Semiautomated Verification of Access Control Implementation in Industrial Networked Systems

Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on industrial informatics 2015-12, Vol.11 (6), p.1388-1399
Hauptverfasser: Cheminod, Manuel, Durante, Luca, Seno, Lucia, Valenzano, Adriano
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1399
container_issue 6
container_start_page 1388
container_title IEEE transactions on industrial informatics
container_volume 11
creator Cheminod, Manuel
Durante, Luca
Seno, Lucia
Valenzano, Adriano
description Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.
doi_str_mv 10.1109/TII.2015.2489181
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1744838273</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7295628</ieee_id><sourcerecordid>1778028725</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</originalsourceid><addsrcrecordid>eNpdkDtPwzAUhSMEEqWwI7FEYmFJ8TN2xqriEamCoYWFwTLOjeSSxMV2hPrvcdWKgeme4TtHV1-WXWM0wxhV9-u6nhGE-YwwWWGJT7IJrhguEOLoNGXOcUEJoufZRQgbhKhAtJpkHyvorR6j63WEJn8Hb1trdLRuyF2bz42BEPKFG6J3XV732w56GOIBsENeD80Yore6y18g_jj_lVZWuxChD5fZWau7AFfHO83eHh_Wi-di-fpUL-bLwlDCYkGg_BTccCYlpxIIRcAaLIXgWLaGNw0qeaWJIJqxqqkENKIFWZaEAoXGCDrN7g67W---RwhR9TYY6Do9gBuDwkJIRKQgPKG3_9CNG_2QvksUY5JKImii0IEy3oXgoVVbb3vtdwojtbetkm21t62OtlPl5lCxAPCHC1Lxkkj6C0ANexo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1744838273</pqid></control><display><type>article</type><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</creator><creatorcontrib>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</creatorcontrib><description>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2015.2489181</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Access control ; access control policies ; Automata ; automated verification ; Computational modeling ; Computer programs ; Data models ; Enforcement ; Industrial system security ; Informatics ; Mathematical models ; Network security ; Policies ; Ports (Computers) ; Program verification (computers) ; Role-Based Access Control (RBAC) ; Specifications ; System implementation ; Tasks</subject><ispartof>IEEE transactions on industrial informatics, 2015-12, Vol.11 (6), p.1388-1399</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Dec 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</citedby><cites>FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7295628$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7295628$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cheminod, Manuel</creatorcontrib><creatorcontrib>Durante, Luca</creatorcontrib><creatorcontrib>Seno, Lucia</creatorcontrib><creatorcontrib>Valenzano, Adriano</creatorcontrib><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</description><subject>Access control</subject><subject>access control policies</subject><subject>Automata</subject><subject>automated verification</subject><subject>Computational modeling</subject><subject>Computer programs</subject><subject>Data models</subject><subject>Enforcement</subject><subject>Industrial system security</subject><subject>Informatics</subject><subject>Mathematical models</subject><subject>Network security</subject><subject>Policies</subject><subject>Ports (Computers)</subject><subject>Program verification (computers)</subject><subject>Role-Based Access Control (RBAC)</subject><subject>Specifications</subject><subject>System implementation</subject><subject>Tasks</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkDtPwzAUhSMEEqWwI7FEYmFJ8TN2xqriEamCoYWFwTLOjeSSxMV2hPrvcdWKgeme4TtHV1-WXWM0wxhV9-u6nhGE-YwwWWGJT7IJrhguEOLoNGXOcUEJoufZRQgbhKhAtJpkHyvorR6j63WEJn8Hb1trdLRuyF2bz42BEPKFG6J3XV732w56GOIBsENeD80Yore6y18g_jj_lVZWuxChD5fZWau7AFfHO83eHh_Wi-di-fpUL-bLwlDCYkGg_BTccCYlpxIIRcAaLIXgWLaGNw0qeaWJIJqxqqkENKIFWZaEAoXGCDrN7g67W---RwhR9TYY6Do9gBuDwkJIRKQgPKG3_9CNG_2QvksUY5JKImii0IEy3oXgoVVbb3vtdwojtbetkm21t62OtlPl5lCxAPCHC1Lxkkj6C0ANexo</recordid><startdate>201512</startdate><enddate>201512</enddate><creator>Cheminod, Manuel</creator><creator>Durante, Luca</creator><creator>Seno, Lucia</creator><creator>Valenzano, Adriano</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>201512</creationdate><title>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</title><author>Cheminod, Manuel ; Durante, Luca ; Seno, Lucia ; Valenzano, Adriano</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-2e6b75c5488538e230e4d1877518fc5dd0659a272a449d97ed7fe86623e3edc73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Access control</topic><topic>access control policies</topic><topic>Automata</topic><topic>automated verification</topic><topic>Computational modeling</topic><topic>Computer programs</topic><topic>Data models</topic><topic>Enforcement</topic><topic>Industrial system security</topic><topic>Informatics</topic><topic>Mathematical models</topic><topic>Network security</topic><topic>Policies</topic><topic>Ports (Computers)</topic><topic>Program verification (computers)</topic><topic>Role-Based Access Control (RBAC)</topic><topic>Specifications</topic><topic>System implementation</topic><topic>Tasks</topic><toplevel>online_resources</toplevel><creatorcontrib>Cheminod, Manuel</creatorcontrib><creatorcontrib>Durante, Luca</creatorcontrib><creatorcontrib>Seno, Lucia</creatorcontrib><creatorcontrib>Valenzano, Adriano</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cheminod, Manuel</au><au>Durante, Luca</au><au>Seno, Lucia</au><au>Valenzano, Adriano</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Semiautomated Verification of Access Control Implementation in Industrial Networked Systems</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2015-12</date><risdate>2015</risdate><volume>11</volume><issue>6</issue><spage>1388</spage><epage>1399</epage><pages>1388-1399</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>Access control is a necessary building block in the security of any kind of cyber system and, in this sense, industrial networked systems (INSs) make no exception. Typically, access control policies are specified at a high implementation-independent level of abstraction and then mapped onto the real system by leveraging available policy enforcement mechanisms. Unfortunately, different from general-purpose ICT systems, enforcement mechanisms are generally very basic in INS. As a consequence, verifying the correctness of policy implementation becomes a crucial task, especially cumbersome when it needs to be carried out entirely by hand. This paper presents a new methodology, which also serves as the basis of a purposely developed software tool conceived to cope with the lack of policy enforcement mechanisms in INS and to allow semiautomatic verification of policy implementation. Our approach is based on a twofold system model that enables both the abstract specification of access control policies and the detailed description of the target physical system. These two separate views are then combined to automatically determine whether the current system implementation matches the policy specification.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2015.2489181</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1551-3203
ispartof IEEE transactions on industrial informatics, 2015-12, Vol.11 (6), p.1388-1399
issn 1551-3203
1941-0050
language eng
recordid cdi_proquest_journals_1744838273
source IEEE Electronic Library (IEL)
subjects Access control
access control policies
Automata
automated verification
Computational modeling
Computer programs
Data models
Enforcement
Industrial system security
Informatics
Mathematical models
Network security
Policies
Ports (Computers)
Program verification (computers)
Role-Based Access Control (RBAC)
Specifications
System implementation
Tasks
title Semiautomated Verification of Access Control Implementation in Industrial Networked Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T15%3A39%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Semiautomated%20Verification%20of%20Access%20Control%20Implementation%20in%20Industrial%20Networked%20Systems&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Cheminod,%20Manuel&rft.date=2015-12&rft.volume=11&rft.issue=6&rft.spage=1388&rft.epage=1399&rft.pages=1388-1399&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2015.2489181&rft_dat=%3Cproquest_RIE%3E1778028725%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1744838273&rft_id=info:pmid/&rft_ieee_id=7295628&rfr_iscdi=true