Semiautomated Verification of Access Control Implementation in Industrial Networked Systems
暂无分享,去创建一个
[1] Marta Z. Kwiatkowska,et al. PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.
[2] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[3] Alessandro Armando,et al. Efficient symbolic automated analysis of administrative attribute-based RBAC-policies , 2011, ASIACCS '11.
[4] Thomas Novak,et al. Safety- and Security-Critical Services in Building Automation and Control Systems , 2010, IEEE Transactions on Industrial Electronics.
[5] Adriano Valenzano. Industrial Cybersecurity: Improving Security Through Access Control Policy Models , 2014, IEEE Industrial Electronics Magazine.
[6] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[7] Helge Janicke,et al. Verification and enforcement of access control policies , 2013, Formal Methods Syst. Des..
[8] Elisa Bertino,et al. On the Complexity of Authorization in RBAC under Qualification and Security Constraints , 2011, IEEE Transactions on Dependable and Secure Computing.
[9] Ninghui Li,et al. Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.
[10] Qi Xie,et al. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks , 2013, IEEE Transactions on Industrial Informatics.
[11] Martin C. Rinard,et al. Automatic error finding in access-control policies , 2011, CCS '11.
[12] Igor Nai Fovino,et al. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.
[13] Wolfgang Granzer,et al. Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.
[14] William H. Sanders,et al. Usable Global Network Access Policy for Process Control Systems , 2008, IEEE Security & Privacy Magazine.
[15] Alfredo Pironti,et al. Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access , 2011, IEEE Transactions on Industrial Informatics.
[16] Tao Xie,et al. Conformance Checking of Access Control Policies Specified in XACML , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[17] Michael Carl Tschantz,et al. Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[18] Chung Tong Hu,et al. Attribute Based Access Control (ABAC) Definition and Considerations | NIST , 2014 .
[19] Gerard J. Holzmann,et al. The Model Checker SPIN , 1997, IEEE Trans. Software Eng..
[20] Tevfik Bultan,et al. Automated verification of access control policies using a SAT solver , 2008, International Journal on Software Tools for Technology Transfer.
[21] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[22] Adriano Valenzano,et al. Detecting Chains of Vulnerabilities in Industrial Networks , 2009, IEEE Transactions on Industrial Informatics.
[23] Adriano Valenzano,et al. Analysis of access control policies in networked embedded systems: A case study , 2015, 10th IEEE International Symposium on Industrial Embedded Systems (SIES).
[24] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[25] Chun Chen,et al. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.
[26] Wang Yi,et al. UPPAAL - a Tool Suite for Automatic Verification of Real-Time Systems , 1996, Hybrid Systems.
[27] William H. Sanders,et al. Experiences Validating the Access Policy Tool in Industrial Settings , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[28] Edward J. Coyne,et al. ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.
[29] Ravi S. Sandhu,et al. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.
[30] David M. Nicol,et al. PolicyGlobe: a framework for integrating network and operating system security policies , 2009, SafeConfig '09.
[31] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[32] Arif Ghafoor,et al. Conformance Testing of Temporal Role-Based Access Control Systems , 2010, IEEE Transactions on Dependable and Secure Computing.
[33] Adriano Valenzano,et al. A twofold model for the analysis of access control policies in industrial networked systems , 2015, Comput. Stand. Interfaces.
[34] Wenxia Liu,et al. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Industrial Electronics.
[35] Glenn Faden. RBAC in UNIX administration , 1999, RBAC '99.
[36] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[37] David A. Basin,et al. Automated analysis of security-design models , 2009, Inf. Softw. Technol..
[38] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[39] Adriano Valenzano,et al. Automated Analysis of Access Policies in Industrial Plants , 2014, ICS-CSR.
[40] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[41] Alex X. Liu,et al. Quantifying and Verifying Reachability for Access Controlled Networks , 2013, IEEE/ACM Transactions on Networking.
[42] Alessandro Panebianco,et al. Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[43] Adriano Valenzano,et al. On the description of access control policies in networked industrial systems , 2014, 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014).