Abstract
In an ever-increasing competitive environment, companies must maintain the quality of their production and services. Hence, machinery or equipment that is critical to production and providing services must be maintained with minimum downtime or a near zero-break down rate. The concept of Web-based maintenance helps to detect faulty equipment at an early stage without the constraints of distance. It provides a convenient platform for maintenance personnel to evaluate the performance of machines even when they are distant. As the Internet is an open environment, its traffic or on-line communication can be easily intercepted. Users who do not adequately protect their Internet communication are exposed to risk. This paper intorduces a Web-based maintenance system with security considerations. With the assistance of several security measures, the data security of our Web-based maintenance system has been enhanced. The data can be transferred safely and the accuracy of the results can be verified. Our Web-based maintenance system works more securely in comparison to conventional Web-based maintenance systems that have been reported thus far.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
6 References
Kurose J.F. & Ross K.W. (2003) Computer Networking A top-Down Approach Featuring the Internet. Addison Wesley
Champlain J.J. (2003) Auditing Information Systems. New Jersey, CA: John Wiley & Sons Inc.
Ogletree T.W. (2004) Upgrading and Repairing Networks 4th Edition. Indiana, Que Publishing.
Speed T., Ellis J. & Korper S. (2002) The Personal Internet Security Guidebook. San Diego, Academic Press.
Klobučar T. & Jerman-Blažič B. (2001) Certificate Polices and Certification Practice Statements. Advanced Security Technologies in Networking. pp. 63–73. Amsterdam: IOS Press.
Arazi B. (1993) Integrating a Key Distribution Procedure into the Digital Signature Standard. Electronics Letters, Volume 29, pp.966–967.
Jerman-Blažič B., Schneider W. and Schwiderski-Grosche S. (2001) Introduction to IT-Security in Open Systems. Advanced Security Technologies in Networking, pp. 3–19, Amsterdam: IOS Press.
Lail B.M. (2002) Broadband Network & Device Security. California, McGraw-Hill/Osborne.
Clarke D., Devadas S., Dijk M.V., Gassend B. and Suh G.E. (2003) Incremental Multiset Hash Function and Their Application to Memory Integrity Checking. Advances in Cryptology ASIACRYPT 2003-9th International Conference on the Theory and Application of Cryptology and Information Security Proceedings. pp. 188–207. New York: Springer.
Baltatu M. & Lioy A. (2001) IP Security. Advanced Security Technologies in Networking. pp. 95–108. Amsterdam: IOS Press.
Federal Information Processing Standards Publication 46-3.
Federal Information Processing Standards Publication 197.
Smith R.E. (2002) Authentication: From Password to Public Keys.Boston, Addition Wesley.
Federal Information Processing Standards Publication 180-1.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2006 CIEAM/MESA
About this paper
Cite this paper
Cheuk, A.N., Tse, P.W. (2006). Security Considerations for Modern Web-Based Maintenance or Remote Sensing System. In: Mathew, J., Kennedy, J., Ma, L., Tan, A., Anderson, D. (eds) Engineering Asset Management. Springer, London. https://doi.org/10.1007/978-1-84628-814-2_36
Download citation
DOI: https://doi.org/10.1007/978-1-84628-814-2_36
Publisher Name: Springer, London
Print ISBN: 978-1-84628-583-7
Online ISBN: 978-1-84628-814-2
eBook Packages: EngineeringEngineering (R0)