2022
DOI: 10.34190/eccws.21.1.202
|View full text |Cite
|
Sign up to set email alerts
|

Combining System Integrity Verification with Identity and Access Management

Abstract: Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities. Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 20 publications
(22 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?