ASN.1 complete
A strategic framework for networked manufacturing
Computers in Industry - Special issue on advances in computer integrated production in honour of professor C.L. Moodie's retirement
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
A Security Model for Networked Manufacturing System
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
A fixture design system for networked manufacturing
International Journal of Computer Integrated Manufacturing - Networked Manufacturing and Mass Customization in the ECommerce Era: the Chinese Perspective
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Journal of Intelligent Manufacturing
Journal of Intelligent Manufacturing
A secret sharing scheme for EBTC using steganography
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Networked manufacturing changes conventional enterprise activities. With a networked manufacturing system, enterprises are able to perform a range of activities, such as product planning, design, production, and marketing, in collaboration with international partners, regardless of geographical location. However, strict security measures are required, as the authentication and information transfers for networked manufacturing are conducted over a network. With the development of biometric technology, more and more enterprises are using the unique biometric data of individuals to verify the identity of users, in order to restrict and provide access to technology research centers or factory facilities. This paper analyzes the vulnerabilities of the biometric system used for access control and the authentication of access to confidential information in the networked manufacturing system. In addition, the biometric systems that can be built in an open network environment are classified into 9 general models, and a biometric network protocol is suggested that is secure and compatible with international standards.