Network architecture for secure data communications

DM Ceragioli, M Jeyaraj - US Patent 8,631,134, 2014 - Google Patents
2. Description of Related Art A network edge is particularly vulnerable to unauthorized data
transfers and intrusions, especially between an internal secure network and a public …

Securing SCADA systems

SC Patel, P Sanyal - Information Management & Computer Security, 2008 - emerald.com
Purpose–Supervisory control and data acquisition (SCADA) systems are widely used by
utility companies during the production and distribution of oil, gas, chemicals, electric power …

[LIVRE][B] Secure internet-based communication protocol for SCADA networks

SC Patel - 2006 - search.proquest.com
Supervisory control and data acquisition (SCADA) networks are used to control and monitor
field devices from a central station by the companies that form the critical national …

Using views for customizing reusable components in component-based frameworks

AA Ivan, V Karamcheti - High Performance Distributed …, 2003 - ieeexplore.ieee.org
Increasingly, scalable distributed applications are being constructed by integrating reusable
components spanning multiple administrative domains. Dynamic composition and …

[LIVRE][B] Partitionable services framework: Seamless access to distributed applications

AA Ivan - 2004 - search.proquest.com
Partitionable Services Framework: Seamless Access to Distributed Applications Page 1
Partitionable Services Framework: Seamless Access to Distributed Applications by Anca-Andreea …

[PDF][PDF] Intelligent Systems Research Laboratory

JH Graham, SC Patel - 2004 - idc-online.com
Abstract Supervisory Control and Data Acquisition (SCADA) networks control the critical
utility and process control infrastructures in many countries. They perform vital functions for …

[CITATION][C] On Demand Bytecode Generation for Secure Deployment of Distributed Applications in Dynamic Environments

AA Ivan, V Karamcheti