Applying trusted network technology to process control systems

7Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs. © 2008 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Okhravi, H., & Nicol, D. (2008). Applying trusted network technology to process control systems. IFIP International Federation for Information Processing, 290, 57–70. https://doi.org/10.1007/978-0-387-88523-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free