dc.contributor.author | Køien, Geir M. | |
dc.date.accessioned | 2022-03-23T11:18:02Z | |
dc.date.available | 2022-03-23T11:18:02Z | |
dc.date.created | 2021-12-07T19:14:31Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Køien, G. M. (2021). Zero-Trust Principles for Legacy Components. Wireless Personal Communications, 121(2), 1169-1186. | en_US |
dc.identifier.issn | 0929-6212 | |
dc.identifier.uri | https://hdl.handle.net/11250/2987072 | |
dc.description.abstract | In this paper we briefly outline as set of rules for integration of legacy devices into a modern industrial control system. These rules are fairly simple, and are mostly derived from “Zero Trust” principles. These rules aim to be pragmatic, and cost-effectiveness trumps completeness. | en_US |
dc.language.iso | eng | en_US |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | Zero-Trust Principles for Legacy Components: 12 Rules for Legacy Devices: An Antidote to Chaos | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | publishedVersion | en_US |
dc.rights.holder | © The Author(s) 2021. | en_US |
dc.source.pagenumber | 1169-1186 | en_US |
dc.source.volume | 121 | en_US |
dc.source.journal | Wireless personal communications | en_US |
dc.source.issue | 2 | en_US |
dc.identifier.doi | https://doi.org/10.1007/s11277-021-09055-1 | |
dc.identifier.cristin | 1965816 | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |