Title
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking
Abstract
This paper identifies the most relevant security requirements for critical infrastructures (CIs), and according to these requirements, proposes an access control framework. The latter supports the CI security policy modeling and enforcement. Then, it proposes a runtime model checker for the interactions between the organizations forming the CIs, to verify their compliance with previously signed contracts. In this respect, not only our security framework handles secure local and remote accesses, but also audits and verifies the different interactions. In particular, remote accesses are controlled, every deviation from the signed contracts triggers an alarm, the concerned parties are notified, and audits can be used as evidence for sanctioning the party responsible for the deviation.
Year
DOI
Venue
2008
10.1007/978-3-642-03552-4_9
Critical Information Infrastructure Security
Keywords
Field
DocType
runtime checking,security policies and models,different interaction,remote access,signed contract,concerned party,runtime model checker,runtime model checking.,critical infrastructure,access control framework,security framework,access control enforcement,relevant security requirement,critical infrastructures security modeling,ci security policy modeling,security of critical infrastructures,access control,model checking,security policy,security model
Security testing,Network security policy,Computer science,Computer security,Security service,Cloud computing security,Security information and event management,Security policy,Information security audit,Computer security model
Conference
Volume
ISSN
Citations 
5508
0302-9743
2
PageRank 
References 
Authors
0.39
6
2
Name
Order
Citations
PageRank
Anas Abou El Kalam143340.81
Yves Deswarte21142156.24