Access Control Management for SCADA Systems
نویسندگان
چکیده
منابع مشابه
Improving Security for SCADA Control Systems
Executive Summary The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emerge...
متن کاملA Petri-net Model for Operational Cycle in SCADA Systems
Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...
متن کاملKey Management in Hierarchical Access Control Systems
Blanton, Marina V. Ph.D., Purdue University, August, 2007. Key Management in Hierarchical Access Control Systems. Major Professor: Mikhail J. Atallah. In a hierarchical access control system, users are partitioned into a number of classes – called security classes – which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a securit...
متن کاملThe Agent based Scada Control Systems
Supervisory control and data acquisition (SCADA) is a PC or computer system for gathering, dissecting and checking continuous and real time data. SCADA systems are utilized to monitor and control plants or equipments in a mixed bag of present day commercial enterprises. SCADA is a critical information system; its criticality originates from the way that SCADA systems are at present crucial part...
متن کاملSupervisory Control and Data Acquisition ( Scada ) Systems
This manual has been prepared by or for the Government and, except to the extent indicated below, is public property and not subject to copyright. Reprint or republication of this manual should include a credit substantially as Table 3-1 Safety integrity levels – low demand operation and table 3-2 Safety integrity levels – continuous operation are reprinted with permission from the Internationa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2008
ISSN: 0916-8532,1745-1361
DOI: 10.1093/ietisy/e91-d.10.2449