http://www.cnr.it/ontology/cnr/individuo/prodotto/ID187278
System Configuration Check Against Security Policies in Industrial Networks (Contributo in atti di convegno)
- Type
- Label
- System Configuration Check Against Security Policies in Industrial Networks (Contributo in atti di convegno) (literal)
- Anno
- 2012-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1109/SIES.2012.6356591 (literal)
- Alternative label
M. Cheminod; L. Durante; A. Valenzano (2012)
System Configuration Check Against Security Policies in Industrial Networks
in 7th IEEE International Symposium on Industrial Embedded Systems (SIES 2012), Karlsruhe, 20-22 Giugno 2012
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- M. Cheminod; L. Durante; A. Valenzano (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6356591&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DSystem+Configuration+Check+Against+Security+Policies (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy (literal)
- Titolo
- System Configuration Check Against Security Policies in Industrial Networks (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-1-4673-2685-8 (literal)
- Abstract
- Awareness that networked embedded systems are
vulnerable to cyber-threats has been constantly raising since
some years ago. In the industrial arena recent severe attacks,
such as the popular case of the Stuxnet worm, have completely
debunked the myth of security of embedded devices based on
their isolation. Indeed, the ever increasing dependence of many
industrial systems on digital communication networks is causing
the cyber-security requirements to become a priority in their
planning, design, deployment and management.
This paper deals with our experience in checking the conformance
of a distributed industrial automation system, which
includes several types of embedded devices, with respect to a set of
security policies defined at the global system level. In particular,
the focus of the paper is on the use of modeling techniques and
semi-automated s/w tools to verify the configuration of devices
and services with attention to the correct use of their security
capabilities to support the desired set of policies. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di