Automated construction of security integrity wrappers for Industry 4.0 applications
Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by,...
Saved in:
Published in | Journal of logical and algebraic methods in programming Vol. 126; p. 100745 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
01.04.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by, e.g., injecting or tampering with messages. The solution supported by communication protocols such as OPC-UA is to sign and/or encrypt messages. However, given the limited resources of devices and the high performance requirements of I4.0 applications, instead of applying crypto algorithms to all messages in the network, it is better to focus on the messages, that if tampered with or injected, could lead to undesired configurations.
This paper describes a framework for developing and analyzing formal executable specifications of I4.0 applications in Maude. The framework supports the engineering design workflow using theory transformations that include algorithms to enumerate network attacks leading to undesired states, and to determine wrappers preventing these attacks. In particular, given a deployment map from application components to devices we define a theory transformation that models execution of applications on the given set of (network) devices. Given an enumeration of attacks (message flows) we define a further theory transformation that wraps each device with policies for signing/signature checking for just those messages needed to prevent the attacks.
In addition, we report on a series of experiments checking for attacks by a bounded intruder against variations on a Pick-n-Place application, investigating the effect of increasing bounds or increasing application size and further minimizing the number of messages that must be signed. |
---|---|
AbstractList | Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by, e.g., injecting or tampering with messages. The solution supported by communication protocols such as OPC-UA is to sign and/or encrypt messages. However, given the limited resources of devices and the high performance requirements of I4.0 applications, instead of applying crypto algorithms to all messages in the network, it is better to focus on the messages, that if tampered with or injected, could lead to undesired configurations.
This paper describes a framework for developing and analyzing formal executable specifications of I4.0 applications in Maude. The framework supports the engineering design workflow using theory transformations that include algorithms to enumerate network attacks leading to undesired states, and to determine wrappers preventing these attacks. In particular, given a deployment map from application components to devices we define a theory transformation that models execution of applications on the given set of (network) devices. Given an enumeration of attacks (message flows) we define a further theory transformation that wraps each device with policies for signing/signature checking for just those messages needed to prevent the attacks.
In addition, we report on a series of experiments checking for attacks by a bounded intruder against variations on a Pick-n-Place application, investigating the effect of increasing bounds or increasing application size and further minimizing the number of messages that must be signed. |
ArticleNumber | 100745 |
Author | Talcott, Carolyn Nigam, Vivek |
Author_xml | – sequence: 1 givenname: Vivek orcidid: 0000-0003-4089-1218 surname: Nigam fullname: Nigam, Vivek email: nigam@fortiss.org organization: fortiss, GmbH, Munich, Germany – sequence: 2 givenname: Carolyn surname: Talcott fullname: Talcott, Carolyn email: clt@cs.stanford.edu organization: SRI International, CA, USA |
BookMark | eNqFkD1PwzAQhj0UiQL9BSz-Awm28-FkYKgqPipVYgBmy7HPyFEaR7YD6r_HbZkYYLrTq3tOd88VWoxuBIRuKckpofVdn_eD3E85I4ymhPCyWqAlKyqWMUaaS7QKoSckjTa8KegSva7n6PYygsbKjSH6WUXrRuwMDqBmb-MB2zHCx6n78nKawAdsnMfbUc8JOOAyJzjlg1XyyIYbdGHkEGD1U6_R--PD2-Y52708bTfrXaYKUsRMGaY0lGVLu8Z0vCVElkTzRrNKS1VJTSBFuqgMb2Sta9UyqilwXldd3Xa6uEbtea_yLgQPRigbTydEL-0gKBFHKaIXJyniKEWcpSS2-MVO3u6lP_xD3Z8pSG99WvAiKAujAm09qCi0s3_y34LNgow |
CitedBy_id | crossref_primary_10_1108_JSTPM_09_2023_0162 crossref_primary_10_1108_CI_11_2021_0224 |
Cites_doi | 10.1007/s10207-004-0055-7 10.1002/j.1538-7305.1955.tb03788.x 10.1016/j.scico.2013.07.004 10.1016/j.ic.2014.07.011 10.3233/JCS-0560 10.1109/TIT.1983.1056650 10.1145/3373270 |
ContentType | Journal Article |
Copyright | 2021 Elsevier Inc. |
Copyright_xml | – notice: 2021 Elsevier Inc. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.jlamp.2021.100745 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_jlamp_2021_100745 S2352220821001085 |
GroupedDBID | --M 0R~ 4.4 457 4G. 7-5 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAXUO AAYFN ABBOA ABMAC ABVKL ABXDB ABYKQ ACDAQ ACGFS ACRLP ADBBV ADEZE AEBSH AEKER AENEX AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FYGXN GBLVA GBOLZ HZ~ KOM M41 NCXOZ O9- OAUVE RIG ROL SPC SPCBC SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ABJNI ACVFH ADCNI ADVLN AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c303t-cf2cde4491b8fb7900a40d78d25dac5ad0e00ad35f78a6d6c921d1e7765b69bd3 |
IEDL.DBID | AIKHN |
ISSN | 2352-2208 |
IngestDate | Thu Apr 24 23:06:16 EDT 2025 Tue Jul 01 00:37:50 EDT 2025 Fri Feb 23 02:40:05 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Rewriting logic Verification Safety Security Theory transformation Bounded intruder |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c303t-cf2cde4491b8fb7900a40d78d25dac5ad0e00ad35f78a6d6c921d1e7765b69bd3 |
ORCID | 0000-0003-4089-1218 |
ParticipantIDs | crossref_citationtrail_10_1016_j_jlamp_2021_100745 crossref_primary_10_1016_j_jlamp_2021_100745 elsevier_sciencedirect_doi_10_1016_j_jlamp_2021_100745 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | April 2022 2022-04-00 |
PublicationDateYYYYMMDD | 2022-04-01 |
PublicationDate_xml | – month: 04 year: 2022 text: April 2022 |
PublicationDecade | 2020 |
PublicationTitle | Journal of logical and algebraic methods in programming |
PublicationYear | 2022 |
Publisher | Elsevier Inc |
Publisher_xml | – name: Elsevier Inc |
References | Nigam, Talcott (br0210) 2019 Fiat (br0120) 2017 Chadha, Gunter, Meseguer, Shankesi, Viswanathan (br0070) 2008 Urquiza, AlTurki, Kanovich, Kirigin, Nigam, Scedrov, Talcott (br0260) 2019 ENISA (br0100) 2018 Meier, Schmidt, Cremers, Basin (br0190) 2013 Tabrizi, Pattabiraman (br0240) 2016 Apvrille (br0030) 2008 Kanovich, Kirigin, Nigam, Scedrov, Talcott (br0140) 2017; 25 Escobar, Meadows, Meseguer (br0110) 2007 Celik, McDaniel, Tan (br0060) 2018 Mealy (br0180) 1955; 34 Liu, Sandur, Meseguer, Ölveczky, Wang (br0160) 2020 Alturki, Kirigin, Kanovich, Nigam, Scedrov, Talcott (br0010) 2021 Yoong, Roop, Bhatti, Kuo (br0270) 2015 Kanovich, Kirigin, Nigam, Scedrov (br0130) 2014; 238 Lun, D'Innocenzo, Malavolta, Benedetto (br0170) 2016 Meseguer (br0200) 2014; 83 Ameur-Boulifa, Lugou, Apvrille (br0020) 2018 Basin, Mödersheim, Viganò (br0040) 2005; 4 Zoitl, Lewis (br0280) 2014; vol. 95 Clavel, Durán, Eker, Lincoln, Martí-Oliet, Meseguer, Talcott (br0080) 2007; vol. 4350 Dolev, Yao (br0090) 1983; 29 Nigam, Talcott, Urquiza (br0230) 2019 Blanchet (br0050) 2013 Terzimehic, Voss, Wenger (br0250) 2018 Lanotte, Merro, Munteanu, Viganò (br0150) 2020; 23 Nigam, Talcott (br0220) 2020 Kanovich (10.1016/j.jlamp.2021.100745_br0140) 2017; 25 ENISA (10.1016/j.jlamp.2021.100745_br0100) Liu (10.1016/j.jlamp.2021.100745_br0160) 2020 Nigam (10.1016/j.jlamp.2021.100745_br0230) 2019 Tabrizi (10.1016/j.jlamp.2021.100745_br0240) 2016 Ameur-Boulifa (10.1016/j.jlamp.2021.100745_br0020) 2018 Chadha (10.1016/j.jlamp.2021.100745_br0070) 2008 Fiat (10.1016/j.jlamp.2021.100745_br0120) Urquiza (10.1016/j.jlamp.2021.100745_br0260) 2019 Lanotte (10.1016/j.jlamp.2021.100745_br0150) 2020; 23 Terzimehic (10.1016/j.jlamp.2021.100745_br0250) 2018 Blanchet (10.1016/j.jlamp.2021.100745_br0050) 2013 Meseguer (10.1016/j.jlamp.2021.100745_br0200) 2014; 83 Basin (10.1016/j.jlamp.2021.100745_br0040) 2005; 4 Yoong (10.1016/j.jlamp.2021.100745_br0270) 2015 Mealy (10.1016/j.jlamp.2021.100745_br0180) 1955; 34 Apvrille (10.1016/j.jlamp.2021.100745_br0030) 2008 Clavel (10.1016/j.jlamp.2021.100745_br0080) 2007; vol. 4350 Escobar (10.1016/j.jlamp.2021.100745_br0110) 2007 Lun (10.1016/j.jlamp.2021.100745_br0170) Meier (10.1016/j.jlamp.2021.100745_br0190) 2013 Zoitl (10.1016/j.jlamp.2021.100745_br0280) 2014; vol. 95 Kanovich (10.1016/j.jlamp.2021.100745_br0130) 2014; 238 Nigam (10.1016/j.jlamp.2021.100745_br0220) 2020 Celik (10.1016/j.jlamp.2021.100745_br0060) 2018 Alturki (10.1016/j.jlamp.2021.100745_br0010) 2021 Nigam (10.1016/j.jlamp.2021.100745_br0210) 2019 Dolev (10.1016/j.jlamp.2021.100745_br0090) 1983; 29 |
References_xml | – volume: vol. 4350 year: 2007 ident: br0080 article-title: All About Maude: A High-Performance Logical Framework publication-title: LNCS – start-page: 1043 year: 2019 end-page: 1050 ident: br0210 article-title: Formal security verification of industry 4.0 applications publication-title: 24th IEEE International Conference on Emerging Technologies and Factory Automation – year: 2018 ident: br0100 article-title: Good practices for security of Internet of things in the context of smart manufacturing – volume: 83 start-page: 3 year: 2014 end-page: 34 ident: br0200 article-title: Taming distributed system complexity through formal patterns publication-title: Sci. Comput. Program. – start-page: 54 year: 2013 end-page: 87 ident: br0050 article-title: Automatic verification of security protocols in the symbolic model: the verifier proverif publication-title: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures – volume: 29 start-page: 198 year: 1983 end-page: 208 ident: br0090 article-title: On the security of public key protocols publication-title: IEEE Trans. Inf. Theory – volume: 23 year: 2020 ident: br0150 article-title: A formal approach to physics-based attacks in cyber-physical systems publication-title: ACM Trans. Priv. Secur. – volume: 34 start-page: 1045 year: 1955 end-page: 1079 ident: br0180 article-title: A method for synthesizing sequential circuits publication-title: Bell Syst. Tech. J. – start-page: 147 year: 2018 end-page: 158 ident: br0060 article-title: Soteria: automated iot safety and security analysis publication-title: 2018 USENIX Annual Technical Conference – start-page: 22 year: 2020 end-page: 40 ident: br0160 article-title: Generating correct-by-construction distributed implementations from formal Maude designs publication-title: NASA Formal Methods - 12th International Symposium, Proceedings – start-page: 39 year: 2008 end-page: 58 ident: br0070 article-title: Modular preservation of safety properties by cookie-based dos-protection wrappers publication-title: Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, Proceedings – start-page: 43 year: 2021 end-page: 54 ident: br0010 article-title: On security analysis of periodic systems: expressiveness and complexity publication-title: Proceedings of the 7th International Conference on Information Systems Security and Privacy – year: 2017 ident: br0120 article-title: OPC UA security analysis – volume: 238 start-page: 233 year: 2014 end-page: 261 ident: br0130 article-title: Bounded memory Dolev-Yao adversaries in collaborative systems publication-title: Inf. Comput. – volume: 25 start-page: 585 year: 2017 end-page: 630 ident: br0140 article-title: Time, computational complexity, and probability in the analysis of distance-bounding protocols publication-title: J. Comput. Secur. – start-page: 382 year: 2019 end-page: 396 ident: br0260 article-title: Resource-bounded intruders in denial of service attacks publication-title: CSF – start-page: 881 year: 2018 end-page: 886 ident: br0250 article-title: Using design space exploration to calculate deployment configurations of IEC 61499-based systems publication-title: 14th IEEE International Conference on Automation Science and Engineering – start-page: 35 year: 2018 end-page: 49 ident: br0020 article-title: Sysml model transformation for safety and security analysis publication-title: Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops – year: 2016 ident: br0170 article-title: Cyber-physical systems security: a systematic mapping study – volume: vol. 95 year: 2014 ident: br0280 article-title: Modelling Control Systems Using IEC 61499 publication-title: Control Engineering Series – start-page: 1 year: 2016 end-page: 15 ident: br0240 article-title: Formal security analysis of smart embedded systems publication-title: Proceedings of the 32nd Annual Conference on Computer Security Applications – start-page: 197 year: 2020 end-page: 215 ident: br0220 article-title: Automated construction of security integrity wrappers for industry 4.0 applications publication-title: Rewriting Logic and Its Applications - 13th International Workshop – year: 2015 ident: br0270 article-title: Model-Driven Design Using IEC 61499 - a Synchronous Approach for Embedded and Automation Systems – start-page: 1 year: 2007 end-page: 50 ident: br0110 article-title: Maude-npa: cryptographic protocol analysis modulo equational properties publication-title: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures – start-page: 696 year: 2013 end-page: 701 ident: br0190 article-title: The TAMARIN prover for the symbolic analysis of security protocols publication-title: Computer Aided Verification - 25th International Conference, Proceedings – start-page: 89 year: 2019 end-page: 111 ident: br0230 article-title: Symbolic timed trace equivalence publication-title: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows – year: 2008 ident: br0030 article-title: Ttool for DIPLODOCUS: an environment for design space exploration publication-title: Proceedings of the 8th International Conference on New Technologies in Distributed Systems – volume: 4 start-page: 181 year: 2005 end-page: 208 ident: br0040 article-title: OFMC: a symbolic model checker for security protocols publication-title: Int. J. Inf. Secur. – start-page: 35 year: 2018 ident: 10.1016/j.jlamp.2021.100745_br0020 article-title: Sysml model transformation for safety and security analysis – start-page: 696 year: 2013 ident: 10.1016/j.jlamp.2021.100745_br0190 article-title: The TAMARIN prover for the symbolic analysis of security protocols – volume: 4 start-page: 181 year: 2005 ident: 10.1016/j.jlamp.2021.100745_br0040 article-title: OFMC: a symbolic model checker for security protocols publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-004-0055-7 – volume: 34 start-page: 1045 year: 1955 ident: 10.1016/j.jlamp.2021.100745_br0180 article-title: A method for synthesizing sequential circuits publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1955.tb03788.x – start-page: 881 year: 2018 ident: 10.1016/j.jlamp.2021.100745_br0250 article-title: Using design space exploration to calculate deployment configurations of IEC 61499-based systems – volume: 83 start-page: 3 year: 2014 ident: 10.1016/j.jlamp.2021.100745_br0200 article-title: Taming distributed system complexity through formal patterns publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2013.07.004 – volume: 238 start-page: 233 year: 2014 ident: 10.1016/j.jlamp.2021.100745_br0130 article-title: Bounded memory Dolev-Yao adversaries in collaborative systems publication-title: Inf. Comput. doi: 10.1016/j.ic.2014.07.011 – start-page: 1 year: 2007 ident: 10.1016/j.jlamp.2021.100745_br0110 article-title: Maude-npa: cryptographic protocol analysis modulo equational properties – ident: 10.1016/j.jlamp.2021.100745_br0170 – start-page: 147 year: 2018 ident: 10.1016/j.jlamp.2021.100745_br0060 article-title: Soteria: automated iot safety and security analysis – start-page: 1 year: 2016 ident: 10.1016/j.jlamp.2021.100745_br0240 article-title: Formal security analysis of smart embedded systems – ident: 10.1016/j.jlamp.2021.100745_br0100 – ident: 10.1016/j.jlamp.2021.100745_br0120 – volume: vol. 95 year: 2014 ident: 10.1016/j.jlamp.2021.100745_br0280 article-title: Modelling Control Systems Using IEC 61499 – volume: vol. 4350 year: 2007 ident: 10.1016/j.jlamp.2021.100745_br0080 article-title: All About Maude: A High-Performance Logical Framework – volume: 25 start-page: 585 year: 2017 ident: 10.1016/j.jlamp.2021.100745_br0140 article-title: Time, computational complexity, and probability in the analysis of distance-bounding protocols publication-title: J. Comput. Secur. doi: 10.3233/JCS-0560 – volume: 29 start-page: 198 year: 1983 ident: 10.1016/j.jlamp.2021.100745_br0090 article-title: On the security of public key protocols publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1983.1056650 – start-page: 22 year: 2020 ident: 10.1016/j.jlamp.2021.100745_br0160 article-title: Generating correct-by-construction distributed implementations from formal Maude designs – start-page: 89 year: 2019 ident: 10.1016/j.jlamp.2021.100745_br0230 article-title: Symbolic timed trace equivalence – start-page: 39 year: 2008 ident: 10.1016/j.jlamp.2021.100745_br0070 article-title: Modular preservation of safety properties by cookie-based dos-protection wrappers – start-page: 382 year: 2019 ident: 10.1016/j.jlamp.2021.100745_br0260 article-title: Resource-bounded intruders in denial of service attacks – year: 2015 ident: 10.1016/j.jlamp.2021.100745_br0270 – start-page: 197 year: 2020 ident: 10.1016/j.jlamp.2021.100745_br0220 article-title: Automated construction of security integrity wrappers for industry 4.0 applications – start-page: 54 year: 2013 ident: 10.1016/j.jlamp.2021.100745_br0050 article-title: Automatic verification of security protocols in the symbolic model: the verifier proverif – start-page: 1043 year: 2019 ident: 10.1016/j.jlamp.2021.100745_br0210 article-title: Formal security verification of industry 4.0 applications – year: 2008 ident: 10.1016/j.jlamp.2021.100745_br0030 article-title: Ttool for DIPLODOCUS: an environment for design space exploration – volume: 23 year: 2020 ident: 10.1016/j.jlamp.2021.100745_br0150 article-title: A formal approach to physics-based attacks in cyber-physical systems publication-title: ACM Trans. Priv. Secur. doi: 10.1145/3373270 – start-page: 43 year: 2021 ident: 10.1016/j.jlamp.2021.100745_br0010 article-title: On security analysis of periodic systems: expressiveness and complexity |
SSID | ssj0001687831 |
Score | 2.228201 |
Snippet | Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems,... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 100745 |
SubjectTerms | Bounded intruder Rewriting logic Safety Security Theory transformation Verification |
Title | Automated construction of security integrity wrappers for Industry 4.0 applications |
URI | https://dx.doi.org/10.1016/j.jlamp.2021.100745 |
Volume | 126 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5zu3jxtzh_kYNH49o0TdPjGI6puMsc7Fbyq7Aha9GJ-N_70qZuguzgrYQ-KF-S9762L9-H0A3kP85FzomF-SZQbzlJJaOEKSmUMFTSyj_lecxHU_Y4i2ctNGjOwri2Sp_765xeZWs_0vNo9sr5vDehjjtQKGFORgiYww7q0CjlsLQ7_Yen0Xj9qYWLRFTOhC6EuJhGf6jq9FoA9k66koZVz4A72fRXjdqoO8MDtOcJI-7Xz3SIWnZ5hPYbMwbs9-YxmvQ_VgXQT2uwLtaysLjI8bv3qMO1NoS7-nyTZQnMDwNnxd6-4wuzuwBv_tE-QdPh_ctgRLxjAtFQilZE51Qby1gaKpGrJA0CyQKTAOaxkTqWJrAwZKI4T4TkhuuUhia0ScJjxVNlolPUXhZLe4awSKyEVw_IhzkUOqqUDCOmnSd1wrg2qotog1GmvZy4c7V4zZq-sUVWAZs5YLMa2C66_QkqazWN7bfzBvzs16LIIN9vCzz_b-AF2qXufEPVmnOJ2jBZ9gpYx0pd-1X1DfNo1S4 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED2VdoCFb8Q3HhgJTVzHdsYKUbUUuhSkbpG_IoFQW0ER4t9zThwoEmJgi6ycFD3bdy_J-T2Ac8x_nMuCRw7nO8J6y6NMMRoxraSWlipa-qfcjXj_gd1M0kkDruqzML6tMuT-KqeX2TqMtAOa7fnjY3tMPXegWMK8jBAyhxVoeXWqtAmt7mDYH31_auFSyNKZ0IdEPqbWHyo7vZ4Qey9dSZOyZ8CfbPqtRi3Vnd4mrAfCSLrVM21Bw023YaM2YyBhb-7AuPu2mCH9dJaY2bcsLJkV5DV41JFKG8Jfvb-o-RyZH0HOSoJ9xwdhlzFZ_qO9Cw-96_urfhQcEyKDpWgRmYIa6xjLEi0LLbI4Viy2AjFPrTKpsrHDIdtJCyEVt9xkNLGJE4KnmmfadvagOZ1N3T4QKZzCVw_MhwUWOqq1SjrMeE9qwbix-gBojVFugpy4d7V4zuu-sae8BDb3wOYVsAdw8RU0r9Q0_r6d1-DnPxZFjvn-r8DD_waewWr__u42vx2MhkewRv1Zh7JN5xiaOHHuBBnIQp-GFfYJCKTYFA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Automated+construction+of+security+integrity+wrappers+for+Industry+4.0+applications&rft.jtitle=Journal+of+logical+and+algebraic+methods+in+programming&rft.au=Nigam%2C+Vivek&rft.au=Talcott%2C+Carolyn&rft.date=2022-04-01&rft.pub=Elsevier+Inc&rft.issn=2352-2208&rft.volume=126&rft_id=info:doi/10.1016%2Fj.jlamp.2021.100745&rft.externalDocID=S2352220821001085 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-2208&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-2208&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-2208&client=summon |