907
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Model for the Analysis of Security Policies in Industrial Networks

      proceedings-article
      1 , 1 , 1 , 2 , 1
      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)
      ICS & SCADA Cyber Security Research 2013
      16-17 September 2013
      Role Based Access Control, Security policy analysis, Security of industrial networks
      Bookmark

            Abstract

            The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitablemodel of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms usually present in the real system implementation. This paper introduces a modeling framework based on the Role Based Access Control (RBAC) technique that includes all the elements needed to support different kinds of automatic security analyses such as policy coherence checks and verifications of correct implementation of policies.

            Content

            Author and article information

            Contributors
            Conference
            September 2013
            September 2013
            : 66-77
            Affiliations
            [1 ]National Research Council of Italy – IEIIT

            c.so Duca degli Abruzzi 24

            I-10129 Torino

            Italy

            www.ieiit.cnr.it
            [2 ]Politecnico di Torino – DAUIN

            c.so Duca degli Abruzzi 24

            I-10129 Torino

            Italy

            www.ieiit.cnr.it
            Article
            10.14236/ewic/ICSCSR2013.8
            52514dc4-5fb7-4625-a287-29276f5f03a2
            © Ivan Cibrario Bertolotti et al. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
            ICSCSR
            1
            Leicester, UK
            16-17 September 2013
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2013
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICSCSR2013.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security policy analysis,Security of industrial networks,Role Based Access Control

            Comments

            Comment on this article