TITLE

New safety protocol: An open-and-shut case?

PUB. DATE
May 2011
SOURCE
Process Engineering;May/Jun2011, Vol. 92 Issue 3, p34
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the development of OpenSafety, a protocol for safety-oriented data transfer in automation networks.
ACCESSION #
61022735

 

Related Articles

  • A Five-Step Process to Help You Prepare for an E-Banking Examination.  // Bank Security Report;Sep2012, Vol. 41 Issue 9, p6 

    The article presents a five-step examination preparation program for financial institution's electronic-banking. This five-step process can be used as the starting point for developing or updating security readiness plan. Some of the steps include checking data connections and transmission to...

  • Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison. Goswami, Rajat S.; K., Swarnendu; Abhinandan; Bhunia, Chandan T. // International Journal of Computer Applications;Nov2013, Vol. 82, p28 

    Session to session key variation is the only approach for achieving perfect security as per Shannon. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia and we tried to analyze the performance of different types of new AVK techniques.

  • Security.  // Communications News;Aug95, Vol. 32 Issue 8, p59 

    Describes communication security products. MicroVault's Micro-Vault PC; Elementrix's Secure FTP and Secure E-Mail.

  • PRIVACY.  // International Law Update;Sep2000, Vol. 6, p141 

    Focuses on the European Commission's decision on the adequacy of protection of personal data transferred from the European Union to the United States.

  • Securing Internet VPNs. Kosiur, Dave // PC Week;08/25/97, Vol. 14 Issue 36, p89 

    Discusses the use of virtual private networks (VPN), or a secure connection between two or more locations over the Internet. Why VPNs are attractive to corporations; Security issues; Work by the Internet Engineering Task Force on the IPSec standard which will define open protocols for a secure...

  • No More Nosy Neighbors, No More Shared Files. Bannan, Karen J. // Inter@ctive Week;10/26/98, Vol. 5 Issue 42, pI-12 

    Reports that providers of cable data services have taken some definitive steps to close a security gap that allowed subscribers' hard drives to be invaded by their neighbors. Incident which pointed out the security limitations of cable modem networks; Ways to lock down personal computers to bar...

  • ATM users don't need to worry about data eavesdroppers. Tanzillo, Kevin // Communications News;Jul94, Vol. 31 Issue 7, p47 

    Reports on how data transmitted across ATM circuits are prevented from being read by someone else. Contrasts between traditional time division multiplexing and ATM; TDM's use of time slots to assign users to channels while ATM uses headers or labels to assign traffic to virtual circuits.

  • PATHGROUP UTILIZES PRIVATEEXPRESS SECURE MESSAGING NETWORK.  // Networks Update;Apr2001, p1 

    Reports that PrivateExpress, a provider of secure messaging network solution for business communications, has put its solution in operation at PathGroup Inc., a Tennessee-based pathology testing laboratory. PrivateExpress Secure Messaging Network; Secure means of transmitting patient and...

  • Sense of Security. Bernstel, Janet Bigham // Bank Marketing;Apr2000, Vol. 32 Issue 4, p29 

    Provides information on the importance for customers to trust their financial institution when dealing with online security. Use of the Secure Socket Layer, which protects data during transmission; Significance of educating staff about security.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics