934
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Role Logic and its Application to the Analysis of Process Control Systems from the Socio–Technical System Perspective

      Published
      proceedings-article
      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)
      ICS & SCADA Cyber Security Research 2013
      16-17 September 2013
      Socio–Technial Systems, Role Theory, Role Logic, Process Control Systems
      Bookmark

            Abstract

            Security requirements for process control systems can be viewed as a social construct derived from the culture and society within which the requirement is said to exist. To capture and understand these requirements we need to make use of a formal reasoning system that supports a rigorous deductive process. Socio–Technical Systems thinking offers us the ability to express the wider socio–context within which an ICT system can be said to operate. In this paper we will extend the π-calculus model of actions via the creation of role logic. Then via the application of responsibility modelling and role logic we will demonstrate how a model of a Socio–Technical process control system can be created and analysed so as to identify critical dependancies.

            Author and article information

            Contributors
            Conference
            September 2013
            September 2013
            : 42-47
            Affiliations
            [0001]Information Security Research Group

            Faculty of Computing, Engineering and Science

            University of South Wales

            Treforest, RCT, CF37 1DL

            UK
            Article
            10.14236/ewic/ICSCSR2013.5
            77bc01db-17e3-4aa3-a1cc-cd2cf07a608b
            © Andrew John Charles Blyth. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
            ICSCSR
            1
            Leicester, UK
            16-17 September 2013
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2013
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICSCSR2013.5
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Socio–Technial Systems,Role Theory,Role Logic,Process Control Systems

            Comments

            Comment on this article