With the increasing digitization and interconnection of industry, there are many opportunities for new business models. These promise great economic benefits, but at the same time pose significant threats. The strong interconnection with suppliers, vendors and customers results in an increasingly open production network. Thereby each user group has individual access requirements to the different machines within the company network and corresponding system resources. Therefore, an architecture must be developed capable of controlling access within the network as well as within the machine computer to reduce it to the required minimum. Consequently, we present in this paper an access control architecture that allows attribute-based policies ...
Access control management in a System of Systems-i.e., a collaborative environment composed of a mul...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Many modern business models of the manufacturing industry use the possibilities of digitization. In ...
This paper describes a security system for authorization in open networks. Authorization means autho...
The sharing of data is becoming increasingly important for the process and manufacturing industries ...
Access control systems are widely used means for the protection of computing systems. They are defin...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
In the area of computer network security, standardization work has been conducted for several years....
Access control management in a collaborative environment composed of a multitude of distributed auto...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
This paper describes a policy driven role based access control system. The user's roles, and the po...
Attribute based access control (ABAC) grants accesses to services based on the attributes possessed ...
Access control management in a System of Systems-i.e., a collaborative environment composed of a mul...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Many modern business models of the manufacturing industry use the possibilities of digitization. In ...
This paper describes a security system for authorization in open networks. Authorization means autho...
The sharing of data is becoming increasingly important for the process and manufacturing industries ...
Access control systems are widely used means for the protection of computing systems. They are defin...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
In the area of computer network security, standardization work has been conducted for several years....
Access control management in a collaborative environment composed of a multitude of distributed auto...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
This paper describes a policy driven role based access control system. The user's roles, and the po...
Attribute based access control (ABAC) grants accesses to services based on the attributes possessed ...
Access control management in a System of Systems-i.e., a collaborative environment composed of a mul...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...