On Security in Safety-Critical Process Control
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[2] W. Granzer,et al. Key set management in networked building automation systems using multiple key servers , 2008, 2008 IEEE International Workshop on Factory Communication Systems.
[3] P. Neumann. Virtual automation network - reality or dream , 2003, IEEE International Conference on Industrial Technology, 2003.
[4] Peter Neumann,et al. Communication in industrial automation—What is going on? , 2004 .
[5] Peter Palensky,et al. Common approach to functional safety and system security in building automation and control systems , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).
[6] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[7] Wolfgang Granzer,et al. Denial-of-service in automation systems , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.
[8] M. Harada. Security management of factory automation , 2007, SICE Annual Conference 2007.
[9] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[10] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[11] Peter Neumann,et al. Architectural Concept of Virtual Automation Networks , 2008 .
[12] R. Bell,et al. IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .
[13] Neil R. Storey,et al. Safety-critical computer systems , 1996 .
[14] A. Treytl,et al. Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..
[15] Michel Baud,et al. Profinet IO-Device Emulator based on the Man-in-the-middle Attack , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.
[16] A. Treytl,et al. Security measures in automation systems-a practice-oriented approach , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.
[17] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[18] Erik Tews,et al. Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Saad Zafar,et al. Integrating safety and security requirements into design of an embedded system , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).