메뉴 건너뛰기




Volumn 8, Issue 2, 2014, Pages 6-17

Industrial cybersecurity: Improving security through access control policy models

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL;

EID: 84903206204     PISSN: 19324529     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIE.2014.2311313     Document Type: Article
Times cited : (25)

References (37)
  • 1
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial communication systems
    • DOI 10.1109/JPROC.2005.849714, Industrial Communication Systems
    • D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, 2005 (Pubitemid 40928634)
    • (2005) Proceedings of the IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.P.3    Crevatin, M.4
  • 3
    • 84871964962 scopus 로고    scopus 로고
    • Review of security issues in industrial networks
    • M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, 2013
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , Issue.1 , pp. 277-293
    • Cheminod, M.1    Durante, L.2    Valenzano, A.3
  • 4
    • 78650891506 scopus 로고    scopus 로고
    • Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
    • L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Delivery., vol. 26, no. 1, pp. 161-172, 2011
    • (2011) IEEE Trans. Power Delivery. , vol.26 , Issue.1 , pp. 161-172
    • Piètre-Cambacédès, L.1    Tritschler, M.2    Ericsson, G.N.3
  • 6
    • 67651162241 scopus 로고    scopus 로고
    • Improving the cybersecurity of SCADA communication networks
    • S. C. Patel, G. D. Bhatt, and J. H. Graham, "Improving the cybersecurity of SCADA communication networks," Commun. ACM, vol. 52, no. 7, pp. 139-142, 2009
    • (2009) Commun ACM , vol.52 , Issue.7 , pp. 139-142
    • Patel, S.C.1    Bhatt, G.D.2    Graham, J.H.3
  • 10
    • 77954005795 scopus 로고    scopus 로고
    • Cybersecurity and power system communication-Essential parts of a smart grid infrastructure
    • G. N. Ericsson, "Cybersecurity and power system communication- Essential parts of a smart grid infrastructure," IEEE Trans. Power Delivery, vol. 25, no. 3, pp. 1501-1507, 2010
    • (2010) IEEE Trans. Power Delivery , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.N.1
  • 12
    • 84890069861 scopus 로고    scopus 로고
    • Information Technology-Security Techniques-Information Security Management Systems-Requirements
    • Information Technology-Security Techniques-Information Security Management Systems-Requirements, ISO/IEC Std. 27 001, 2005
    • (2005) ISO/IEC Std 27 001
  • 13
    • 24944551836 scopus 로고    scopus 로고
    • Recommended Security Controls for Federal Information Systems and Organizations
    • Recommended Security Controls for Federal Information Systems and Organizations, NIST SP 800-53 rev. 3, 2010
    • (2010) NIST SP 800-53 Rev , vol.3
  • 14
    • 84903149317 scopus 로고    scopus 로고
    • Industrial Communication Networks-Network and System Security-Part 1-1: Terminology
    • Industrial Communication Networks-Network and System Security-Part 1-1: Terminology, Concepts and Models, IEC/TS 62443-1-1, 2009
    • (2009) Concepts and Models, IEC/TS 62443 , pp. 1-1
  • 16
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. H. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976
    • (1976) Commun ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.H.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 18
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, MA
    • K. J. Biba, "Integrity considerations for secure computer systems," Tech. Rep. TR-3153, The Mitre Corporation, Bedford, MA, 1977
    • (1977) Tech. Rep. TR-3153, the Mitre Corporation
    • Biba, K.J.1
  • 20
    • 24644450643 scopus 로고    scopus 로고
    • Role Based Access Control
    • Role Based Access Control, ANSI INCITS 359-2012, 2012
    • (2012) ANSI INCITS 359-2012
  • 21
    • 84903188318 scopus 로고    scopus 로고
    • Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 8: Role-Based Access Control
    • Power Systems Management and Associated Information Exchange-Data and Communications Security-Part 8: Role-Based Access Control, IEC/TS 62351-8, 2011
    • (2011) IEC/TS 62351-8
  • 23
    • 37349091904 scopus 로고    scopus 로고
    • Conformance checking of access control policies specified in XACML
    • DOI 10.1109/COMPSAC.2007.96, 4291136, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
    • V. C. Hu, E. Martin, J. Hwang, and T. Xie, "Conformance checking of access control policies specified in XACML," in Proc. 31st IEEE Annual Int. Computer Software Applications Conf. (COMPSAC), Beijing, July 23-27, 2007, pp. 275-280 (Pubitemid 350301805)
    • (2007) Proceedings - International Computer Software and Applications Conference , vol.2 , pp. 275-280
    • Hu, V.C.1    Martin, E.2    Hwang, J.3    Xie, T.4
  • 25
    • 77952740950 scopus 로고    scopus 로고
    • Conformance testing of temporal role-based access control systems
    • M. Masood, A. Ghafoor, and A. Mathur, "Conformance testing of temporal role-based access control systems," IEEE Trans. Dependable Secure Comput., vol. 7, no. 2, pp. 144-158, 2010
    • (2010) IEEE Trans. Dependable Secure Comput. , vol.7 , Issue.2 , pp. 144-158
    • Masood, M.1    Ghafoor, A.2    Mathur, A.3
  • 28
    • 84890559430 scopus 로고    scopus 로고
    • Verification and enforcement of access control policies
    • A. Cau, H. Janicke, and B. Moszkowski, "Verification and enforcement of access control policies," Formal Meth. Syst. Des., vol. 43, no. 3, pp. 450-492, 2013
    • (2013) Formal Meth. Syst. Des. , vol.43 , Issue.3 , pp. 450-492
    • Cau, A.1    Janicke, H.2    Moszkowski, B.3
  • 30
    • 58849130197 scopus 로고    scopus 로고
    • Usable global network access policy for process control systems
    • D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 30-36, 2008
    • (2008) IEEE Security Privacy , vol.6 , Issue.6 , pp. 30-36
    • Nicol, D.M.1    Sanders, W.H.2    Singh, S.3    Seri, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.