-
1
-
-
84990841502
-
Cyber-physical systems in manufacturing
-
Monostori, L., Kdr, B., Bauernhansl, T., Kondoh, S., Kumara, S., Reinhart, G., Sauer, O., Schuh, G., Sihn, W., Ueda, K., Cyber-physical systems in manufacturing. CIRP Ann. Manuf. Technol. 65:2 (2016), 621–641, 10.1016/j.cirp.2016.06.005.
-
(2016)
CIRP Ann. Manuf. Technol.
, vol.65
, Issue.2
, pp. 621-641
-
-
Monostori, L.1
Kdr, B.2
Bauernhansl, T.3
Kondoh, S.4
Kumara, S.5
Reinhart, G.6
Sauer, O.7
Schuh, G.8
Sihn, W.9
Ueda, K.10
-
2
-
-
85041489708
-
-
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Overview of cyber vulnerabilities, last retrieved in May, 2017
-
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Overview of cyber vulnerabilities, 2017, https://ics-cert.us-cert.gov/content/overview-cyber-vulnerabilities, last retrieved in May 2017.
-
(2017)
-
-
-
3
-
-
85041458909
-
-
for Information Security, Industrial control system security: top 10 threats and countermeasures 2016, (, last retrieved in May 2017).
-
Federal Office for Information Security, Industrial control system security: top 10 threats and countermeasures 2016, 2016, (https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=3, last retrieved in May 2017).
-
(2016)
-
-
Federal office1
-
4
-
-
85041462951
-
-
International Society of Automation, ISA-95 standard, (, last retrieved in December 2017).
-
International Society of Automation, ISA-95 standard, 2017, (https://www.isa.org/isa95/, last retrieved in December 2017).
-
(2017)
-
-
-
5
-
-
84906829591
-
An access control model for cloud computing
-
Younis, Y.A., Kifayat, K., Merabti, M., An access control model for cloud computing. J. Inf. Secur. Appl. 19:1 (2014), 45–60.
-
(2014)
J. Inf. Secur. Appl.
, vol.19
, Issue.1
, pp. 45-60
-
-
Younis, Y.A.1
Kifayat, K.2
Merabti, M.3
-
6
-
-
84893619200
-
Guidelines for Access Control System Evaluation Metrics
-
US Department of Commerce, National Institute of Standards and Technology
-
Hu, V.C., Kent, K.A., Guidelines for Access Control System Evaluation Metrics. 2012, US Department of Commerce, National Institute of Standards and Technology.
-
(2012)
-
-
Hu, V.C.1
Kent, K.A.2
-
7
-
-
0028513932
-
Access control: principle and practice
-
Sandhu, R.S., Samarati, P., Access control: principle and practice. IEEE Commun. Mag. 32:9 (1994), 40–48.
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
9
-
-
84964853055
-
Access control: policies, models, and mechanisms
-
Samarati, P., Di Vimercati, S.D.C., Access control: policies, models, and mechanisms. Lect. Notes Comput. Sci. 2171 (2001), 137–196.
-
(2001)
Lect. Notes Comput. Sci.
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
10
-
-
79958728460
-
Mandatory access control, Master's Thesis in Computing Science, Umea University, Department of Computing Science, SE-901
-
Lindqvist, H., Mandatory access control, Master's Thesis in Computing Science, Umea University, Department of Computing Science, SE-901., 87, 2006.
-
(2006)
, vol.87
-
-
Lindqvist, H.1
-
11
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE CORP BEDFORD MA
-
Biba, K.J., Integrity considerations for secure computer systems. Technical report, 1977, MITRE CORP BEDFORD MA.
-
(1977)
Technical report
-
-
Biba, K.J.1
-
12
-
-
0002262722
-
Role-based access control (RBAC): features and motivations
-
Ferraiolo, D., Cugini, J., Kuhn, D.R., Role-based access control (RBAC): features and motivations. Proceedings of the Eleventh Annual Computer Security Application Conference, 1995, 241–248.
-
(1995)
Proceedings of the Eleventh Annual Computer Security Application Conference
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, D.R.3
-
13
-
-
85041456980
-
-
Access control (v0.1), (, last retrieved in May 2017).
-
B. Laurie, Access control (v0.1), 2017, (http://www.links.org/files/capabilities.pdf, last retrieved in May 2017).
-
(2017)
-
-
Laurie, B.1
-
14
-
-
84855407965
-
A survey on access control deployment
-
Springer Berlin, Heidelberg
-
Suhendra, V., A survey on access control deployment. International Conference on Security Technology, 2011, Springer, Berlin, Heidelberg, 11–20.
-
(2011)
International Conference on Security Technology
, pp. 11-20
-
-
Suhendra, V.1
-
15
-
-
33846529690
-
Administrative Models for Role-Based Access Control
-
George Mason University
-
Munawer, Q., Administrative Models for Role-Based Access Control. 2000, George Mason University.
-
(2000)
-
-
Munawer, Q.1
-
16
-
-
77956230516
-
Role engineering via prioritized subset enumeration
-
Vaidya, J., Atluri, V., Warner, J., Guo, Q., Role engineering via prioritized subset enumeration. IEEE Trans. Dependable Secur. Comput. 7:3 (2010), 300–314.
-
(2010)
IEEE Trans. Dependable Secur. Comput.
, vol.7
, Issue.3
, pp. 300-314
-
-
Vaidya, J.1
Atluri, V.2
Warner, J.3
Guo, Q.4
-
17
-
-
77954932478
-
On the definition of role mining
-
ACM
-
Frank, M., Buhmann, J.M., Basin, D., On the definition of role mining. Proceedings of the Fifteenth ACM Symposium on Access Control Models and Technologies, 2010, ACM, 35–44.
-
(2010)
Proceedings of the Fifteenth ACM Symposium on Access Control Models and Technologies
, pp. 35-44
-
-
Frank, M.1
Buhmann, J.M.2
Basin, D.3
-
18
-
-
84948950552
-
A model for attribute-based user-role assignment
-
IEEE
-
Al-Kahtani, M.A., Sandhu, R., A model for attribute-based user-role assignment. Proceedings of the Eighteenth Annual Computer Security Applications Conference, 2002, IEEE, 353–362.
-
(2002)
Proceedings of the Eighteenth Annual Computer Security Applications Conference
, pp. 353-362
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
19
-
-
84873425163
-
A unified attribute-based access control model covering DAC, MAC and RBAC
-
Jin, X., Krishnan, R., Sandhu, R.S., A unified attribute-based access control model covering DAC, MAC and RBAC. DBSec 12 (2012), 41–55.
-
(2012)
DBSec
, vol.12
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.S.3
-
20
-
-
33745450500
-
Formal model and policy specification of usage control
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J., Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8:4 (2005), 351–387.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
-
21
-
-
84880621938
-
A capability-based security approach to manage access control in the internet of things
-
Gusmeroli, S., Piccione, S., Rotondi, D., A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58:5 (2013), 1189–1205.
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.5
, pp. 1189-1205
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
22
-
-
34548769351
-
Fuzzy multi-level security: an experiment on quantified risk-adaptive access control
-
IEEE
-
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S., Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. Proceedings of the IEEE Symposium on Security and Privacy, 2007, IEEE, 222–230.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 222-230
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
23
-
-
0038825675
-
Task–role-based access control model
-
Oh, S., Park, S., Task–role-based access control model. Inf. Syst. 28:6 (2003), 533–562.
-
(2003)
Inf. Syst.
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
24
-
-
79957927304
-
Ensuring access control in cloud provisioned healthcare systems
-
IEEE
-
Narayanan, H.A.J., Güneş, M.H., Ensuring access control in cloud provisioned healthcare systems. Proceedings of the Consumer Communications and Networking Conference (CCNC), 2011, IEEE, 247–251.
-
(2011)
Proceedings of the Consumer Communications and Networking Conference (CCNC)
, pp. 247-251
-
-
Narayanan, H.A.J.1
Güneş, M.H.2
-
25
-
-
84947925429
-
Task-role based access control (T-RBAC): an improved access control model for enterprise environment
-
Springer
-
Oh, S., Park, S., Task-role based access control (T-RBAC): an improved access control model for enterprise environment. Proceedings of the International Conference on Database and Expert Systems Applications, 2000, Springer, 264–273.
-
(2000)
Proceedings of the International Conference on Database and Expert Systems Applications
, pp. 264-273
-
-
Oh, S.1
Park, S.2
-
26
-
-
0013176783
-
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
-
Springer-Verlag
-
Fischer-Hübner, S., IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. 2001, Springer-Verlag.
-
(2001)
-
-
Fischer-Hübner, S.1
-
27
-
-
77955210831
-
Privacy-aware role-based access control
-
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.-M., Karat, J., Trombeta, A., Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur., 13(3), 2010, 24.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
, pp. 24
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Brodie, C.4
Karat, C.-M.5
Karat, J.6
Trombeta, A.7
-
28
-
-
84886928358
-
Distributed capability-based access control for the internet of things
-
Hernandez-Ramos, J.L., Jara, A.J., Marın, L., Skarmeta, A.F., Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3:3/4 (2013), 1–16.
-
(2013)
J. Internet Serv. Inf. Secur.
, vol.3
, Issue.3-4
, pp. 1-16
-
-
Hernandez-Ramos, J.L.1
Jara, A.J.2
Marın, L.3
Skarmeta, A.F.4
-
29
-
-
33845420049
-
The computational complexity of enforceability validation for generic access control rules
-
IEEE
-
Hu, V.C., Kuhn, D.R., Ferraiolo, D.F., The computational complexity of enforceability validation for generic access control rules. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1, 2006, IEEE, 7–pp.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 7-pp
-
-
Hu, V.C.1
Kuhn, D.R.2
Ferraiolo, D.F.3
-
30
-
-
85041478806
-
-
WG15 of IEC TC57, IEC 62351, (, last retrieved in May 2017).
-
WG15 of IEC TC57, IEC 62351, 2007, (http://www.iec.ch/smartgrid/standards/, last retrieved in May 2017).
-
(2007)
-
-
-
31
-
-
55549116194
-
Guide to Industrial Control Systems (ICS) Security
-
Special Publication (NIST SP)-800-82 Rev 1
-
Stouffer, K.A., Falco, J.A., Scarfone, K.A., Guide to Industrial Control Systems (ICS) Security. 2013, Special Publication (NIST SP)-800-82 Rev 1.
-
(2013)
-
-
Stouffer, K.A.1
Falco, J.A.2
Scarfone, K.A.3
-
32
-
-
33947625881
-
Assessment of Access Control Systems
-
US Department of Commerce, National Institute of Standards and Technology
-
Hu, V.C., Ferraiolo, D., Kuhn, D.R., Assessment of Access Control Systems. 2006, US Department of Commerce, National Institute of Standards and Technology.
-
(2006)
-
-
Hu, V.C.1
Ferraiolo, D.2
Kuhn, D.R.3
|