2020
DOI: 10.1504/ijnvo.2020.104979
|View full text |Cite
|
Sign up to set email alerts
|

Unified enterprise modelling language-based interoperability for collaborative access control framework in critical infrastructures

Abstract: Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures of various degrees of severity, and since there are many interdependencies between CIs, simple failures can have dramatic consequences on the whole infrastructure. In this paper, we mainly focus on malicious threats that might affect the communication and information systems (the critical information infrastructure, or CII) dedicated to critical infrastructures. We define a new collaborative access control framew… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 41 publications
(59 reference statements)
0
5
0
Order By: Relevance
“…Within the security objective dimension, the authors identify eight measurement variables (see Table 4). Confidentiality focuses on ensuring that physical and logical assets are only accessed by authorized individuals and verifying user identities (Baina et al , 2020; Eckel et al , 2021; Ramtohul and Soyjaudah, 2016). Integrity ensures that physical and logical assets can only be modified by authorized parties and tracks user actions related to accessed assets (Baina et al , 2020).…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Within the security objective dimension, the authors identify eight measurement variables (see Table 4). Confidentiality focuses on ensuring that physical and logical assets are only accessed by authorized individuals and verifying user identities (Baina et al , 2020; Eckel et al , 2021; Ramtohul and Soyjaudah, 2016). Integrity ensures that physical and logical assets can only be modified by authorized parties and tracks user actions related to accessed assets (Baina et al , 2020).…”
Section: Resultsmentioning
confidence: 99%
“…Confidentiality focuses on ensuring that physical and logical assets are only accessed by authorized individuals and verifying user identities (Baina et al , 2020; Eckel et al , 2021; Ramtohul and Soyjaudah, 2016). Integrity ensures that physical and logical assets can only be modified by authorized parties and tracks user actions related to accessed assets (Baina et al , 2020). Availability ensures that physical and logical assets are accessible for authorized use and includes auditability (Baina et al , 2020; Eckel et al , 2021; Ramtohul and Soyjaudah, 2016).…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations