Skip to main content

Improvements in Process Control Dependability through Internet Security Technology

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1943))

Abstract

The increasing use of the internet as a global communication media drives the development of new methods to cope with the deficiencies in reliability and security, inherently associated with the internet in its current form. Thus data integrity and confidentiality, as well as peer-to-peer authentication and non repudiation of transactions, are considered fundamental for a wide success of electronic commerce. As an answer to this demands, application of Public Key Infrastructures (PKI) gains momentum. This paper shows how this internet security technology may be successfully transferred into the process industry sector to provide valuable support for many of the current issues in dependable process control. The applications addressed reach from improvements in safe process control to reliability of communication and even commercial efficiency of operation, showing that a PKI is a valuable instrument to maintain the staff’s confidence in procedures and communication, that migrate from paper to computer screens.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bruce Schneier, Applied Cryptography, Wiley, New York 1996

    Google Scholar 

  2. Jalal Feghhi, Jalil Feghhi, Peter Williams, Digital Certificates, Addison Wesley, Reading 1999

    Google Scholar 

  3. ISO/IEC 9594-8 (X.509): OSI. The Directory. Authentication Framework

    Google Scholar 

  4. Whitfield Diffie, Martin E. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, 22 (1976), 644–654

    Article  MATH  MathSciNet  Google Scholar 

  5. ISO/IEC 14888-3: Information technology. Security techniques — Digital signatures with appendix-Part 3: Certificate-based mechanisms, 1999

    Google Scholar 

  6. X. Lai: On the design and security of block ciphers, ETH Series in Information Processing, J.L. Massey (editor), vol. 1, Hartung-Gorre Verlag Konstanz, Technische Hochschule (Zürich), 1992

    Google Scholar 

  7. Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton 1996

    Google Scholar 

  8. Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21 (1978), 120–126

    Article  MATH  MathSciNet  Google Scholar 

  9. F.J. Dafelmair, Model and Implementation of a Secure SW-Development Process for Mission Critical Software, Lecture Notes in Computer Science Vol. 1516, Springer Heidelberg, 1998

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dafelmair, F.J. (2000). Improvements in Process Control Dependability through Internet Security Technology. In: Koornneef, F., van der Meulen, M. (eds) Computer Safety, Reliability and Security. SAFECOMP 2000. Lecture Notes in Computer Science, vol 1943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40891-6_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-40891-6_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41186-4

  • Online ISBN: 978-3-540-40891-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics