2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)
ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
11-12 September 2014
Access control policies are a key element for designing and implementing secure industrial distributed systems. A new technique for checking the correct mapping of high-level access policies onto low-level access control mechanisms, which are included in the actual system, is presented in this paper by means of a case study. The proposed approach has been adopted for developing an automated analysis software tool, whose main characteristics are also discussed.