2018
DOI: 10.1155/2018/7142170
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Abstract: Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 50 publications
0
7
0
Order By: Relevance
“…Braun et al [65] developed an approach for investigating road network vulnerability in developing regions in Chile. Jaïdi et al [66] proposed a methodology for monitoring the compliance of trusted access control policies in CIs. A comparative exploration of approaches to managing risks related to hazardous incidents and critical infrastructure outages has been carried out by Krings et al [67].…”
Section: Cluster#1 "Risk Assessment" (39 Documents)mentioning
confidence: 99%
“…Braun et al [65] developed an approach for investigating road network vulnerability in developing regions in Chile. Jaïdi et al [66] proposed a methodology for monitoring the compliance of trusted access control policies in CIs. A comparative exploration of approaches to managing risks related to hazardous incidents and critical infrastructure outages has been carried out by Krings et al [67].…”
Section: Cluster#1 "Risk Assessment" (39 Documents)mentioning
confidence: 99%
“…Despite the fact that the informal approach is easier to develop and implement, it is significantly inferior to the formal one in reliability, since it does not allow rigorous evidence of guaranteed security. This circumstance is reflected in various documents defining the security classes of computer systems [8,9,10].…”
Section: Implementation In the Information Systemmentioning
confidence: 99%
“…Authorization is the process of allowing/denying authenticated users access to a resource after checking the regulations and policies of an organization or industry sector [4]. It includes the following phases [5,6]:…”
Section: Introductionmentioning
confidence: 99%