Proceedings 22nd International Conference on Distributed Computing Systems Workshops
DOI: 10.1109/icdcsw.2002.1030844
|View full text |Cite
|
Sign up to set email alerts
|

Switchboard: secure, monitored connections for client-server communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Among other security enhancements that could be applied to SCADA include research such as that by Kato et al (2001) who designed a Secure Tele‐operation Protocol specification for internet‐based control systems. Freudenthal et al (2002) proposed a “switchboard” for continuous monitoring of a credential's liveness and the trust relationships that authorize it. Similar methods could be very useful for securing SCADA connections since the connections stay open for a very long period of time giving an intruder better opportunities to launch a cyberattack.…”
Section: Possible Cyber‐security Measuresmentioning
confidence: 99%
“…Among other security enhancements that could be applied to SCADA include research such as that by Kato et al (2001) who designed a Secure Tele‐operation Protocol specification for internet‐based control systems. Freudenthal et al (2002) proposed a “switchboard” for continuous monitoring of a credential's liveness and the trust relationships that authorize it. Similar methods could be very useful for securing SCADA connections since the connections stay open for a very long period of time giving an intruder better opportunities to launch a cyberattack.…”
Section: Possible Cyber‐security Measuresmentioning
confidence: 99%