PolyOrBAC: A security framework for Critical Infrastructures

被引:31
作者
Abou El Kalam, A. [2 ]
Deswarte, Y. [1 ,3 ]
Baina, A. [1 ,3 ]
Kaaniche, M. [1 ,3 ]
机构
[1] CNRS, LAAS, F-31077 Toulouse, France
[2] Univ Toulouse, IRIT, INPT ENSEEIHT, F-31071 Toulouse, France
[3] Univ Toulouse, UPS, INSA, INP,ISAE,LAAS, F-31077 Toulouse, France
关键词
Critical Infrastructure; Security; Access control policies and models; Collaboration; Interoperability;
D O I
10.1016/j.ijcip.2009.08.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures of various degrees of severity, and since there are many interdependencies between CIs, simple failures can have dramatic consequences on the users. In this paper, we mainly focus on malicious threats that might affect the information and communication system that controls the Critical Infrastructure, i.e., the Critical Information Infrastructure (CII). To address the security challenges that are specific of CIIs, we propose a collaborative access control framework called PolyOrBAC. This approach offers each organization taking part in the CII the capacity of collaborating with the other ones, while maintaining a control on its resources and on its internal security policy. The interactions between organizations participating in the CH are implemented through web services (WS), and for each WS a contract is signed between the service-provider organization and the service-user organization. The contract describes the WS functions and parameters, the liability of each party and the security rules controlling the interactions. At runtime, the compliance of all interactions with these security rules is checked. Every deviation from the signed contracts triggers an alarm, the concerned parties are notified and audits can be used as evidence for sanctioning the party responsible for the deviation. Our approach is illustrated by a practical scenario, based on real emergency actions in an electric power grid infrastructure, and a simulation test bed has been implemented to animate this scenario and experiment with its security issues. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:154 / 169
页数:16
相关论文
共 43 条
[1]  
Abou El Kalam A., 2009, IFIP TC 11 INT INF S
[2]  
Alturi V., 1999, ACM T INFORM SYSTEM
[3]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[4]  
Amin M., 2003, IEEE Security & Privacy, V1, P19, DOI 10.1109/MSECP.2003.1236231
[5]  
[Anonymous], XACML PROF ROL BAS A
[6]  
[Anonymous], 2004, a W3C Recommendation
[7]  
[Anonymous], 2003, W3C Recommendation
[8]  
[Anonymous], 2006, OASIS WEB SERV SEC T
[9]  
[Anonymous], 2003, Policies for Distributed Systems and Networks, DOI DOI 10.1109/POLICY.2003.1206966
[10]  
Atluri V., 1998, J INTELLIGENT INFORM