Citation: | SHAO Cheng, ZHONG Lianggao. An Information Security Solution Scheme of Industrial Control System Based on Trusted Computing[J]. INFORMATION AND CONTROL, 2015, 44(5): 628-633,640. DOI: 10.13976/j.cnki.xk.2015.0628 |
[1] |
彭勇, 江常青, 谢丰, 等. 工业控制系统信息安全研究进展[J]. 清华大学学报:自然科学版, 2012, 52(10):1396-1408. Peng Y, Jiang C Q, Xie F, et al. Industrial control system cybersecurity research[J]. Journal of Tsinghua University:Science and Technology, 2012, 52(10):1396-1408.
|
[2] |
NSFOCUS Information Technology Co., Ltd. NSFOCUS industrial control system security situation report in 2014[EB/OL]. (2014-09-18)[2015-03-27]. http://www.nsfocus.com.cn/report/NSFOCUS_ICS_Security_Report_20140918.pdf.
|
[3] |
杨建民, 杨凡. 基于Tofino防火墙技术实现工业网络隔离[J]. 计算机与网络, 2013(5):70-73. Yang J M, Yang F. Industrial control network isolation based on Tofino firewall[J]. Computer and Network, 2013(5):70-73.
|
[4] |
Morris T, Vaughn R, Dandass Y, et al. A retrofit network intrusion detection system for modbus RTU and ASCII industrial control systems[C]//45th Hawaii International Conference on System Sciences. Piscataway, NJ, USA:IEEE, 2012:2338-2345.
|
[5] |
于立业, 薛向荣, 张云贵, 等. 工业控制系统信息安全解决方案[J]. 冶金自动化, 2013, 37(1):5-11. Yu L Y, Xue X R, Zhang Y G, et al. Solutions of industrial control systems security[J]. Metallurgical Industry Automation, 2013, 37(1):5-11.
|
[6] |
Siemens China. Defense in depth-multiple level protection[EB/OL]. (2014-08-26)[2015-04-27]. http://www.industry.siemens.com.cn/topics/cn/zh/industrial-security/concept/Pages/defense-in-depth.aspx?IsMobile=false.
|
[7] |
Ralstona P A S, Grahamb J H, Hieb J L. Cyber security risk assessment for SCADA and DCS networks[J]. ISA Transactions, 2007, 46(4):583-594.
|
[8] |
Knowles W, Prince D, Hutchison D, et al. A survey of cyber security management in industrial control systems[J]. International Journal of Critical Infrastructure Protection, 2015(9):52-80.
|
[9] |
Symantec. Butterfly:Corporate spies out for financial gain, symantec security response[EB/OL]. (2015-07-09). http://www.symantec.com/zh/cn/security_response/publications/whitepapers.jsp.
|
[10] |
Kallath D. Trust in trusted computing-the end of security as we know it[J]. Computer Fraud & Security, 2005, 2005(12):4-7.
|
[11] |
Okhravi H, Nicol D M. Application of trusted network technology to industrial control networks[J]. International Journal of Critical Infrastructure Protection, 2009, 2(3):84-94.
|
[12] |
Abdelmajid L, Ghizlane O, El Said H. Contextual security with IF-MAP[J]. International Journal of Security and Its Applications, 2014, 8(5):427-438.
|
[13] |
Lee J, Bagheri B, Kao H. A cyber-physical systems architecture for industry 4.0-based manufacturing systems[J]. Manufacturing Letters, 2015, 2015(3):18-23.
|
[1] | LIN Yuyang, LI Zhongshen. Group Consensus Analysis on Second-order Multi-agent Systems Based on the Connected Bipartite Graph[J]. INFORMATION AND CONTROL, 2017, 46(1): 7-12. DOI: 10.13976/j.cnki.xk.2017.0007 |
[2] | WEI Yong, XU Tingxue, YU Renbo, GU Junyuan, CHEN Haijian. Credit in Supportability Qualitative Indexes Evaluation Based on Fuzzy Petri Net[J]. INFORMATION AND CONTROL, 2011, 40(1): 50-54,60. |
[3] | ZHANG Guanglei. Distributed Parallel Filtering for Spatially Interconnected Systems[J]. INFORMATION AND CONTROL, 2010, 39(1): 36-41. |
[4] | BIAN Yong-zhao, YU hai-bin, ZENG peng. A Heuristic Minimum Connected Dominating Set Algorithm for Wireless Sensor Network[J]. INFORMATION AND CONTROL, 2009, 38(3): 355-359,364. |
[5] | LI Ping, WU Jia-ying, XUE Jing-ming. On Pairwise Key Establishment Protocol between Sensor Nodes Based on Trust Field Authentication[J]. INFORMATION AND CONTROL, 2008, 37(5): 513-518. |
[6] | LIU Yong-min, JIANG Xin-hua. The Trustworthiness of Next Generation Internet[J]. INFORMATION AND CONTROL, 2008, 37(3): 352-357. |
[7] | LIN Jian-ning, WU Hui-zhong. Research on a Trust Model Based on QoS Constraints[J]. INFORMATION AND CONTROL, 2007, 36(4): 427-433. |
[8] | LIN Jian-ning, WU Hui-zhong. On Data-intensive Task Scheduling Algorithm in the Grid Environment Based on Trust Model[J]. INFORMATION AND CONTROL, 2006, 35(5): 667-672. |
[9] | LI Yingtan. RESEARCH ON TRUSTWORTHINESS AND TRUSTWORTHY ALGORITHM OF AI[J]. INFORMATION AND CONTROL, 1999, 28(2): 86-92,97. |
[10] | ZHOU Guanxiong, HE Zuozhi. AN ALGORITHM FOR CONNECTED COMPONENT LABELING BASED ON LINEAR QUADTREES[J]. INFORMATION AND CONTROL, 1988, 17(6): 19-25. |