首页> 外文期刊>Computing and informatics >Formal Verification of Security Pattern Composition: Application to SCADA
【24h】

Formal Verification of Security Pattern Composition: Application to SCADA

机译:正式验证安全模式组成:申请苏达达

获取原文
       

摘要

Information security was initially required in specific applications, however, nowadays, most companies and even individuals are interested in securing their information assets. The new requirement can be costly, especially with the high demand on security solutions and security experts. Security patterns are reusable security solutions that prove to be efficient and can help developers achieve some security goals without the need for expertise in the security domain. Some security pattern combinations can be beneficial while others are inconsistent. Model checking can be used to verify the production of combining multiple security patterns with an architecture. Supervisory control and data acquisition (SCADA) systems control many of our critical industrial infrastructures. Due to their limitations, and their augmented connectivity, SCADA systems have many unresolved security issues. In this paper, we demonstrate how we can automatically generate a secure SCADA model based on an insecure one and how to verify the generated model.
机译:信息安全最初是在特定应用中所要求的,然而,现在,大多数公司甚至个人都有兴趣确保其信息资产。新要求可能是昂贵的,特别是对安全解决方案和安全专家的高需求。安全模式是可重复使用的安全解决方案,证明是高效的,可以帮助开发人员在不需要安全域中的专业知识的情况下实现一些安全目标。一些安全模式组合可以是有益的,而其他安全模式则不一致。模型检查可用于验证使用架构组合多种安全模式的生产。监督控制和数据采集(SCADA)系统控制许多我们的关键产业基础设施。由于它们的局限性,以及他们的增强连接,SCADA系统有许多未解决的安全问题。在本文中,我们演示了我们如何根据不安全的方式自动生成安全的SCADA模型,以及如何验证生成的模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号