期刊文献+

工业无线通信技术讲座第六十七讲 离散制造数字化车间信息安全关键技术 被引量:3

Chapter 67:Key Tech of Information Security in Discrete Manufacturing Digital Workshop
下载PDF
导出
摘要 针对离散制造数字化车间的特点,阐述了组成要素、基本架构、基本业务架构、基本网络架构,从企业安全需求出发,基于现阶段工控安全标准规范的基础理念,设计了离散制造数字化车间"3+1"的安全保障体系架构,对安全保障体系架构中的安全管理、安全运维、安全技术、管理中心各个层次的安全控制点进行说明,提出了一种可行的离散制造数字化车间信息安全方案。 For the characteristics of discrete manufacturing digital workshop, and describes the elements, basic structure, basic business architecture and basic network architecture. Based on the basic concept of industrial safety standards and regulations at the present stage, it designed the "3 + 1" security assurance system architecture for discrete manufacturing digital workshop. This describes the security control points at all levels of the security assurance system architecture, including security management, security operation and maintenance, security technology, and management center, and proposes a feasible information security plan for discrete manufacturing digital workshop.
作者 赵剑明 尚文利 曾鹏 Zhao Jianming Shang Wenli Zeng Peng(Shenyang Institute of Automation, Key Lab of Network Control System, Chinese Academy of Sciences, Shenyang 11001)
出处 《仪器仪表标准化与计量》 2018年第1期15-18,44,共5页 Instrument Standardization & Metrology
基金 国家863高技术研究发展计划项目“可编程嵌入式电子装备的安全技术(No.2015AA043901)”
关键词 工控安全 信息安全 数字化车间 ICS Security Information Security Digital Workshop
  • 相关文献

参考文献8

二级参考文献140

  • 1陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 2司马莉萍,贺贵明,陈明榜.基于Modbus/TCP协议的工业控制通信[J].计算机应用,2005,25(B12):29-31. 被引量:49
  • 3潘峰,陈杰,甘明刚,蔡涛,涂序彦.粒子群优化算法模型分析[J].自动化学报,2006,32(3):368-377. 被引量:67
  • 4黄谦,王震,韦韬,陈昱.基于One-class SVM的实时入侵检测系统[J].计算机工程,2006,32(16):127-129. 被引量:12
  • 5倪庆剑,邢汉承,张志政,王蓁蓁,文巨峰.粒子群优化算法研究进展[J].模式识别与人工智能,2007,20(3):349-357. 被引量:67
  • 6LANGNER R. Stuxnet: dissecting a cyberwarfare weapon [J]. Security& Privacy, 2011, 9(3): 49-51.
  • 7SESHADRI A, LUK M, QU N, et al. A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes [C] //Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). New York: ACM Press, 2007 : 335-350.
  • 8RILEY R, JIANG Xu-xian, XU Dong-yan. Guest- transparent prevention of kernel rootkits with VMM-based memory shadowing [ C ] // Proceedings of the l lth International Symposium on Recent Advances in Intrusion Detection. Berlin: Springer, 2008, 5230: 1-20.
  • 9PETRONI N L, FRASER T, MOLINA J, et al. Copilot--a coprocessor-based kernel runtime integrity monitor [ C ] // Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley: USENIX, 2004, 13: 179-194.
  • 10LOSCOCCO P A, WILSON P W, PENDERGRASS J A. Linux kernel integrity measurement using contextual inspection[ C ] // Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing. New York: ACM Press, 2007 : 21-29.

共引文献149

同被引文献8

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部