Abstract
The increasing use of the internet as a global communication media drives the development of new methods to cope with the deficiencies in reliability and security, inherently associated with the internet in its current form. Thus data integrity and confidentiality, as well as peer-to-peer authentication and non repudiation of transactions, are considered fundamental for a wide success of electronic commerce. As an answer to this demands, application of Public Key Infrastructures (PKI) gains momentum. This paper shows how this internet security technology may be successfully transferred into the process industry sector to provide valuable support for many of the current issues in dependable process control. The applications addressed reach from improvements in safe process control to reliability of communication and even commercial efficiency of operation, showing that a PKI is a valuable instrument to maintain the staff’s confidence in procedures and communication, that migrate from paper to computer screens.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bruce Schneier, Applied Cryptography, Wiley, New York 1996
Jalal Feghhi, Jalil Feghhi, Peter Williams, Digital Certificates, Addison Wesley, Reading 1999
ISO/IEC 9594-8 (X.509): OSI. The Directory. Authentication Framework
Whitfield Diffie, Martin E. Hellman: New Directions in Cryptography, IEEE Transactions on Information Theory, 22 (1976), 644–654
ISO/IEC 14888-3: Information technology. Security techniques — Digital signatures with appendix-Part 3: Certificate-based mechanisms, 1999
X. Lai: On the design and security of block ciphers, ETH Series in Information Processing, J.L. Massey (editor), vol. 1, Hartung-Gorre Verlag Konstanz, Technische Hochschule (Zürich), 1992
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton 1996
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21 (1978), 120–126
F.J. Dafelmair, Model and Implementation of a Secure SW-Development Process for Mission Critical Software, Lecture Notes in Computer Science Vol. 1516, Springer Heidelberg, 1998
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dafelmair, F.J. (2000). Improvements in Process Control Dependability through Internet Security Technology. In: Koornneef, F., van der Meulen, M. (eds) Computer Safety, Reliability and Security. SAFECOMP 2000. Lecture Notes in Computer Science, vol 1943. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40891-6_28
Download citation
DOI: https://doi.org/10.1007/3-540-40891-6_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41186-4
Online ISBN: 978-3-540-40891-8
eBook Packages: Springer Book Archive