Blog
About

81
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Model for the Analysis of Security Policies in Industrial Networks

      1 , 1 , 1 , 2 , 1

      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)

      ICS & SCADA Cyber Security Research 2013

      16-17 September 2013

      Role Based Access Control, Security policy analysis, Security of industrial networks

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitablemodel of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms usually present in the real system implementation. This paper introduces a modeling framework based on the Role Based Access Control (RBAC) technique that includes all the elements needed to support different kinds of automatic security analyses such as policy coherence checks and verifications of correct implementation of policies.

          Related collections

          Most cited references 8

          • Record: found
          • Abstract: not found
          • Article: not found

          Role-based access control models

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Review of Security Issues in Industrial Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Conformance Testing of Temporal Role-Based Access Control Systems

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2013
                September 2013
                : 66-77
                Affiliations
                [1 ]National Research Council of Italy – IEIIT

                c.so Duca degli Abruzzi 24

                I-10129 Torino

                Italy

                www.ieiit.cnr.it
                [2 ]Politecnico di Torino – DAUIN

                c.so Duca degli Abruzzi 24

                I-10129 Torino

                Italy

                www.ieiit.cnr.it
                10.14236/ewic/ICSCSR2013.8
                © Ivan Cibrario Bertolotti et al. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
                ICSCSR
                1
                Leicester, UK
                16-17 September 2013
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2013
                Product
                Product Information: 1477-9358 BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article