Automated construction of security integrity wrappers for Industry 4.0 applications

Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by,...

Full description

Saved in:
Bibliographic Details
Published inJournal of logical and algebraic methods in programming Vol. 126; p. 100745
Main Authors Nigam, Vivek, Talcott, Carolyn
Format Journal Article
LanguageEnglish
Published Elsevier Inc 01.04.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by, e.g., injecting or tampering with messages. The solution supported by communication protocols such as OPC-UA is to sign and/or encrypt messages. However, given the limited resources of devices and the high performance requirements of I4.0 applications, instead of applying crypto algorithms to all messages in the network, it is better to focus on the messages, that if tampered with or injected, could lead to undesired configurations. This paper describes a framework for developing and analyzing formal executable specifications of I4.0 applications in Maude. The framework supports the engineering design workflow using theory transformations that include algorithms to enumerate network attacks leading to undesired states, and to determine wrappers preventing these attacks. In particular, given a deployment map from application components to devices we define a theory transformation that models execution of applications on the given set of (network) devices. Given an enumeration of attacks (message flows) we define a further theory transformation that wraps each device with policies for signing/signature checking for just those messages needed to prevent the attacks. In addition, we report on a series of experiments checking for attacks by a bounded intruder against variations on a Pick-n-Place application, investigating the effect of increasing bounds or increasing application size and further minimizing the number of messages that must be signed.
AbstractList Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems, where the internet of things connect with each other and the environment via networking. This new connectivity opens systems to attacks, by, e.g., injecting or tampering with messages. The solution supported by communication protocols such as OPC-UA is to sign and/or encrypt messages. However, given the limited resources of devices and the high performance requirements of I4.0 applications, instead of applying crypto algorithms to all messages in the network, it is better to focus on the messages, that if tampered with or injected, could lead to undesired configurations. This paper describes a framework for developing and analyzing formal executable specifications of I4.0 applications in Maude. The framework supports the engineering design workflow using theory transformations that include algorithms to enumerate network attacks leading to undesired states, and to determine wrappers preventing these attacks. In particular, given a deployment map from application components to devices we define a theory transformation that models execution of applications on the given set of (network) devices. Given an enumeration of attacks (message flows) we define a further theory transformation that wraps each device with policies for signing/signature checking for just those messages needed to prevent the attacks. In addition, we report on a series of experiments checking for attacks by a bounded intruder against variations on a Pick-n-Place application, investigating the effect of increasing bounds or increasing application size and further minimizing the number of messages that must be signed.
ArticleNumber 100745
Author Talcott, Carolyn
Nigam, Vivek
Author_xml – sequence: 1
  givenname: Vivek
  orcidid: 0000-0003-4089-1218
  surname: Nigam
  fullname: Nigam, Vivek
  email: nigam@fortiss.org
  organization: fortiss, GmbH, Munich, Germany
– sequence: 2
  givenname: Carolyn
  surname: Talcott
  fullname: Talcott, Carolyn
  email: clt@cs.stanford.edu
  organization: SRI International, CA, USA
BookMark eNqFkD1PwzAQhj0UiQL9BSz-Awm28-FkYKgqPipVYgBmy7HPyFEaR7YD6r_HbZkYYLrTq3tOd88VWoxuBIRuKckpofVdn_eD3E85I4ymhPCyWqAlKyqWMUaaS7QKoSckjTa8KegSva7n6PYygsbKjSH6WUXrRuwMDqBmb-MB2zHCx6n78nKawAdsnMfbUc8JOOAyJzjlg1XyyIYbdGHkEGD1U6_R--PD2-Y52708bTfrXaYKUsRMGaY0lGVLu8Z0vCVElkTzRrNKS1VJTSBFuqgMb2Sta9UyqilwXldd3Xa6uEbtea_yLgQPRigbTydEL-0gKBFHKaIXJyniKEWcpSS2-MVO3u6lP_xD3Z8pSG99WvAiKAujAm09qCi0s3_y34LNgow
CitedBy_id crossref_primary_10_1108_JSTPM_09_2023_0162
crossref_primary_10_1108_CI_11_2021_0224
Cites_doi 10.1007/s10207-004-0055-7
10.1002/j.1538-7305.1955.tb03788.x
10.1016/j.scico.2013.07.004
10.1016/j.ic.2014.07.011
10.3233/JCS-0560
10.1109/TIT.1983.1056650
10.1145/3373270
ContentType Journal Article
Copyright 2021 Elsevier Inc.
Copyright_xml – notice: 2021 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.jlamp.2021.100745
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jlamp_2021_100745
S2352220821001085
GroupedDBID --M
0R~
4.4
457
4G.
7-5
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAXUO
AAYFN
ABBOA
ABMAC
ABVKL
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ADBBV
ADEZE
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FYGXN
GBLVA
GBOLZ
HZ~
KOM
M41
NCXOZ
O9-
OAUVE
RIG
ROL
SPC
SPCBC
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACVFH
ADCNI
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c303t-cf2cde4491b8fb7900a40d78d25dac5ad0e00ad35f78a6d6c921d1e7765b69bd3
IEDL.DBID AIKHN
ISSN 2352-2208
IngestDate Thu Apr 24 23:06:16 EDT 2025
Tue Jul 01 00:37:50 EDT 2025
Fri Feb 23 02:40:05 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Rewriting logic
Verification
Safety
Security
Theory transformation
Bounded intruder
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c303t-cf2cde4491b8fb7900a40d78d25dac5ad0e00ad35f78a6d6c921d1e7765b69bd3
ORCID 0000-0003-4089-1218
ParticipantIDs crossref_citationtrail_10_1016_j_jlamp_2021_100745
crossref_primary_10_1016_j_jlamp_2021_100745
elsevier_sciencedirect_doi_10_1016_j_jlamp_2021_100745
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate April 2022
2022-04-00
PublicationDateYYYYMMDD 2022-04-01
PublicationDate_xml – month: 04
  year: 2022
  text: April 2022
PublicationDecade 2020
PublicationTitle Journal of logical and algebraic methods in programming
PublicationYear 2022
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Nigam, Talcott (br0210) 2019
Fiat (br0120) 2017
Chadha, Gunter, Meseguer, Shankesi, Viswanathan (br0070) 2008
Urquiza, AlTurki, Kanovich, Kirigin, Nigam, Scedrov, Talcott (br0260) 2019
ENISA (br0100) 2018
Meier, Schmidt, Cremers, Basin (br0190) 2013
Tabrizi, Pattabiraman (br0240) 2016
Apvrille (br0030) 2008
Kanovich, Kirigin, Nigam, Scedrov, Talcott (br0140) 2017; 25
Escobar, Meadows, Meseguer (br0110) 2007
Celik, McDaniel, Tan (br0060) 2018
Mealy (br0180) 1955; 34
Liu, Sandur, Meseguer, Ölveczky, Wang (br0160) 2020
Alturki, Kirigin, Kanovich, Nigam, Scedrov, Talcott (br0010) 2021
Yoong, Roop, Bhatti, Kuo (br0270) 2015
Kanovich, Kirigin, Nigam, Scedrov (br0130) 2014; 238
Lun, D'Innocenzo, Malavolta, Benedetto (br0170) 2016
Meseguer (br0200) 2014; 83
Ameur-Boulifa, Lugou, Apvrille (br0020) 2018
Basin, Mödersheim, Viganò (br0040) 2005; 4
Zoitl, Lewis (br0280) 2014; vol. 95
Clavel, Durán, Eker, Lincoln, Martí-Oliet, Meseguer, Talcott (br0080) 2007; vol. 4350
Dolev, Yao (br0090) 1983; 29
Nigam, Talcott, Urquiza (br0230) 2019
Blanchet (br0050) 2013
Terzimehic, Voss, Wenger (br0250) 2018
Lanotte, Merro, Munteanu, Viganò (br0150) 2020; 23
Nigam, Talcott (br0220) 2020
Kanovich (10.1016/j.jlamp.2021.100745_br0140) 2017; 25
ENISA (10.1016/j.jlamp.2021.100745_br0100)
Liu (10.1016/j.jlamp.2021.100745_br0160) 2020
Nigam (10.1016/j.jlamp.2021.100745_br0230) 2019
Tabrizi (10.1016/j.jlamp.2021.100745_br0240) 2016
Ameur-Boulifa (10.1016/j.jlamp.2021.100745_br0020) 2018
Chadha (10.1016/j.jlamp.2021.100745_br0070) 2008
Fiat (10.1016/j.jlamp.2021.100745_br0120)
Urquiza (10.1016/j.jlamp.2021.100745_br0260) 2019
Lanotte (10.1016/j.jlamp.2021.100745_br0150) 2020; 23
Terzimehic (10.1016/j.jlamp.2021.100745_br0250) 2018
Blanchet (10.1016/j.jlamp.2021.100745_br0050) 2013
Meseguer (10.1016/j.jlamp.2021.100745_br0200) 2014; 83
Basin (10.1016/j.jlamp.2021.100745_br0040) 2005; 4
Yoong (10.1016/j.jlamp.2021.100745_br0270) 2015
Mealy (10.1016/j.jlamp.2021.100745_br0180) 1955; 34
Apvrille (10.1016/j.jlamp.2021.100745_br0030) 2008
Clavel (10.1016/j.jlamp.2021.100745_br0080) 2007; vol. 4350
Escobar (10.1016/j.jlamp.2021.100745_br0110) 2007
Lun (10.1016/j.jlamp.2021.100745_br0170)
Meier (10.1016/j.jlamp.2021.100745_br0190) 2013
Zoitl (10.1016/j.jlamp.2021.100745_br0280) 2014; vol. 95
Kanovich (10.1016/j.jlamp.2021.100745_br0130) 2014; 238
Nigam (10.1016/j.jlamp.2021.100745_br0220) 2020
Celik (10.1016/j.jlamp.2021.100745_br0060) 2018
Alturki (10.1016/j.jlamp.2021.100745_br0010) 2021
Nigam (10.1016/j.jlamp.2021.100745_br0210) 2019
Dolev (10.1016/j.jlamp.2021.100745_br0090) 1983; 29
References_xml – volume: vol. 4350
  year: 2007
  ident: br0080
  article-title: All About Maude: A High-Performance Logical Framework
  publication-title: LNCS
– start-page: 1043
  year: 2019
  end-page: 1050
  ident: br0210
  article-title: Formal security verification of industry 4.0 applications
  publication-title: 24th IEEE International Conference on Emerging Technologies and Factory Automation
– year: 2018
  ident: br0100
  article-title: Good practices for security of Internet of things in the context of smart manufacturing
– volume: 83
  start-page: 3
  year: 2014
  end-page: 34
  ident: br0200
  article-title: Taming distributed system complexity through formal patterns
  publication-title: Sci. Comput. Program.
– start-page: 54
  year: 2013
  end-page: 87
  ident: br0050
  article-title: Automatic verification of security protocols in the symbolic model: the verifier proverif
  publication-title: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures
– volume: 29
  start-page: 198
  year: 1983
  end-page: 208
  ident: br0090
  article-title: On the security of public key protocols
  publication-title: IEEE Trans. Inf. Theory
– volume: 23
  year: 2020
  ident: br0150
  article-title: A formal approach to physics-based attacks in cyber-physical systems
  publication-title: ACM Trans. Priv. Secur.
– volume: 34
  start-page: 1045
  year: 1955
  end-page: 1079
  ident: br0180
  article-title: A method for synthesizing sequential circuits
  publication-title: Bell Syst. Tech. J.
– start-page: 147
  year: 2018
  end-page: 158
  ident: br0060
  article-title: Soteria: automated iot safety and security analysis
  publication-title: 2018 USENIX Annual Technical Conference
– start-page: 22
  year: 2020
  end-page: 40
  ident: br0160
  article-title: Generating correct-by-construction distributed implementations from formal Maude designs
  publication-title: NASA Formal Methods - 12th International Symposium, Proceedings
– start-page: 39
  year: 2008
  end-page: 58
  ident: br0070
  article-title: Modular preservation of safety properties by cookie-based dos-protection wrappers
  publication-title: Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, Proceedings
– start-page: 43
  year: 2021
  end-page: 54
  ident: br0010
  article-title: On security analysis of periodic systems: expressiveness and complexity
  publication-title: Proceedings of the 7th International Conference on Information Systems Security and Privacy
– year: 2017
  ident: br0120
  article-title: OPC UA security analysis
– volume: 238
  start-page: 233
  year: 2014
  end-page: 261
  ident: br0130
  article-title: Bounded memory Dolev-Yao adversaries in collaborative systems
  publication-title: Inf. Comput.
– volume: 25
  start-page: 585
  year: 2017
  end-page: 630
  ident: br0140
  article-title: Time, computational complexity, and probability in the analysis of distance-bounding protocols
  publication-title: J. Comput. Secur.
– start-page: 382
  year: 2019
  end-page: 396
  ident: br0260
  article-title: Resource-bounded intruders in denial of service attacks
  publication-title: CSF
– start-page: 881
  year: 2018
  end-page: 886
  ident: br0250
  article-title: Using design space exploration to calculate deployment configurations of IEC 61499-based systems
  publication-title: 14th IEEE International Conference on Automation Science and Engineering
– start-page: 35
  year: 2018
  end-page: 49
  ident: br0020
  article-title: Sysml model transformation for safety and security analysis
  publication-title: Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops
– year: 2016
  ident: br0170
  article-title: Cyber-physical systems security: a systematic mapping study
– volume: vol. 95
  year: 2014
  ident: br0280
  article-title: Modelling Control Systems Using IEC 61499
  publication-title: Control Engineering Series
– start-page: 1
  year: 2016
  end-page: 15
  ident: br0240
  article-title: Formal security analysis of smart embedded systems
  publication-title: Proceedings of the 32nd Annual Conference on Computer Security Applications
– start-page: 197
  year: 2020
  end-page: 215
  ident: br0220
  article-title: Automated construction of security integrity wrappers for industry 4.0 applications
  publication-title: Rewriting Logic and Its Applications - 13th International Workshop
– year: 2015
  ident: br0270
  article-title: Model-Driven Design Using IEC 61499 - a Synchronous Approach for Embedded and Automation Systems
– start-page: 1
  year: 2007
  end-page: 50
  ident: br0110
  article-title: Maude-npa: cryptographic protocol analysis modulo equational properties
  publication-title: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures
– start-page: 696
  year: 2013
  end-page: 701
  ident: br0190
  article-title: The TAMARIN prover for the symbolic analysis of security protocols
  publication-title: Computer Aided Verification - 25th International Conference, Proceedings
– start-page: 89
  year: 2019
  end-page: 111
  ident: br0230
  article-title: Symbolic timed trace equivalence
  publication-title: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows
– year: 2008
  ident: br0030
  article-title: Ttool for DIPLODOCUS: an environment for design space exploration
  publication-title: Proceedings of the 8th International Conference on New Technologies in Distributed Systems
– volume: 4
  start-page: 181
  year: 2005
  end-page: 208
  ident: br0040
  article-title: OFMC: a symbolic model checker for security protocols
  publication-title: Int. J. Inf. Secur.
– start-page: 35
  year: 2018
  ident: 10.1016/j.jlamp.2021.100745_br0020
  article-title: Sysml model transformation for safety and security analysis
– start-page: 696
  year: 2013
  ident: 10.1016/j.jlamp.2021.100745_br0190
  article-title: The TAMARIN prover for the symbolic analysis of security protocols
– volume: 4
  start-page: 181
  year: 2005
  ident: 10.1016/j.jlamp.2021.100745_br0040
  article-title: OFMC: a symbolic model checker for security protocols
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-004-0055-7
– volume: 34
  start-page: 1045
  year: 1955
  ident: 10.1016/j.jlamp.2021.100745_br0180
  article-title: A method for synthesizing sequential circuits
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1955.tb03788.x
– start-page: 881
  year: 2018
  ident: 10.1016/j.jlamp.2021.100745_br0250
  article-title: Using design space exploration to calculate deployment configurations of IEC 61499-based systems
– volume: 83
  start-page: 3
  year: 2014
  ident: 10.1016/j.jlamp.2021.100745_br0200
  article-title: Taming distributed system complexity through formal patterns
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2013.07.004
– volume: 238
  start-page: 233
  year: 2014
  ident: 10.1016/j.jlamp.2021.100745_br0130
  article-title: Bounded memory Dolev-Yao adversaries in collaborative systems
  publication-title: Inf. Comput.
  doi: 10.1016/j.ic.2014.07.011
– start-page: 1
  year: 2007
  ident: 10.1016/j.jlamp.2021.100745_br0110
  article-title: Maude-npa: cryptographic protocol analysis modulo equational properties
– ident: 10.1016/j.jlamp.2021.100745_br0170
– start-page: 147
  year: 2018
  ident: 10.1016/j.jlamp.2021.100745_br0060
  article-title: Soteria: automated iot safety and security analysis
– start-page: 1
  year: 2016
  ident: 10.1016/j.jlamp.2021.100745_br0240
  article-title: Formal security analysis of smart embedded systems
– ident: 10.1016/j.jlamp.2021.100745_br0100
– ident: 10.1016/j.jlamp.2021.100745_br0120
– volume: vol. 95
  year: 2014
  ident: 10.1016/j.jlamp.2021.100745_br0280
  article-title: Modelling Control Systems Using IEC 61499
– volume: vol. 4350
  year: 2007
  ident: 10.1016/j.jlamp.2021.100745_br0080
  article-title: All About Maude: A High-Performance Logical Framework
– volume: 25
  start-page: 585
  year: 2017
  ident: 10.1016/j.jlamp.2021.100745_br0140
  article-title: Time, computational complexity, and probability in the analysis of distance-bounding protocols
  publication-title: J. Comput. Secur.
  doi: 10.3233/JCS-0560
– volume: 29
  start-page: 198
  year: 1983
  ident: 10.1016/j.jlamp.2021.100745_br0090
  article-title: On the security of public key protocols
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1983.1056650
– start-page: 22
  year: 2020
  ident: 10.1016/j.jlamp.2021.100745_br0160
  article-title: Generating correct-by-construction distributed implementations from formal Maude designs
– start-page: 89
  year: 2019
  ident: 10.1016/j.jlamp.2021.100745_br0230
  article-title: Symbolic timed trace equivalence
– start-page: 39
  year: 2008
  ident: 10.1016/j.jlamp.2021.100745_br0070
  article-title: Modular preservation of safety properties by cookie-based dos-protection wrappers
– start-page: 382
  year: 2019
  ident: 10.1016/j.jlamp.2021.100745_br0260
  article-title: Resource-bounded intruders in denial of service attacks
– year: 2015
  ident: 10.1016/j.jlamp.2021.100745_br0270
– start-page: 197
  year: 2020
  ident: 10.1016/j.jlamp.2021.100745_br0220
  article-title: Automated construction of security integrity wrappers for industry 4.0 applications
– start-page: 54
  year: 2013
  ident: 10.1016/j.jlamp.2021.100745_br0050
  article-title: Automatic verification of security protocols in the symbolic model: the verifier proverif
– start-page: 1043
  year: 2019
  ident: 10.1016/j.jlamp.2021.100745_br0210
  article-title: Formal security verification of industry 4.0 applications
– year: 2008
  ident: 10.1016/j.jlamp.2021.100745_br0030
  article-title: Ttool for DIPLODOCUS: an environment for design space exploration
– volume: 23
  year: 2020
  ident: 10.1016/j.jlamp.2021.100745_br0150
  article-title: A formal approach to physics-based attacks in cyber-physical systems
  publication-title: ACM Trans. Priv. Secur.
  doi: 10.1145/3373270
– start-page: 43
  year: 2021
  ident: 10.1016/j.jlamp.2021.100745_br0010
  article-title: On security analysis of periodic systems: expressiveness and complexity
SSID ssj0001687831
Score 2.228201
Snippet Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems,...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 100745
SubjectTerms Bounded intruder
Rewriting logic
Safety
Security
Theory transformation
Verification
Title Automated construction of security integrity wrappers for Industry 4.0 applications
URI https://dx.doi.org/10.1016/j.jlamp.2021.100745
Volume 126
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5zu3jxtzh_kYNH49o0TdPjGI6puMsc7Fbyq7Aha9GJ-N_70qZuguzgrYQ-KF-S9762L9-H0A3kP85FzomF-SZQbzlJJaOEKSmUMFTSyj_lecxHU_Y4i2ctNGjOwri2Sp_765xeZWs_0vNo9sr5vDehjjtQKGFORgiYww7q0CjlsLQ7_Yen0Xj9qYWLRFTOhC6EuJhGf6jq9FoA9k66koZVz4A72fRXjdqoO8MDtOcJI-7Xz3SIWnZ5hPYbMwbs9-YxmvQ_VgXQT2uwLtaysLjI8bv3qMO1NoS7-nyTZQnMDwNnxd6-4wuzuwBv_tE-QdPh_ctgRLxjAtFQilZE51Qby1gaKpGrJA0CyQKTAOaxkTqWJrAwZKI4T4TkhuuUhia0ScJjxVNlolPUXhZLe4awSKyEVw_IhzkUOqqUDCOmnSd1wrg2qotog1GmvZy4c7V4zZq-sUVWAZs5YLMa2C66_QkqazWN7bfzBvzs16LIIN9vCzz_b-AF2qXufEPVmnOJ2jBZ9gpYx0pd-1X1DfNo1S4
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED2VdoCFb8Q3HhgJTVzHdsYKUbUUuhSkbpG_IoFQW0ER4t9zThwoEmJgi6ycFD3bdy_J-T2Ac8x_nMuCRw7nO8J6y6NMMRoxraSWlipa-qfcjXj_gd1M0kkDruqzML6tMuT-KqeX2TqMtAOa7fnjY3tMPXegWMK8jBAyhxVoeXWqtAmt7mDYH31_auFSyNKZ0IdEPqbWHyo7vZ4Qey9dSZOyZ8CfbPqtRi3Vnd4mrAfCSLrVM21Bw023YaM2YyBhb-7AuPu2mCH9dJaY2bcsLJkV5DV41JFKG8Jfvb-o-RyZH0HOSoJ9xwdhlzFZ_qO9Cw-96_urfhQcEyKDpWgRmYIa6xjLEi0LLbI4Viy2AjFPrTKpsrHDIdtJCyEVt9xkNLGJE4KnmmfadvagOZ1N3T4QKZzCVw_MhwUWOqq1SjrMeE9qwbix-gBojVFugpy4d7V4zuu-sae8BDb3wOYVsAdw8RU0r9Q0_r6d1-DnPxZFjvn-r8DD_waewWr__u42vx2MhkewRv1Zh7JN5xiaOHHuBBnIQp-GFfYJCKTYFA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Automated+construction+of+security+integrity+wrappers+for+Industry+4.0+applications&rft.jtitle=Journal+of+logical+and+algebraic+methods+in+programming&rft.au=Nigam%2C+Vivek&rft.au=Talcott%2C+Carolyn&rft.date=2022-04-01&rft.pub=Elsevier+Inc&rft.issn=2352-2208&rft.volume=126&rft_id=info:doi/10.1016%2Fj.jlamp.2021.100745&rft.externalDocID=S2352220821001085
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-2208&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-2208&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-2208&client=summon