2019
DOI: 10.26599/tst.2018.9010116
|View full text |Cite
|
Sign up to set email alerts
|

Specification and verification of a topology-aware access control model for cyber-physical space

Abstract: The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects are ubiquitous in this space, thereby exerting tremendous pressure on its security model. This model must ensure that both cyber and physical objects are always handled securely in this dynamic environment. In this paper, we propose a systematic solution to be able to specify security policies of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…There were also some interesting works [23][24][25] based on the BRS formalism, which is stated in our work. Authors in [23] have introduced the concept of topology configuration that captures the characteristics of cyber-physical spaces' environment.…”
Section: Related Workmentioning
confidence: 66%
See 1 more Smart Citation
“…There were also some interesting works [23][24][25] based on the BRS formalism, which is stated in our work. Authors in [23] have introduced the concept of topology configuration that captures the characteristics of cyber-physical spaces' environment.…”
Section: Related Workmentioning
confidence: 66%
“…The paper [24] continued to use the TA-CPAC model and provided a systematic solution for specifying security policies in a cyber-physical space and ensuring the satisfaction of security requirements by considering the dynamic topology of the environment. It introduces a reduction algorithm to simplify the modeling process and improve the efficiency of model checking.…”
Section: Related Workmentioning
confidence: 99%
“…To address cybersecurity and physical security issues, 47‐49 Cao et al 50p resented a topology‐aware cyber‐physical access control model (TA‐CPAC). The topology configuration and the model itself were formally modeled using bigraph language and bigraph reactive system (BRS), respectively.…”
Section: Related Workmentioning
confidence: 99%