Skip to main content
Log in

Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!

  • HAUPTBEITRAG
  • INDUSTRIE 4.0 MEETS IT-SICHERHEIT
  • Published:
Informatik-Spektrum Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Trusted Cloud. http://trusted-cloud.de, letzter Zugriff: 5.11.2014

  2. Eckert C (2013) IT – Sicherheit – Konzepte, Verfahren, Protokolle, 8. Ausg. Oldenbourg

  3. Filipovic B, Schimmel O (2012) Schutz eingebetteter Systeme vor Produktpiraterie: Technologischer Hintergrund und Vorbeugemaßnahmen. AISEC Studie

  4. Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. Adv Cryptol – EUROCRYPT 2008, 146–162

  5. Merli D, Sigl G (2012) Physical Unclonable Functions – Identitäten für eingebettete Systeme. Datensch Datensich 12:876–880

    Article  Google Scholar 

  6. Park D, Kim K, Lee P (2005) Public Key Encryption with Conjunctive Field Keyword Search. Inform Secur Appl 3325:73–86

    Google Scholar 

  7. VDI/VDE Innovation + Technik GmbH: Sicheres Cloud Computing. http://www.vdivde-it.de/KIS/sichere-ikt/sicheres-cloud-computing, letzter Zugriff: 5.11.2014.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudia Eckert.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eckert, C., Fallenbeck, N. Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!. Informatik Spektrum 38, 217–223 (2015). https://doi.org/10.1007/s00287-015-0875-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-015-0875-z

Navigation