Security model for industrial devices

作者: Taryl J. Jasper , Michael B. Miller , Robert A. Brandt

DOI:

关键词: Security information and event managementComputer scienceComputer security modelCloud computing securitySecurity testingComputer securityLogical securityComputer networkData securitySecurity serviceCovert channel

摘要: Systems and/or methods are described relating to a security model that provides interoperability with foreign domains while remaining scalable small embedded devices. A token service is provided, which configured issue, renew, validate tokens in response request. communication protocol, corresponding message structures, and the defined accordance protocol buffer definitions.

参考文章(14)
Vasantha K. Ravula, Gregory Kostal, Vladimir Yarmolenko, Scott C. Cottrille, Charles F. Rose, Ravindra Nath Pandya, Muthukrishnan Paramasivam, Yuhui Zhong, Format-agnostic system and method for issuing certificates ,(2006)
Miska Matias Hannuksela, Kemal Ugur, Jani Lainema, Method and apparatus for video coding and decoding ,(2014)
Patrick Ryan Wardrop, Calvin D. Lawrence, Miguel A. Ortiz, Token Mediation Service in a Data Management System ,(2009)
Ronald O' Neal Edmark, John Michael Garrison, Vikki Kim Converse, Kenneth W. Blake, Method and system for morphing honeypot with computer security incident correlation ,(2008)
Anthony Joseph Nadalin, Heather Maria Hinton, George Robert Blakley, Method and system for native authentication protocols in a heterogeneous federated environment ,(2007)
Takahide Nogayama, Hyen Vui Chung, Kenichiro Ueno, Gregory Louis Truty, Optimization of Signing SOAP Body Element ,(2009)
Takahide Nogayama, Hyen-Vui Chung, Kenichiro Ueno, Toshiro Takase, Filtering technique for processing security measures in web service messages ,(2007)