
[8] Rolf Steinhilper,et al. The Digital Twin: Realizing the Cyber-Physical Production System for Industry 4.0☆ , 2017 .
[9] Alistair A. Young,et al. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 2017, MICCAI 2017.
[10] Annelie Sohr,et al. Next Generation Digital Twin , 2018, atp magazin.
[11] Manuel Oliva,et al. Product Avatar as Digital Counterpart of a Physical Individual Product: Literature Review and Implications in an Aircraft , 2015, ISPE CE.
[12] Thomas Usländer. SERVUS: Agile Engineering of Digital Twins deployed in IIoT Platforms , 2018, ERCIM News.
[13] Edward H. Glaessgen,et al. The Digital Twin Paradigm for Future NASA and U.S. Air Force Vehicles , 2012 .
[14] Rodrigo Roman,et al. Analysis of Cybersecurity Threats in Industry 4.0: The Case of Intrusion Detection , 2017, CRITIS.
[15] Laura Ricci,et al. Blockchain Based Access Control , 2017, DAIS.
[16] Somayeh Malakuti,et al. Architectural aspects of digital twins in IIoT systems , 2018, ECSA.
[17] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[18] Carlos Eduardo Pereira,et al. Digital Twin Data Modeling with AutomationML and a Communication Methodology for Data Exchange , 2016 .
[19] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[20] Cesare Pautasso,et al. The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
[21] Giovanni Meroni,et al. Combining Artifact-Driven Monitoring with Blockchain: Analysis and Solutions , 2018, CAiSE Workshops.
[22] Nasser Jazdi,et al. Consistency check to synchronize the Digital Twin of manufacturing automation based on anchor points , 2018 .
[23] Theodora A. Varvarigou,et al. Blockchains for Supply Chain Management: Architectural Elements and Challenges Towards a Global Scale Deployment , 2019, Logistics.
[24] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[25] Olga Kieselmann,et al. k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables , 2016, ARES.
[26] Andreas Ekelhart,et al. Towards Security-Aware Virtual Environments for Digital Twins , 2018, CPSS@AsiaCCS.
[27] Colin Tankard,et al. The security issues of the Internet of Things , 2015 .