Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.

Policy implementation check in industrial networks

M Cheminod
2013

Abstract

Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.
2013
Inglese
11th IEEE International Conference on Industrial Informatics (INDIN), 2013
682
687
6
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6622966
Sì, ma tipo non specificato
29-31 July 2013
Bochum
access control
access policies
industrial
networked embedded systems
network security
1
none
M. Cheminod
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/270568
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact