The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitablemodel of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms usually present in the real system implementation. This paper introduces a modeling framework based on the Role Based Access Control (RBAC) technique that includes all the elements needed to support different kinds of automatic security analyses such as policy coherence checks and verifications of correct implementation of policies.
A Model for the Analysis of Security Policies in Industrial Networks / CIBRARIO BERTOLOTTI, Ivan; Durante, Luca; Hu, Tingting; Valenzano, Adriano. - STAMPA. - (2013), pp. 66-77. (Intervento presentato al convegno 1st International Symposium for ICS and SCADA Cyber Security Research nel 2013).
A Model for the Analysis of Security Policies in Industrial Networks
CIBRARIO BERTOLOTTI, IVAN;DURANTE, LUCA;HU, TINGTING;VALENZANO, ADRIANO
2013
Abstract
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitablemodel of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms usually present in the real system implementation. This paper introduces a modeling framework based on the Role Based Access Control (RBAC) technique that includes all the elements needed to support different kinds of automatic security analyses such as policy coherence checks and verifications of correct implementation of policies.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2519291
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo