2015 Global Information Infrastructure and Networking Symposium (GIIS) 2015
DOI: 10.1109/giis.2015.7347172
|View full text |Cite
|
Sign up to set email alerts
|

Deploying SCADA data to web services for interoperability purposes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
2
0
1
Order By: Relevance
“…An important aspect for the distribution of information concerning the power grid is the connection to a control room or a SCADA (Supervisory Control and Data Acquisition) system. For instance, a SCADA system was integrated into the IT landscape with the help of an ESB (Enterprise Service Bus) to increase its interoperability with other applications [20]. However, the extraction of data from the SCADA system can be difficult [21].…”
Section: Related Workmentioning
confidence: 99%
“…An important aspect for the distribution of information concerning the power grid is the connection to a control room or a SCADA (Supervisory Control and Data Acquisition) system. For instance, a SCADA system was integrated into the IT landscape with the help of an ESB (Enterprise Service Bus) to increase its interoperability with other applications [20]. However, the extraction of data from the SCADA system can be difficult [21].…”
Section: Related Workmentioning
confidence: 99%
“…Ngoài ra, các dịch vụ được đặt trên đám mây có thể dễ dàng truy cập mà không bị hạn chế bởi vị trí địa lý, thời gian trên mọi nền tảng máy. Nhờ lợi thế trên, việc ứng dụng điện toán đám mây trong công nghiệp sẽ tạo điều kiện con người có khả năng tương tác với các thiết bị sử dụng trong công nghiệp bất kể thời gian và địa lý [8].…”
Section: Giới Thiệuunclassified
“…The security risks in the local front-end SCADA server (Figure 3) are mainly caused by the lack of cryptographic capacity. Extra payload and processing would induce unacceptable delays in sensitive applications [27]. Until recently, secure DNP3 and IEC 61850 introduced the ability to validate the authenticity of the messages [21].…”
Section: ) Risk Evaluation and Security Controlmentioning
confidence: 99%