The specification and verification of access control policies are fundamental steps in the process of securing industrial control systems and critical infrastructures. The focus of this paper is on bridging the semantic gap between high-level access control policies specified in the Role-Based Access Control (RBAC) framework and the low-level security mechanisms actually implemented in the physical system. Our approach is based on a novel kind of model, which includes two distinct views of the system, namely an RBAC-based specification and a low-level system de- scription. The descriptive capabilities of the model are presented through an example derived from a real proto- type plant for printed circuit boards re-manufacturing/de- manufacturing.
On the description of access control policies in networked industrial systems / Cheminod, M.; Durante, L.; Seno, L.; Valenzano, A.. - (2014), pp. 1-10. (Intervento presentato al convegno IEEE 10th International Workshop on Factory Communication Systems (WFCS) tenutosi a Toulouse (France) nel May 5-7, 2014) [10.1109/wfcs.2014.6837594].
On the description of access control policies in networked industrial systems
Cheminod, M.;Durante, L.;Valenzano, A.
2014
Abstract
The specification and verification of access control policies are fundamental steps in the process of securing industrial control systems and critical infrastructures. The focus of this paper is on bridging the semantic gap between high-level access control policies specified in the Role-Based Access Control (RBAC) framework and the low-level security mechanisms actually implemented in the physical system. Our approach is based on a novel kind of model, which includes two distinct views of the system, namely an RBAC-based specification and a low-level system de- scription. The descriptive capabilities of the model are presented through an example derived from a real proto- type plant for printed circuit boards re-manufacturing/de- manufacturing.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2989345
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo