A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

المؤلفون المشاركون

Jaïdi, Faouzi
Labbene Ayachi, Faten
Bouhoula, Adel

المصدر

Security and Communication Networks

العدد

المجلد 2018، العدد 2018 (31 ديسمبر/كانون الأول 2018)، ص ص. 1-22، 22ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2018-05-16

دولة النشر

مصر

عدد الصفحات

22

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الملخص EN

Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures.

A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures.

Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems.

It essentially requires setting up trusted security policies.

Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats.

To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies.

Our proposal extends the traditional life cycle of access control policies with pertinent activities.

It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies.

To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies.

We refer to an illustrative example to highlight the relevance of our contributions.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Jaïdi, Faouzi& Labbene Ayachi, Faten& Bouhoula, Adel. 2018. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks،Vol. 2018, no. 2018, pp.1-22.
https://search.emarefa.net/detail/BIM-1214319

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Jaïdi, Faouzi…[et al.]. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks No. 2018 (2018), pp.1-22.
https://search.emarefa.net/detail/BIM-1214319

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Jaïdi, Faouzi& Labbene Ayachi, Faten& Bouhoula, Adel. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks. 2018. Vol. 2018, no. 2018, pp.1-22.
https://search.emarefa.net/detail/BIM-1214319

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1214319