{"title":"Analysis of access control policies in networked embedded systems: A case study","authors":"M. Cheminod, L. Durante, L. Seno, A. Valenzano","doi":"10.1109/SIES.2015.7185042","DOIUrl":null,"url":null,"abstract":"The increasing adoption of networked embedded devices in the industrial scenario demands for new techniques and computer-aided tools that could help in designing, deploying and maintaining large and complex systems. This is true, in particular, when access control is considered, since the hardware and software characteristics of many industrial embedded devices prevent the introduction of policies enforcement mechanisms at a global system level. This paper deals with our experience in analyzing the correct implementation of access policies in a medium-sized real-world system. Our approach is based on an innovative type of model and software analyzer, which is able to compare two different views of the target system, described at different abstraction levels.","PeriodicalId":328716,"journal":{"name":"10th IEEE International Symposium on Industrial Embedded Systems (SIES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE International Symposium on Industrial Embedded Systems (SIES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIES.2015.7185042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The increasing adoption of networked embedded devices in the industrial scenario demands for new techniques and computer-aided tools that could help in designing, deploying and maintaining large and complex systems. This is true, in particular, when access control is considered, since the hardware and software characteristics of many industrial embedded devices prevent the introduction of policies enforcement mechanisms at a global system level. This paper deals with our experience in analyzing the correct implementation of access policies in a medium-sized real-world system. Our approach is based on an innovative type of model and software analyzer, which is able to compare two different views of the target system, described at different abstraction levels.