VEST: An Aspect-Based Composition Tool for Real-Time Systems
RTAS '03 Proceedings of the The 9th IEEE Real-Time and Embedded Technology and Applications Symposium
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
A Study of Security Architectural Patterns
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Foundations of Security: What Every Programmer Needs to Know
Foundations of Security: What Every Programmer Needs to Know
Integrating Security Modeling into Embedded System Design
ECBS '07 Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
Hi-index | 0.00 |
Wireless communication and smart sensors and actuators pose means to sustainably improve automation technology. Unfortunately they also cause an abundance of new challenges regarding security and safety of the system. After introducing the security concepts, this paper discusses an engineering methodology to cope with security requirements in context of industrial automation. Two practical examples demonstrate how the solutions even for pretty similar scenarios can differ significantly. The proposed development flow promises a reliable objective engineering of proper system solutions. Key concepts of the flow are a holistic goal description and an iterative composition algorithm that inherently applies and extends existing knowledge.