Abstract | ||
---|---|---|
This paper identifies the most relevant security requirements for critical infrastructures (CIs), and according to these requirements, proposes an access control framework. The latter supports the CI security policy modeling and enforcement. Then, it proposes a runtime model checker for the interactions between the organizations forming the CIs, to verify their compliance with previously signed contracts. In this respect, not only our security framework handles secure local and remote accesses, but also audits and verifies the different interactions. In particular, remote accesses are controlled, every deviation from the signed contracts triggers an alarm, the concerned parties are notified, and audits can be used as evidence for sanctioning the party responsible for the deviation. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-642-03552-4_9 | Critical Information Infrastructure Security |
Keywords | Field | DocType |
runtime checking,security policies and models,different interaction,remote access,signed contract,concerned party,runtime model checker,runtime model checking.,critical infrastructure,access control framework,security framework,access control enforcement,relevant security requirement,critical infrastructures security modeling,ci security policy modeling,security of critical infrastructures,access control,model checking,security policy,security model | Security testing,Network security policy,Computer science,Computer security,Security service,Cloud computing security,Security information and event management,Security policy,Information security audit,Computer security model | Conference |
Volume | ISSN | Citations |
5508 | 0302-9743 | 2 |
PageRank | References | Authors |
0.39 | 6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Anas Abou El Kalam | 1 | 433 | 40.81 |
Yves Deswarte | 2 | 1142 | 156.24 |