2018 IEEE 16th International Conference on Industrial Informatics (INDIN) 2018
DOI: 10.1109/indin.2018.8472068
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Authentication and Access Controls for I&C systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Separation of duties prevents users from exceeding the level of authority in relation to their position by implementing constraints that limit a user's permissions. Static separation of duties implements constraints on user-role (Alhaqbani and Fidge, 2007;Bertino and Takahashi, 2011;Bilong et al, 2020;Desai, 2012;Furnell et al, 2008;Igarashi and Watanobe, 2018;Kuhn et al, 2010;Mao et al, 2009;Rasiwasia, 2017;Sifou et al, 2017;Tellabi et al, 2018) ICS 28,3 assignments while dynamic separation of duties implements constraints on user-role activations within a session. While RBAC has advantages over the other access control models, one of its most notable disadvantages is that it does not support the handling of dynamic events (INCITS, 2012b;Kuhn et al, 2010;Sifou et al, 2017;Singh et al, 2019).…”
Section: Authorisationmentioning
confidence: 99%
“…Separation of duties prevents users from exceeding the level of authority in relation to their position by implementing constraints that limit a user's permissions. Static separation of duties implements constraints on user-role (Alhaqbani and Fidge, 2007;Bertino and Takahashi, 2011;Bilong et al, 2020;Desai, 2012;Furnell et al, 2008;Igarashi and Watanobe, 2018;Kuhn et al, 2010;Mao et al, 2009;Rasiwasia, 2017;Sifou et al, 2017;Tellabi et al, 2018) ICS 28,3 assignments while dynamic separation of duties implements constraints on user-role activations within a session. While RBAC has advantages over the other access control models, one of its most notable disadvantages is that it does not support the handling of dynamic events (INCITS, 2012b;Kuhn et al, 2010;Sifou et al, 2017;Singh et al, 2019).…”
Section: Authorisationmentioning
confidence: 99%
“…Access control technology [5], as one of the important technologies to protect the integrity, evaluates whether the trader has the right to execute the current transaction according to the trader identity, to regulate the access behaviour to the network resource storage. In practice, mandatory access control is usually adopted.…”
Section: Introductionmentioning
confidence: 99%
“…Self-diagnostics applications are capable of testing multiple modules that are available in the platform [4]. In [5], the different authentication and access controls mechanisms were presented, including security concerns surrounding industrial systems. As stated in [5], for industrial computers, Availability is the primary security concern and self-diagnostics applications can be used to verify the internal status.…”
mentioning
confidence: 99%
“…In [5], the different authentication and access controls mechanisms were presented, including security concerns surrounding industrial systems. As stated in [5], for industrial computers, Availability is the primary security concern and self-diagnostics applications can be used to verify the internal status. The idea of developing self-diagnostics applications are based on the findings in [5].…”
mentioning
confidence: 99%
See 1 more Smart Citation