Critical Infrastructures Security Modeling, Enforcement and Runtime Checking

  • Authors:
  • Anas Abou El Kalam;Yves Deswarte

  • Affiliations:
  • Université de Toulouse, IRIT - CNRS, ENSEEIHT - INPT, ;Université de Toulouse, LAAS-CNRS,

  • Venue:
  • Critical Information Infrastructure Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper identifies the most relevant security requirements for critical infrastructures (CIs), and according to these requirements, proposes an access control framework. The latter supports the CI security policy modeling and enforcement. Then, it proposes a runtime model checker for the interactions between the organizations forming the CIs, to verify their compliance with previously signed contracts. In this respect, not only our security framework handles secure local and remote accesses, but also audits and verifies the different interactions. In particular, remote accesses are controlled, every deviation from the signed contracts triggers an alarm, the concerned parties are notified, and audits can be used as evidence for sanctioning the party responsible for the deviation.