Prevention from system users data misuse by controlling data access authorizations and monitoring data traces.
Protection against industrial malware attacks by encrypting and signing messages among sensors, actuators, PLCs, SCADA Servers HMI devices in OT networks.
Additional security layer at application level that avoids access to non-authorized data.
University of Navarra
University of Aberdeen
Quatela Lynch McCurdy