{"title":"工业网络政策执行检查","authors":"M. Cheminod","doi":"10.1109/INDIN.2013.6622966","DOIUrl":null,"url":null,"abstract":"Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"98 1","pages":"682-687"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Policy implementation check in industrial networks\",\"authors\":\"M. Cheminod\",\"doi\":\"10.1109/INDIN.2013.6622966\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.\",\"PeriodicalId\":6312,\"journal\":{\"name\":\"2013 11th IEEE International Conference on Industrial Informatics (INDIN)\",\"volume\":\"98 1\",\"pages\":\"682-687\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 11th IEEE International Conference on Industrial Informatics (INDIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIN.2013.6622966\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN.2013.6622966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Policy implementation check in industrial networks
Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with.We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.