2008
DOI: 10.1109/msp.2008.159
|View full text |Cite
|
Sign up to set email alerts
|

Usable Global Network Access Policy for Process Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…In particular, [14] focuses on networked systems consisting of firewalls and other kinds of traffic control components and, as such, the presented approach is unsuitable for INSs which, typically, also include other types of devices. The NP-View tool described in [15], [16], [17] allows to check global policy implementations by processing information about the network topology and configuration. The tool, however, can only be used for systems consisting of nodes running SE-Linux which is typically not the case of INSs.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, [14] focuses on networked systems consisting of firewalls and other kinds of traffic control components and, as such, the presented approach is unsuitable for INSs which, typically, also include other types of devices. The NP-View tool described in [15], [16], [17] allows to check global policy implementations by processing information about the network topology and configuration. The tool, however, can only be used for systems consisting of nodes running SE-Linux which is typically not the case of INSs.…”
Section: Related Workmentioning
confidence: 99%
“…The analysis is mainly focused on firewalls and other network devices. NetAPT (now NP-View) [31,32] is a software tool able to check global network access policies against the network topology and firewall configurations of a real system. The tool is also able to take into account further sources of system details (e.g., SE-Linux policies).…”
Section: Related Workmentioning
confidence: 99%
“…For our case study evaluations, a unified XML format was used to describe the power network topology and global access control policies. During the offline phase, EliMet used the NetAPT tool (Nicol et al, 2008) to perform a comprehensive security analysis of the access policy rules and to produce the network connectivity matrix according to the control network topology input. The matrix was later translated into an CMDP model.…”
Section: Evaluationsmentioning
confidence: 99%