The specification and verification of access control policies are fundamental steps in the process of securing industrial control systems and critical infrastructures. The focus of this paper is on bridging the semantic gap between high-level access control policies specified in the Role-Based Access Control (RBAC) framework and the low-level security mechanisms actually implemented in the physical system. Our approach is based on a novel kind of model, which includes two distinct views of the system, namely an RBAC-based specification and a low-level system de- scription. The descriptive capabilities of the model are presented through an example derived from a real proto- type plant for printed circuit boards re-manufacturing/de- manufacturing.

On the description of access control policies in networked industrial systems / Cheminod, M.; Durante, L.; Seno, L.; Valenzano, A.. - (2014), pp. 1-10. (Intervento presentato al convegno IEEE 10th International Workshop on Factory Communication Systems (WFCS) tenutosi a Toulouse (FRA) nel May 5-7, 2014) [10.1109/wfcs.2014.6837594].

On the description of access control policies in networked industrial systems

Cheminod, M.;Durante, L.;Valenzano, A.
2014

Abstract

The specification and verification of access control policies are fundamental steps in the process of securing industrial control systems and critical infrastructures. The focus of this paper is on bridging the semantic gap between high-level access control policies specified in the Role-Based Access Control (RBAC) framework and the low-level security mechanisms actually implemented in the physical system. Our approach is based on a novel kind of model, which includes two distinct views of the system, namely an RBAC-based specification and a low-level system de- scription. The descriptive capabilities of the model are presented through an example derived from a real proto- type plant for printed circuit boards re-manufacturing/de- manufacturing.
2014
978-1-4799-3235-1
File in questo prodotto:
File Dimensione Formato  
21_281423_GrOA.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 2.2 MB
Formato Adobe PDF
2.2 MB Adobe PDF Visualizza/Apri
On_the_description_of_access_control_policies_in_networked_industrial_systems.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 2.8 MB
Formato Adobe PDF
2.8 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2989345