A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices.
Jeffrey L. HiebJacob SchreiverJames H. GrahamPublished in: Int. J. Crit. Infrastructure Prot. (2013)
Keyphrases
- critical infrastructure
- authentication and access control
- information security
- key management
- cyber security
- access control
- home appliances
- security architecture
- network security
- security mechanisms
- security issues
- intrusion detection
- homeland security
- resource constrained
- mobile devices
- risk analysis
- smart grid
- security policies
- smart card
- control system
- data security
- security model
- data management