Supervisory Control and Data Acquisition
Supervisory Control and Data Acquisition
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Trends in Process Control Systems Security
IEEE Security and Privacy
Security patterns for physical access control systems
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Systematic design of secure Mobile Grid systems
Journal of Network and Computer Applications
Secure VM for monitoring industrial process controllers
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Reference deployment models for eliminating user concerns on cloud security
The Journal of Supercomputing
Simulation base implementation for placement of security services in real time environment
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.03 |
Critical infrastructure systems are important systems that support our daily lives. Protecting these systems is attracting attention from the research community. The key component of a critical infrastructure system is the process control system, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand, security patterns are a well established concept that are used to analyze, construct and evaluate secure systems. This paper aims to propose methods to build a secure SCADA system using security patterns. In this paper, we study the architecture of a general SCADA system and analyze the potential attacks against it. Also, we use security patterns as a tool to design a secure SCADA system that is resistant to these attacks. We believe our research work lays a new direction for future research on secure SCADA systems.