메뉴 건너뛰기




Volumn 134, Issue , 2018, Pages 46-54

Access control for cyber-physical systems interconnected to the cloud

Author keywords

Access; Cloud; Control; Cyber; Physical; Security; Systems

Indexed keywords

CLOUDS; COMPUTER SYSTEMS; CONTROL ENGINEERING; CYBER PHYSICAL SYSTEM; ECONOMIC AND SOCIAL EFFECTS; EMBEDDED SYSTEMS;

EID: 85041472618     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2018.01.037     Document Type: Article
Times cited : (52)

References (32)
  • 2
    • 85041489708 scopus 로고    scopus 로고
    • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Overview of cyber vulnerabilities, last retrieved in May, 2017
    • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Overview of cyber vulnerabilities, 2017, https://ics-cert.us-cert.gov/content/overview-cyber-vulnerabilities, last retrieved in May 2017.
    • (2017)
  • 3
    • 85041458909 scopus 로고    scopus 로고
    • for Information Security, Industrial control system security: top 10 threats and countermeasures 2016, (, last retrieved in May 2017).
    • Federal Office for Information Security, Industrial control system security: top 10 threats and countermeasures 2016, 2016, (https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=3, last retrieved in May 2017).
    • (2016)
    • Federal office1
  • 4
    • 85041462951 scopus 로고    scopus 로고
    • International Society of Automation, ISA-95 standard, (, last retrieved in December 2017).
    • International Society of Automation, ISA-95 standard, 2017, (https://www.isa.org/isa95/, last retrieved in December 2017).
    • (2017)
  • 5
    • 84906829591 scopus 로고    scopus 로고
    • An access control model for cloud computing
    • Younis, Y.A., Kifayat, K., Merabti, M., An access control model for cloud computing. J. Inf. Secur. Appl. 19:1 (2014), 45–60.
    • (2014) J. Inf. Secur. Appl. , vol.19 , Issue.1 , pp. 45-60
    • Younis, Y.A.1    Kifayat, K.2    Merabti, M.3
  • 6
    • 84893619200 scopus 로고    scopus 로고
    • Guidelines for Access Control System Evaluation Metrics
    • US Department of Commerce, National Institute of Standards and Technology
    • Hu, V.C., Kent, K.A., Guidelines for Access Control System Evaluation Metrics. 2012, US Department of Commerce, National Institute of Standards and Technology.
    • (2012)
    • Hu, V.C.1    Kent, K.A.2
  • 7
    • 0028513932 scopus 로고
    • Access control: principle and practice
    • Sandhu, R.S., Samarati, P., Access control: principle and practice. IEEE Commun. Mag. 32:9 (1994), 40–48.
    • (1994) IEEE Commun. Mag. , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 9
    • 84964853055 scopus 로고    scopus 로고
    • Access control: policies, models, and mechanisms
    • Samarati, P., Di Vimercati, S.D.C., Access control: policies, models, and mechanisms. Lect. Notes Comput. Sci. 2171 (2001), 137–196.
    • (2001) Lect. Notes Comput. Sci. , vol.2171 , pp. 137-196
    • Samarati, P.1    Di Vimercati, S.D.C.2
  • 10
    • 79958728460 scopus 로고    scopus 로고
    • Mandatory access control, Master's Thesis in Computing Science, Umea University, Department of Computing Science, SE-901
    • Lindqvist, H., Mandatory access control, Master's Thesis in Computing Science, Umea University, Department of Computing Science, SE-901., 87, 2006.
    • (2006) , vol.87
    • Lindqvist, H.1
  • 11
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE CORP BEDFORD MA
    • Biba, K.J., Integrity considerations for secure computer systems. Technical report, 1977, MITRE CORP BEDFORD MA.
    • (1977) Technical report
    • Biba, K.J.1
  • 13
    • 85041456980 scopus 로고    scopus 로고
    • Access control (v0.1), (, last retrieved in May 2017).
    • B. Laurie, Access control (v0.1), 2017, (http://www.links.org/files/capabilities.pdf, last retrieved in May 2017).
    • (2017)
    • Laurie, B.1
  • 14
    • 84855407965 scopus 로고    scopus 로고
    • A survey on access control deployment
    • Springer Berlin, Heidelberg
    • Suhendra, V., A survey on access control deployment. International Conference on Security Technology, 2011, Springer, Berlin, Heidelberg, 11–20.
    • (2011) International Conference on Security Technology , pp. 11-20
    • Suhendra, V.1
  • 15
    • 33846529690 scopus 로고    scopus 로고
    • Administrative Models for Role-Based Access Control
    • George Mason University
    • Munawer, Q., Administrative Models for Role-Based Access Control. 2000, George Mason University.
    • (2000)
    • Munawer, Q.1
  • 19
    • 84873425163 scopus 로고    scopus 로고
    • A unified attribute-based access control model covering DAC, MAC and RBAC
    • Jin, X., Krishnan, R., Sandhu, R.S., A unified attribute-based access control model covering DAC, MAC and RBAC. DBSec 12 (2012), 41–55.
    • (2012) DBSec , vol.12 , pp. 41-55
    • Jin, X.1    Krishnan, R.2    Sandhu, R.S.3
  • 21
    • 84880621938 scopus 로고    scopus 로고
    • A capability-based security approach to manage access control in the internet of things
    • Gusmeroli, S., Piccione, S., Rotondi, D., A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58:5 (2013), 1189–1205.
    • (2013) Math. Comput. Model. , vol.58 , Issue.5 , pp. 1189-1205
    • Gusmeroli, S.1    Piccione, S.2    Rotondi, D.3
  • 23
    • 0038825675 scopus 로고    scopus 로고
    • Task–role-based access control model
    • Oh, S., Park, S., Task–role-based access control model. Inf. Syst. 28:6 (2003), 533–562.
    • (2003) Inf. Syst. , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 26
    • 0013176783 scopus 로고    scopus 로고
    • IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
    • Springer-Verlag
    • Fischer-Hübner, S., IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. 2001, Springer-Verlag.
    • (2001)
    • Fischer-Hübner, S.1
  • 30
    • 85041478806 scopus 로고    scopus 로고
    • WG15 of IEC TC57, IEC 62351, (, last retrieved in May 2017).
    • WG15 of IEC TC57, IEC 62351, 2007, (http://www.iec.ch/smartgrid/standards/, last retrieved in May 2017).
    • (2007)
  • 31
    • 55549116194 scopus 로고    scopus 로고
    • Guide to Industrial Control Systems (ICS) Security
    • Special Publication (NIST SP)-800-82 Rev 1
    • Stouffer, K.A., Falco, J.A., Scarfone, K.A., Guide to Industrial Control Systems (ICS) Security. 2013, Special Publication (NIST SP)-800-82 Rev 1.
    • (2013)
    • Stouffer, K.A.1    Falco, J.A.2    Scarfone, K.A.3
  • 32
    • 33947625881 scopus 로고    scopus 로고
    • Assessment of Access Control Systems
    • US Department of Commerce, National Institute of Standards and Technology
    • Hu, V.C., Ferraiolo, D., Kuhn, D.R., Assessment of Access Control Systems. 2006, US Department of Commerce, National Institute of Standards and Technology.
    • (2006)
    • Hu, V.C.1    Ferraiolo, D.2    Kuhn, D.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.