Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies 2011
DOI: 10.1145/2093698.2093706
|View full text |Cite
|
Sign up to set email alerts
|

A secure interoperable architecture for building-automation applications

Abstract: Building-automation systems enable building administrators and inhabitants to monitor and control their buildings from within the building itself, as well as from outside using remote access tools. In recent years, many such control systems have been developed for both residential and nonresidential buildings, with increasing levels of functionality. Due to the growing number of building-automation system manufacturers, which use different network and communication protocols with no interoperability, it is oft… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
(10 reference statements)
0
1
0
Order By: Relevance
“…In this project a set of redundant authentication gateways are developed that manage the access of users to end points, which can be used to enforce a security policy. The work presented in [70] present some similarities in its concept with [69]. The authors have developed a multilayer architecture for building automation that allows remote management and enables using components from different manufacturers with backward compatibility.…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…In this project a set of redundant authentication gateways are developed that manage the access of users to end points, which can be used to enforce a security policy. The work presented in [70] present some similarities in its concept with [69]. The authors have developed a multilayer architecture for building automation that allows remote management and enables using components from different manufacturers with backward compatibility.…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%