Semiautomated Verification of Access Control Implementation in Industrial Networked Systems
Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on industrial informatics 2015-12, Vol.11 (6), p.1388-1399 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1399 |
---|---|
container_issue | 6 |
container_start_page | 1388 |
container_title | IEEE transactions on industrial informatics |
container_volume | 11 |
creator | Cheminod, Manuel Durante, Luca Seno, Lucia Valenzano, Adriano |
description | Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification. |
doi_str_mv | 10.1109/TII.2015.2489181 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1744838273</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7295628</ieee_id><sourcerecordid>1778028725</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</originalsourceid><addsrcrecordid>eNpdkDtPwzAUhSMEEqWwI7FEYmFJ8TN2xqriEamCoYWFwTLOjeSSxMV2hPrvcdWKgeme4TtHV1-WXWM0wxhV9-u6nhGE-YwwWWGJT7IJrhguEOLoNGXOcUEJoufZRQgbhKhAtJpkHyvorR6j63WEJn8Hb1trdLRuyF2bz42BEPKFG6J3XV732w56GOIBsENeD80Yore6y18g_jj_lVZWuxChD5fZWau7AFfHO83eHh_Wi-di-fpUL-bLwlDCYkGg_BTccCYlpxIIRcAaLIXgWLaGNw0qeaWJIJqxqqkENKIFWZaEAoXGCDrN7g67W---RwhR9TYY6Do9gBuDwkJIRKQgPKG3_9CNG_2QvksUY5JKImii0IEy3oXgoVVbb3vtdwojtbetkm21t62OtlPl5lCxAPCHC1Lxkkj6C0ANexo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1744838273</pqid></control><display><type>article</type><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</creator><creatorcontrib>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</creatorcontrib><description>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2015.2489181</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; access control policies ; Automata ; automated verification ; Computational modeling ; Computer programs ; Data models ; Enforcement ; Industrial system security ; Informatics ; Mathematical models ; Network security ; Policies ; Ports (Computers) ; Program verification (computers) ; Role-Based Access Control (RBAC) ; Specifications ; System implementation ; Tasks</subject><ispartof>IEEE transactions on industrial informatics, 2015-12, Vol.11 (6), p.1388-1399</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</citedby><cites>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7295628$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7295628$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cheminod, Manuel</creatorcontrib><creatorcontrib>Durante, Luca</creatorcontrib><creatorcontrib>Seno, Lucia</creatorcontrib><creatorcontrib>Valenzano, Adriano</creatorcontrib><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</description><subject>Access control</subject><subject>access control policies</subject><subject>Automata</subject><subject>automated verification</subject><subject>Computational modeling</subject><subject>Computer programs</subject><subject>Data models</subject><subject>Enforcement</subject><subject>Industrial system security</subject><subject>Informatics</subject><subject>Mathematical models</subject><subject>Network security</subject><subject>Policies</subject><subject>Ports (Computers)</subject><subject>Program verification (computers)</subject><subject>Role-Based Access Control (RBAC)</subject><subject>Specifications</subject><subject>System implementation</subject><subject>Tasks</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkDtPwzAUhSMEEqWwI7FEYmFJ8TN2xqriEamCoYWFwTLOjeSSxMV2hPrvcdWKgeme4TtHV1-WXWM0wxhV9-u6nhGE-YwwWWGJT7IJrhguEOLoNGXOcUEJoufZRQgbhKhAtJpkHyvorR6j63WEJn8Hb1trdLRuyF2bz42BEPKFG6J3XV732w56GOIBsENeD80Yore6y18g_jj_lVZWuxChD5fZWau7AFfHO83eHh_Wi-di-fpUL-bLwlDCYkGg_BTccCYlpxIIRcAaLIXgWLaGNw0qeaWJIJqxqqkENKIFWZaEAoXGCDrN7g67W---RwhR9TYY6Do9gBuDwkJIRKQgPKG3_9CNG_2QvksUY5JKImii0IEy3oXgoVVbb3vtdwojtbetkm21t62OtlPl5lCxAPCHC1Lxkkj6C0ANexo</recordid><startdate>201512</startdate><enddate>201512</enddate><creator>Cheminod, Manuel</creator><creator>Durante, Luca</creator><creator>Seno, Lucia</creator><creator>Valenzano, Adriano</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>201512</creationdate><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><author>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>access control policies</topic><topic>Automata</topic><topic>automated verification</topic><topic>Computational modeling</topic><topic>Computer programs</topic><topic>Data models</topic><topic>Enforcement</topic><topic>Industrial system security</topic><topic>Informatics</topic><topic>Mathematical models</topic><topic>Network security</topic><topic>Policies</topic><topic>Ports (Computers)</topic><topic>Program verification (computers)</topic><topic>Role-Based Access Control (RBAC)</topic><topic>Specifications</topic><topic>System implementation</topic><topic>Tasks</topic><toplevel>online_resources</toplevel><creatorcontrib>Cheminod, Manuel</creatorcontrib><creatorcontrib>Durante, Luca</creatorcontrib><creatorcontrib>Seno, Lucia</creatorcontrib><creatorcontrib>Valenzano, Adriano</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cheminod, Manuel</au><au>Durante, Luca</au><au>Seno, Lucia</au><au>Valenzano, Adriano</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2015-12</date><risdate>2015</risdate><volume>11</volume><issue>6</issue><spage>1388</spage><epage>1399</epage><pages>1388-1399</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2015.2489181</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1551-3203 |
ispartof | IEEE transactions on industrial informatics, 2015-12, Vol.11 (6), p.1388-1399 |
issn | 1551-3203 1941-0050 |
language | eng |
recordid | cdi_proquest_journals_1744838273 |
source | IEEE Electronic Library (IEL) |
subjects | Access control access control policies Automata automated verification Computational modeling Computer programs Data models Enforcement Industrial system security Informatics Mathematical models Network security Policies Ports (Computers) Program verification (computers) Role-Based Access Control (RBAC) Specifications System implementation Tasks |
title | Semiautomated Verification of Access Control Implementation in Industrial Networked Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T15%3A39%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Semiautomated%20Verification%20of%20Access%20Control%20Implementation%20in%20Industrial%20Networked%20Systems&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Cheminod,%20Manuel&rft.date=2015-12&rft.volume=11&rft.issue=6&rft.spage=1388&rft.epage=1399&rft.pages=1388-1399&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2015.2489181&rft_dat=%3Cproquest_RIE%3E1778028725%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1744838273&rft_id=info:pmid/&rft_ieee_id=7295628&rfr_iscdi=true |