Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Policy implementation check in industrial networks

Conference Paper
Publication Date:
2013
abstract:
Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.
Iris type:
04.01 Contributo in Atti di convegno
Keywords:
access control; access policies; industrial ; networked embedded systems; network security
List of contributors:
Cheminod, Manuel
Authors of the University:
CHEMINOD MANUEL
Handle:
https://iris.cnr.it/handle/20.500.14243/270568
Published in:
IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS
Series
  • Overview

Overview

URL

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6622966
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)