A security model for networked manufacturing system

被引:2
|
作者
Wang, Lujiong [1 ]
Li, Aiping [1 ]
Xu, Liyun [1 ]
机构
[1] Tongji Univ, Inst Adv Mfg Technol, Shanghai 200092, Peoples R China
关键词
D O I
10.1109/CIS.2007.226
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information Security is one of the major concerns of networked manufacturing system. A security model for networked manufacturing system is presented A role based access control model with time character is discussed. For time constraint affecting more than one session, the method of Analytical Hierarchy Process is proposed to calculate the weight of each session, according to which maximum live time of each session is set. An illustrative example using the security model is demonstrated.
引用
收藏
页码:745 / 749
页数:5
相关论文
共 50 条
  • [1] A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing
    Yongnyuo Shin
    Woochang Shin
    [J]. Journal of Intelligent Manufacturing, 2010, 21 : 595 - 605
  • [2] A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing
    Shin, Yongnyuo
    Shin, Woochang
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2010, 21 (05) : 595 - 605
  • [3] Research on system integration of networked manufacturing and networked integrated manufacturing system
    Dan, B
    Liu, F
    Zhang, Y
    [J]. NEW TRENDS OF INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT IN NEW CENTURY, 2001, : 514 - 518
  • [4] XML-based document model for networked manufacturing system
    Yu, Qing-Mei
    Yin, Chao-Wan
    Liu, Zhi-Gang
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2003, 9 (07): : 601 - 607
  • [5] Secure strategy for networked manufacturing system
    Zheng, XL
    Chen, DR
    Wu, ZG
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 4232 - 4237
  • [6] A fixture design system for networked manufacturing
    Kang, Y. G.
    Wang, Z.
    Li, R.
    Jiang, C.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2007, 20 (2-3) : 143 - 159
  • [7] A networked virtual manufacturing system for SMEs
    Peng, Q.
    Chung, C.
    Yu, C.
    Luan, T.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2007, 20 (01) : 71 - 79
  • [8] A Process Management System for Networked Manufacturing
    Liu, Tingting
    Wang, Huifen
    Liu, Linyan
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2009, 5738 : 153 - 160
  • [9] System security in the networked library: Introduction
    Lavagnino, MB
    [J]. LIBRARY HI TECH, 1997, 15 (1-2) : 9 - 10
  • [10] A temporal logic-based model for forensic investigation in networked system security
    Rekhis, S
    Boudriga, N
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 325 - 338