Virtual Private Infrastructure (VPI) initiative - an industry consortium for unified and secure Web control with embedded devices
نویسندگان
چکیده
− Remote maintenance and control is already widely used in industrial automation and building automation and gains acceptance for many other applications, e.g. smart home appliances, consumer electronics, networking devices. Internetand web-based connectivity is playing a major part in unifying network infrastructure and company information flow. However, a number of different implementations hinder a true interoperability of devices and exchangeability of suppliers in the different business levels. Virtual Private Infrastructure (VPI) Initiative [1] is an industry consortium providing basic guidelines for unified and secure web-based control with embedded devices.
منابع مشابه
High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis
The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropri...
متن کاملA Conceptual Framework for Smart Hospital towards Industry 4.0
Background: The fourth industrial revolution consists of combining network devices with cloud computing methods and analyzing large data and artificial intelligence, which makes it possible to call such an infrastructure smart. In a Smart Hospital, all things and devices are designed to be connected and integrated, thus achieving better patient care, increasing efficiency and reducing time wast...
متن کاملOpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...
متن کاملVirtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments
Structured P2P overlays provide a framework for building distributed applications that are self-configuring, scalable, and resilient to node failures. Such systems have been successfully adopted in large-scale Internet services such as content delivery networks and file sharing; however, widespread adoption in small/medium scales has been limited due in part to security concerns and difficulty ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003