{"id":"https://openalex.org/W2153164542","doi":"https://doi.org/10.1109/icecc.2004.1269564","title":"SDL specification of a security architecture for WorldFIP","display_name":"SDL specification of a security architecture for WorldFIP","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2153164542","doi":"https://doi.org/10.1109/icecc.2004.1269564","mag":"2153164542"},"language":"en","primary_location":{"id":"doi:10.1109/icecc.2004.1269564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecc.2004.1269564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103751144","display_name":"Miguel Le\u00f3n Ch\u00e1vez","orcid":null},"institutions":[{"id":"https://openalex.org/I721619","display_name":"Benem\u00e9rita Universidad Aut\u00f3noma de Puebla","ror":"https://ror.org/03p2z7827","country_code":"MX","type":"education","lineage":["https://openalex.org/I721619"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"M.L. Chavez","raw_affiliation_strings":["Benem\u00e9rita Universidad Aut\u00f3noma de Puebia, Puebla, Mexico"],"affiliations":[{"raw_affiliation_string":"Benem\u00e9rita Universidad Aut\u00f3noma de Puebia, Puebla, Mexico","institution_ids":["https://openalex.org/I721619"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049574538","display_name":"Francisco Rodr\u00edguez Henr\u00edquez","orcid":null},"institutions":[{"id":"https://openalex.org/I68368234","display_name":"Center for Research and Advanced Studies of the National Polytechnic Institute","ror":"https://ror.org/009eqmr18","country_code":"MX","type":"facility","lineage":["https://openalex.org/I59361560","https://openalex.org/I68368234"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"F.R. Henriquez","raw_affiliation_strings":["Secci\u00f3n de Computaci\u00f3n, CINVESTAV, San Pedro Zacatenco, Mexico"],"affiliations":[{"raw_affiliation_string":"Secci\u00f3n de Computaci\u00f3n, CINVESTAV, San Pedro Zacatenco, Mexico","institution_ids":["https://openalex.org/I68368234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103751144"],"corresponding_institution_ids":["https://openalex.org/I721619"],"apc_list":null,"apc_paid":null,"fwci":0.8994,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8179954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"154"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.743447482585907},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.5590206384658813},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5567519068717957},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5317947268486023},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.47135964035987854},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46992528438568115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45642587542533875},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.443812757730484},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.429399698972702},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4031321704387665},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39510250091552734},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.30267059803009033},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.2817399501800537},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2749103307723999},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23715761303901672},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09145700931549072}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.743447482585907},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.5590206384658813},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5567519068717957},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5317947268486023},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.47135964035987854},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46992528438568115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45642587542533875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.443812757730484},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.429399698972702},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4031321704387665},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39510250091552734},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30267059803009033},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.2817399501800537},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2749103307723999},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23715761303901672},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09145700931549072},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecc.2004.1269564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecc.2004.1269564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"14th International Conference on Electronics, Communications and Computers, 2004. CONIELECOMP 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W149923019","https://openalex.org/W1660562555","https://openalex.org/W1992546115","https://openalex.org/W2029271920","https://openalex.org/W2073820557","https://openalex.org/W4289126832"],"related_works":["https://openalex.org/W422595749","https://openalex.org/W2138043360","https://openalex.org/W2263437376","https://openalex.org/W2112397448","https://openalex.org/W2008985775","https://openalex.org/W2759432277","https://openalex.org/W2784006287","https://openalex.org/W198076453","https://openalex.org/W2515916393","https://openalex.org/W4238669181"],"abstract_inverted_index":{"Fieldbuses":[0],"are":[1,72],"special":[2],"purpose":[3],"local":[4],"area":[5],"networks":[6],"(LAN)":[7],"used":[8],"to":[9],"connect":[10],"all":[11],"kinds":[12],"of":[13,98],"devices":[14],"in":[15,22],"a":[16,26,99,111],"factory.":[17],"The":[18,39,67,86],"paper":[19,87],"discusses":[20],"security":[21,27,48,54,62,100],"fieldbuses,":[23],"and":[24,83,94],"presents":[25,88],"architecture,":[28,55],"such":[29],"as":[30],"WorldFIP":[31,103],"(World":[32],"Factory":[33],"Instrumentation":[34],"Protocol),":[35],"for":[36,76,102],"centralized":[37],"fieldbuses.":[38],"discussion":[40,68],"takes":[41],"into":[42],"account,":[43],"on":[44,57,105],"one":[45],"hand,":[46,60],"the":[47,52,58,61,80,84,89,92,106],"services":[49],"defined":[50,64],"by":[51,65],"OSI":[53],"and,":[56],"other":[59],"mechanisms":[63],"WorldFIP.":[66],"shows":[69],"that":[70],"there":[71],"two":[73],"critical":[74],"points":[75],"attacking":[77],"this":[78],"network:":[79],"bus":[81],"arbitrator":[82],"bus.":[85],"specification,":[90],"using":[91],"specification":[93],"description":[95],"language":[96],"(SDL),":[97],"architecture":[101],"based":[104],"RC4":[107],"algorithm,":[108],"which":[109],"is":[110],"lightweight":[112],"cryptographic":[113],"stream":[114],"cipher.":[115]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
