Modelling and Verification of Safety of Access Control in SCADA Systems

Inna Vistbakka, Elena Troubitsyna*

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

2 Citations (Scopus)

Abstract

Modern safety-critical systems become increasingly networked and interconnected. To ensure their safety, the designers should guarantee not only that the critical parameters are accessed and modified by authorised users and components but also that the permitted operations should not violate safety. Traditionally, the designers rely on Role-Based Access Control (RBAC) to define the access to the system parameters. In this paper, we define a safety-aware RBAC model that takes into account current system state and safety of intended actions. Our approach relies on contract-based reasoning and formal modelling in Event-B. The approach is illustrated by a case study – a supervised control of a power switch.

Original languageEnglish
Title of host publicationRisks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Revised Selected Papers
EditorsJoaquin Garcia-Alfaro, Jean Leneutre, Nora Cuppens, Reda Yaich
PublisherSpringer Science and Business Media Deutschland GmbH
Pages354-364
Number of pages11
ISBN (Print)9783030688868
DOIs
Publication statusPublished - 2021
MoE publication typeA4 Article in a conference publication
Event15th International Conference on Risks and Security of Internet and Systems, CRISIS 2020 - Virtual, Online
Duration: 4 Nov 20206 Nov 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12528 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Risks and Security of Internet and Systems, CRISIS 2020
CityVirtual, Online
Period04/11/2006/11/20

Fingerprint

Dive into the research topics of 'Modelling and Verification of Safety of Access Control in SCADA Systems'. Together they form a unique fingerprint.

Cite this