Blog
About

  • Record: found
  • Abstract: found
  • Article: found
Is Open Access

Automated Analysis of Access Policies in Industrial Plants

, , ,

2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

11-12 September 2014

Access control, RBAC, access policies, automated analysis, model checking

Read this article at

Bookmark
      There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

      Abstract

      Access control policies are a key element for designing and implementing secure industrial distributed systems. A new technique for checking the correct mapping of high-level access policies onto low-level access control mechanisms, which are included in the actual system, is presented in this paper by means of a case study. The proposed approach has been adopted for developing an automated analysis software tool, whose main characteristics are also discussed.

      Related collections

      Most cited references 7

      • Record: found
      • Abstract: not found
      • Article: not found

      Role-based access control models

        Bookmark
        • Record: found
        • Abstract: not found
        • Article: not found

        Review of Security Issues in Industrial Networks

          Bookmark
          • Record: found
          • Abstract: not found
          • Article: not found

          Usable Global Network Access Policy for Process Control Systems

            Bookmark

            Author and article information

            Affiliations
            National Research Council of Italy – IEIIT

            c.so Duca degli Abruzzi 24

            I-10129 Torino

            Italywww.ieiit.cnr.it
            Contributors
            Conference
            September 2014
            September 2014
            : 43-52
            10.14236/ewic/ICSCSR2014.6
            © Manuel Cheminod et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            ICSCSR
            2
            St Pölten, Austria
            11-12 September 2014
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            Product
            Product Information: 1477-9358 BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Comments

            Comment on this article