Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories

google+
Views: 90                 

Author :  Alexander Lawall and Thomas Schaller

Affiliation :  IU International University of Applied Science, Juri-Gagarin-Ring 152, 99084 Erfurt, Germany and University of Applied Sciences Hof, Alfons-Goppel-Platz 1, 95028 Hof, Germany

Country :  Deutschland

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  Volume 12, Number 3, September, 2022

Abstract :


The article presents an applied research using the Design Science Research Methodology for securely managing resources of smart factories via a graph-based approach combined with a declarative query language. This query language can be used to find appropriate production facilities that are able to fulfill specific manufacturing tasks. This approach is aimed to solve the problem with the management effort for production facilities using enumeration for naming these facilities for the manufacturing tasks. Thus, the security is ensured by identifying the “current” valid identities (resources). Additionally, the usage of deputy relationships leads to alternative production facilities if resources have a breakdown or have to be serviced which has an effect on the availability.

Keyword :  Identity Management, Industry 4.0, Smart Factory, Organizational Model, Access Control

Journal/ Proceedings Name :  International Journal on Cryptography and Information Security (IJCIS)

URL :  https://wireilla.com/papers/ijcis/V12N3/12322ijcis01.pdf

User Name : lawall
Posted 05-10-2022 on 20:09:49 AEDT



Related Research Work

  • Detection Of Peer-to-peer Botnets Using Graph Mining
  • Understanding The Worldwide Paths Towards The Creation Of True Intelligence For Machines
  • An Advantageous And User-friendly Mobile Program To Benefit Students In Seeking Their Suitable Colleges Through The Use Of Web Scraping, Machine Learning, And Frontend Design
  • An Overview Of Copy Move Forgery Detection Approaches

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals