Skip to main content

Security Considerations for Modern Web-Based Maintenance or Remote Sensing System

  • Conference paper
  • 3408 Accesses

Abstract

In an ever-increasing competitive environment, companies must maintain the quality of their production and services. Hence, machinery or equipment that is critical to production and providing services must be maintained with minimum downtime or a near zero-break down rate. The concept of Web-based maintenance helps to detect faulty equipment at an early stage without the constraints of distance. It provides a convenient platform for maintenance personnel to evaluate the performance of machines even when they are distant. As the Internet is an open environment, its traffic or on-line communication can be easily intercepted. Users who do not adequately protect their Internet communication are exposed to risk. This paper intorduces a Web-based maintenance system with security considerations. With the assistance of several security measures, the data security of our Web-based maintenance system has been enhanced. The data can be transferred safely and the accuracy of the results can be verified. Our Web-based maintenance system works more securely in comparison to conventional Web-based maintenance systems that have been reported thus far.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6 References

  1. Kurose J.F. & Ross K.W. (2003) Computer Networking A top-Down Approach Featuring the Internet. Addison Wesley

    Google Scholar 

  2. Champlain J.J. (2003) Auditing Information Systems. New Jersey, CA: John Wiley & Sons Inc.

    Google Scholar 

  3. Ogletree T.W. (2004) Upgrading and Repairing Networks 4th Edition. Indiana, Que Publishing.

    Google Scholar 

  4. Speed T., Ellis J. & Korper S. (2002) The Personal Internet Security Guidebook. San Diego, Academic Press.

    Google Scholar 

  5. Klobučar T. & Jerman-Blažič B. (2001) Certificate Polices and Certification Practice Statements. Advanced Security Technologies in Networking. pp. 63–73. Amsterdam: IOS Press.

    Google Scholar 

  6. Arazi B. (1993) Integrating a Key Distribution Procedure into the Digital Signature Standard. Electronics Letters, Volume 29, pp.966–967.

    Google Scholar 

  7. Jerman-Blažič B., Schneider W. and Schwiderski-Grosche S. (2001) Introduction to IT-Security in Open Systems. Advanced Security Technologies in Networking, pp. 3–19, Amsterdam: IOS Press.

    Google Scholar 

  8. Lail B.M. (2002) Broadband Network & Device Security. California, McGraw-Hill/Osborne.

    Google Scholar 

  9. Clarke D., Devadas S., Dijk M.V., Gassend B. and Suh G.E. (2003) Incremental Multiset Hash Function and Their Application to Memory Integrity Checking. Advances in Cryptology ASIACRYPT 2003-9th International Conference on the Theory and Application of Cryptology and Information Security Proceedings. pp. 188–207. New York: Springer.

    Google Scholar 

  10. Baltatu M. & Lioy A. (2001) IP Security. Advanced Security Technologies in Networking. pp. 95–108. Amsterdam: IOS Press.

    Google Scholar 

  11. Federal Information Processing Standards Publication 46-3.

    Google Scholar 

  12. Federal Information Processing Standards Publication 197.

    Google Scholar 

  13. Smith R.E. (2002) Authentication: From Password to Public Keys.Boston, Addition Wesley.

    Google Scholar 

  14. Federal Information Processing Standards Publication 180-1.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joseph Mathew Jim Kennedy Lin Ma Andy Tan Deryk Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 2006 CIEAM/MESA

About this paper

Cite this paper

Cheuk, A.N., Tse, P.W. (2006). Security Considerations for Modern Web-Based Maintenance or Remote Sensing System. In: Mathew, J., Kennedy, J., Ma, L., Tan, A., Anderson, D. (eds) Engineering Asset Management. Springer, London. https://doi.org/10.1007/978-1-84628-814-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-814-2_36

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-583-7

  • Online ISBN: 978-1-84628-814-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics