http://www.cnr.it/ontology/cnr/individuo/prodotto/ID79799
Automatic Analysis of Security Policies in Industrial Networks (Contributo in atti di convegno)
- Type
- Label
- Automatic Analysis of Security Policies in Industrial Networks (Contributo in atti di convegno) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1109/WFCS.2010.5548634 (literal)
- Alternative label
M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano (2010)
Automatic Analysis of Security Policies in Industrial Networks
in 8th IEEE International Workshop on Factory Communication Systems (WFCS 2010), Nancy, 18-21 Maggio 2010
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5548634 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- Data: May 18-21, 2010
Pagine 109-118
ISBN: 978-1-4244-5641-7 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Scopu (literal)
- IEEE Xplore digital library (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy (literal)
- Titolo
- Automatic Analysis of Security Policies in Industrial Networks (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-1-4244-5460-0 (literal)
- Abstract
- The protection of ICT systems is a topic whose importance has been dramatically growing in the last years. In fact, their increased interconnection, both internal and through the Internet, besides having provided higher and inexpensive flexibility (e.g. remote access, management and configuration), has also made them more subject to a wide range of (remotely exploitable) attacks and damages. This paper shows how security policies for industrial systems can be defined in the framework of standard recommendations, and especially checked with the help of an automatic analysis tool, thus leading to a set of security policies whose design and implementation match the expected security requirements. In particular, a suitable example highlights how the tool can profitably help through the steps from the design to the implementation of security policies in an industrial network. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di