{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:56Z","timestamp":1725557876277},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_5","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T13:03:08Z","timestamp":1276606988000},"page":"57-70","source":"Crossref","is-referenced-by-count":4,"title":["Applying Trusted Network Technology To Process Control Systems"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Okhravi","sequence":"first","affiliation":[]},{"given":"David","family":"Nicol","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1_5","doi-asserted-by":"crossref","unstructured":"E. Byres, B. Chauvin, J. Karsch, D. Hoffman and N. Kube, The special needs of SCADA\/PCN firewalls: Architectures and test results, Proceedings of the Tenth IEEE Conference on Emerging Technologies and Factory Automation, 2005.","DOI":"10.1109\/ETFA.2005.1612765"},{"key":"5_CR2_5","unstructured":"E. Byres, D. Leversage and N. Kube, Security incident and trends in SCADA and process industries: A statistical review of the Industrial Security Incident Database (ISID), White Paper, Symantec Corporation, Cupertino, California, 2007."},{"key":"5_CR3_5","unstructured":"E. Byres and J. Lowe, The myths and facts behind cyber security risks for industrial control systems, Proceedings of the VDE Congress, pp. 213\u2013218, 2004."},{"key":"5_CR4_5","volume-title":"Self-Defending Networks: The Next Generation of Network Security","author":"D. Capite","year":"2006","unstructured":"D. Capite, Self-Defending Networks: The Next Generation of Network Security, Cisco Press, Indianapolis, Indiana, 2006."},{"key":"5_CR5_5","volume-title":"Implementing Network Admission Control \u2014 Phase One Configuration and Deployment","author":"Systems Cisco","year":"2005","unstructured":"Cisco Systems, Implementing Network Admission Control \u2014 Phase One Configuration and Deployment, Version 1.1, San Jose, California, 2005."},{"key":"5_CR6_5","volume-title":"Enabling switch security services","author":"Cisco Systems","year":"2007","unstructured":"Cisco Systems, Cisco TrustSec: Enabling switch security services, San Jose, California (www.cisco.com\/en\/US\/solutions\/collateral\/ns340\/ns3 94\/ns147\/ns774\/net implementation_white_paper0900aecd80716abd.pdf), 2007."},{"key":"5_CR7_5","unstructured":"Cisco Systems, Cisco NAC Appliance \u2014 Clean Access Manager Installation and Configuration Guide, Release 4.1(3), San Jose, California ( www.cisco.com\/en\/US\/docs\/security\/nac\/appliance\/configuration.guide\/413\/ cam\/cam413ug.pdf ), 2008."},{"key":"5_CR8_5","volume-title":"Getting started with Cisco NAC network modules in Cisco access routers","author":"Systems Cisco","year":"2008","unstructured":"Cisco Systems, Getting started with Cisco NAC network modules in Cisco access routers, San Jose, California (www.cisco.com\/en\/US\/docs\/security \/nac\/appliance\/installation.guide\/netmodule\/nacnmgsg.pdf),2008."},{"key":"5_CR9_5","volume-title":"Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture","author":"Cisco Systems and Microsoft Corporation","year":"2006","unstructured":"Cisco Systems and Microsoft Corporation, Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture, Redmond, Washington (www.microsoft.com\/presspass\/events\/ssc \/docs\/CiscoMSNACWP.pdf), 2006."},{"key":"5_CR10_5","unstructured":"M. Franz and D. Miller, Industrial Ethernet security: Threats and counter measures (www.threatmind.net\/papers\/franz-miller-industrial-ethernet-se c-03.pdf), 2003."},{"key":"5_CR11_5","unstructured":"Industrial Automation Open Networking Association, The IAONA Handbook for Network Security, Version 1.3, Magdeburg, Germany ( www.iaona.org\/pictures\/files\/1122888138-IAONAHNS1_3-reduced_050 725.pdf ), 2005."},{"key":"5_CR12_5","unstructured":"Instrumentation, Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment, ANSI\/ISA Technical Report TR99.00.02-2004, Research Triangle Park, North Carolina, 2004."},{"key":"5_CR13_5","unstructured":"Microsoft Corporation, Network access protection platform architecture, Redmond, Washington ( www.microsoft.com\/technet\/network\/nap\/nap arch.mspx ),2004."},{"key":"5_CR14_5","unstructured":"MITRE Corporation, CAPEC: Common Attack Pattern Enumeration and Classification, Bedford, Massachusetts (capec mitre.org)."},{"key":"5_CR15_5","doi-asserted-by":"crossref","unstructured":"North American Electric Reliability Council, SQL slammer worm lessons learned for consideration by the electricity sector, Princeton, New Jersey ( www.esisac.com\/publicdocs\/SQLSlammer_2003.pdf ), 2003.","DOI":"10.1016\/S1353-4858(03)00201-0"},{"key":"5_CR16_5","unstructured":"Office of Nuclear Reactor Regulation, Potential vulnerability of plant computer network to worm infection, NRC Information Notice 2003-14, Nuclear Regulatory Commission, Washington, DC ( www.nrc.gov\/reading-rm\/doc-collections\/gen-comm\/info-notices\/2003\/in200314.pdf ),2003."},{"key":"5_CR17_5","volume-title":"Recommended Security Controls for Federal Information Systems, NIST Special Publication 800\u201353, National Institute of Standards and Technology","author":"R. Ross","year":"2005","unstructured":"R. Ross, S. Katzke, A. Johnson, M. Swanson, G. Stoneburner and G. Rogers, Recommended Security Controls for Federal Information Systems, NIST Special Publication 800\u201353, National Institute of Standards and Technology, Gaithersburg, Maryland, 2005."},{"key":"5_CR18_5","doi-asserted-by":"crossref","unstructured":"M. Sopko and K. Winegardner, Process control network security concerns and remedies, IEEE Cement Industry Technical Conference Record, pp. 26\u201337, 2007.","DOI":"10.1109\/CITCON.2007.358984"},{"key":"5_CR19_5","volume-title":"National Institute of Standards and Technology","author":"K. Stouffer","year":"2007","unstructured":"K. Stouffer, J. Falco and K. Scarfone, Guide to Industrial Control Systems Security, Second Public Draft, NIST Special Publication 800\u201382, National Institute of Standards and Technology, Gaithersburg, Maryland, 2007."},{"key":"5_CR20_5","unstructured":"Trusted Computing Group, Trusted network connect to ensure endpoint integrity, Beaverton, Oregon ( www.trustedcomputinggroup.org\/groups \/network\/TNC_NI_collateral_10_may.pdf ), 2005."},{"issue":"6","key":"5_CR21_5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A. Wool","year":"2004","unstructured":"A. Wool, A quantitative study of firewall configuration errors, IEEE Computer, vol. 37(6), pp. 62\u201367, 2004.","journal-title":"IEEE Computer"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T23:47:20Z","timestamp":1559173640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_5","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}