Cybersecurity for industry 4.0 : analysis for design and manufacturing /: analysis for design and manufacturing. ([2017])
- Record Type:
- Book
- Title:
- Cybersecurity for industry 4.0 : analysis for design and manufacturing /: analysis for design and manufacturing. ([2017])
- Main Title:
- Cybersecurity for industry 4.0 : analysis for design and manufacturing
- Further Information:
- Note: Lane Thames, Dirk Schaefer, editors.
- Editors:
- Thames, Lane
Schaefer, Dirk, 1961- - Contents:
- Preface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation. 5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment. 2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based AuthorizationPreface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation. 5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment. 2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based Authorization Algorithm; 3.2.2 Customized Geometric Transformation Algorithm; 4 Case Study for Approach Validation; 5 Conclusion and Future Works; Acknowledgements; References; 3 A New Approach to Cyberphysical Security in Industry 4.0. Abstract1 Introduction; 2 Background; 3 Secure Manufacturing Information Architecture; 3.1 Pilot of Direct-to-Machine Security; 4 Manufacturing Security Enforcement Device; 5 Pilot of the Manufacturing Security Enforcement Device; 6 Conclusion; Acknowledgements; References; 4 SCADA System Forensic Analysis Within IIoT; 1 Introduction; 1.1 SCADA Progression and the Development of IIoT; 2 Conceptual Architecture of a SCADA System; 2.1 SCADA Hardware; 2.2 SCADA Software; 2.3 Networking; 3 Examples of SCADA System Incidents Prior to IIoT; 3.1 Trans-Siberian Pipeline Explosion. 3.2 Maroochy Shire Water System3.3 Stuxnet; 3.4 Duqu; 3.5 Flame; 4 SCADA Forensics Within IIoT; 4.1 Forensic Challenges; 4.2 Current Data Acquisition Methods for SCADA Systems; 5 Forensic Acquisition of SCADA Artefacts; 5.1 Network Data Acquisition; 5.2 Device Data Acquisition; 5.3 Half-Life of Data Within a SCADA System; 6 SCADA Forensic Process; 6.1 Existing Incident Response Models; 6.2 Forensic Methodology for SCADA Within IIoT; 6.3 SCADA Forensic Workstation; 7 Conclusion; 8 List of Abbreviations; References; 5 Big Data Security Intelligence for Healthcare Industry 4.0; Abstract. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Copyright Date:
- 2017
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8
364.16/8
Computer science
Computer security
SOCIAL SCIENCE -- Criminology
Computer security
Computer Science
Systems and Data Security
Communications Engineering, Networks
Industrial and Production Engineering
Innovation/Technology Management
R & D/Technology Policy
Cybercrime
Technology & Engineering -- Telecommunications
Technology & Engineering -- Industrial Engineering
Business & Economics -- Production & Operations Management
Science -- General
Communications engineering / telecommunications
Production engineering
Research & development management
Crime & criminology
Telecommunication
Industrial engineering
Management
Economic policy
Computer crimes
Computers -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9783319506609
3319506609 - Related ISBNs:
- 9783319506593
3319506595 - Notes:
- Note: Includes bibliographical references.
Note: Vendor-supplied metadata. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373454
- Ingest File:
- 02_353.xml