Conference Agenda

Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).

 
 
Session Overview
Session
WS 4: I4.0 ACS 2020
Time:
Monday, 28/Sept/2020:
8:30am - 5:30pm

Location: informatik2020.hybrid-avdata.de
Access to the video conference system via https://informatik2020.hybrid-avdata.de. Please use your conftool username and password. After logging in, you can register for the sessions your are interested in and then join the sessions.
5th GI/ACM I4.0 Standardization Workshop on Industrial Automation and Control Systems (IACS)

Session Abstract

To the CFP

The Scope of the Workshop is aligned to the underlying Standards Series IEC 62443 IACS that comprises 13 parts addressing Security and Safety issues of industrial production systems like: IACS Modeling and Concepts, System Security Conformance Metrics, Security Lifecycle and Use Cases, Patch and Security Management Systems, IACS Security Risk Assessment and Security Levels, Product Development, Security Requirements for IACS Components etc.

In completion to IACS standardization security measures may include staggered defense approaches, risk analysis about assets, threats, vulnerabilities; guidelines and process specifications for enterprises, concepts of security inserted into production chains to hinder attacks.


Show help for 'Increase or decrease the abstract text size'
Presentations

Semantics for I4.0 Smart Manufacturing

Jan deMeer

smartspacelab.eu GmbH, Germany

deMeer-Semantics for I40 Smart Manufacturing-180_a.pdf


Validation of Control Systems with Heterogeneous Digital Models and Virtualization Technologies

Vitaly Promyslov, Kirill Semenkov, Alexey Poletykin

V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, Russian Federation

Promyslov-Validation of Control Systems with Heterogeneous Digital Models and Virtualization Technologies-116_a.pdf


Aligning with cybersecurity framework by modelling OT security

Mithil Parekh1, Karl Waedt2, Asmaa Tellabi3

1OvGU Magdeburg, Germany; 2Framatome GmbH; 3University of Siegen

Parekh-Aligning with cybersecurity framework by modelling OT security-208_a.pdf


Operational Security Analysis and Challenge for IoT Solutions

Yuan Gao1, Xinxin Lou2

1Otto-von-Guerick University Magdeburg, Deutschland; 2Bielefeld University

Gao-Operational Security Analysis and Challenge for IoT Solutions-192_a.pdf


Edge Computing Standardisation and Initiatives

Axel Rennoch, Alexander Willner

Fraunhofer FOKUS, Germany

Rennoch-Edge Computing Standardisation and Initiatives-173_a.pdf


MAC layer Security for Time Sensitive Switched Ethernet Networks

Venesa Watson1, Christoph Ruland2, Karl Waedt3

1Universität Siegen, Siegen, Germany; 2Universität Siegen, Seigen, Germany; 3Framatome GmbH, Erlangen, Germany

Watson-MAC layer Security for Time Sensitive Switched Ethernet Networks-206_a.pdf


Gossip protocol approach for a decentralized energy market with OPC UA client-server communication

Josef Schindler1, Asmaa Tellabi2, Karl Waedt3

1Friedrich-Alexander-Universität Erlangen-Nürnberg, Faculty of Engineering, Institute of Electrical Energy Systems, Cauerstr. 4, Erlangen, 91058; 2University of Siegen, Faculty of Science and Engineering, Chair for Data Communication Systems, Hölderlinstraße 3, Siegen, 57068; 3Framatome GmbH, Deutschland

Schindler-Gossip protocol approach for a decentralized energy market with OPC UA client-server communication-1_a.pdf


Feature-based Comparison of Open Source OPC-UA Implementations

Nikolas Mühlbauer1, Erkin Kirdan1,2, Marc-Oliver Pahl1,3, Karl Waedt2

1Technical University of Munich; 2Framatome GmbH; 3IMT Atlantique

Mühlbauer-Feature-based Comparison of Open Source OPC-UA Implementations-178_a.pdf


Simulation Model for Threat and Impact Analysis on Modern Electrical Power Systems

Deeksha Gupta1, Yongdian Ding2, Dharini Govindaraj3, Mathias Lange2, Martin Szemkus2, Karl Waedt4

1TU Dresden, Deutschland; 2Hochschule Magdeburg-Stendal; 3Hochschule Darmstadt; 4Framatome GmbH

Gupta-Simulation Model for Threat and Impact Analysis on Modern Electrical Power Systems-191_a.pdf


 
Contact and Legal Notice · Contact Address:
Privacy Statement · Conference: INFORMATIK2020
Conference Software - ConfTool Pro 2.6.135+TC
© 2001 - 2020 by Dr. H. Weinreich, Hamburg, Germany