2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems 2012
DOI: 10.1109/ecbs.2012.4
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Authorization Framework for Networked SCADA Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Other AI techniques, such as propositional logic, have been adopted in the area of critical infrastructure protection. In [169], the authors proposed a logic-based framework to enforce security policies for system authorization in SCADA systems, because the authentication process in this environment requires complex mapping between user privileges and system rules. In such a framework, rules are distributed across system nodes, so that they can derive the sets of actions the user can perform on each node.…”
Section: H Critical Infrastructurementioning
confidence: 99%
“…Other AI techniques, such as propositional logic, have been adopted in the area of critical infrastructure protection. In [169], the authors proposed a logic-based framework to enforce security policies for system authorization in SCADA systems, because the authentication process in this environment requires complex mapping between user privileges and system rules. In such a framework, rules are distributed across system nodes, so that they can derive the sets of actions the user can perform on each node.…”
Section: H Critical Infrastructurementioning
confidence: 99%
“…The references that wind up this manuscript should be complemented by many more items related to time modeling, namely those that were the original source for the paradigm presented; nevertheless they can be retrieved entirely from the article (Sveda, 2013). Also, some technicalities related to SCADA applications are dealt in more detail by (Rysavy and Rab and Halfar and Sveda, 2012) and (Rysavy and Rab and Sveda, 2013).…”
Section: Discussionmentioning
confidence: 99%
“…However, with the advances in both hardware and software over time, there are additional requirements important for its applicability of contemporary SCADA systems: extensive and elaborate SCADA model, reusability, extensiblity, easy adaptation to user demands, crossplatform and secured operation. [5] [6] [7] Contemporary SCADA systems on the modern market need to support the handling of millions of data points (part telemetered, part derived) in a networked, real-time environment. Data acquisition and primary data processing is always done in a centralized fashion due to architectural limitations, and then the concentrated values in the real-time database counting several million data points are distributed to achieve high-availability.…”
Section: Operator Terminals Rtus Historian Db Serversmentioning
confidence: 99%