Blog
About

77
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Automated Analysis of Access Policies in Industrial Plants

      , , ,

      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

      11-12 September 2014

      Access control, RBAC, access policies, automated analysis, model checking

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Access control policies are a key element for designing and implementing secure industrial distributed systems. A new technique for checking the correct mapping of high-level access policies onto low-level access control mechanisms, which are included in the actual system, is presented in this paper by means of a case study. The proposed approach has been adopted for developing an automated analysis software tool, whose main characteristics are also discussed.

          Related collections

          Most cited references 7

          • Record: found
          • Abstract: not found
          • Article: not found

          Role-based access control models

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Review of Security Issues in Industrial Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Usable Global Network Access Policy for Process Control Systems

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2014
                September 2014
                : 43-52
                Affiliations
                National Research Council of Italy – IEIIT

                c.so Duca degli Abruzzi 24

                I-10129 Torino

                Italywww.ieiit.cnr.it
                10.14236/ewic/ICSCSR2014.6
                © Manuel Cheminod et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                ICSCSR
                2
                St Pölten, Austria
                11-12 September 2014
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
                Product
                Product Information: 1477-9358 BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article