14 research outputs found

    Designing Security Policies for Complex SCADA Systems Protection

    Get PDF
    The management and protection of these SCADA systems must constantly evolve towards integrated decision making and policy driven by cyber security requirements. The current research stream in this domain aims, accordingly, to foster the smartness of the field equipment which exist through the generic concept of SCADA management and operation. Those components are governed by policies which depend on the components roles, as well as on the evolution of the crisis which also confer to the latter the latitude to react based on their own perception of the crisis evolution. Their latitude is calculated based on the component smartness and is strongly determined by, and depending on, the cyber safety of the component environment. Existing work related to crisis management tends to consider that components evolve and are organized in systems but as far as we know, no systemic solution exists which integrates all of the above requirements. This paper proposes an innovative version of ArchiMateĀ® for the SCADA components modelling purpose to enrich their collaborations and, more particularly, the description of their behavior endorsed in the cyber-policy. Our work has been illustrated in the frame of a critical infrastructure in the field of petroleum supply and storage networks

    PhD presentation support

    Get PDF

    Designing Security Policies for Complex SCADA Systems Protection

    Get PDF
    The management and protection of these SCADA systems must constantly evolve towards integrated decision making and policy driven by cyber security requirements. The current research stream in this domain aims, accordingly, to foster the smartness of the field equipment which exist through the generic concept of SCADA management and operation. Those components are governed by policies which depend on the components roles, as well as on the evolution of the crisis which also confer to the latter the latitude to react based on their own perception of the crisis evolution. Their latitude is calculated based on the component smartness and is strongly determined by, and depending on, the cyber safety of the component environment. Existing work related to crisis management tends to consider that components evolve and are organized in systems but as far as we know, no systemic solution exists which integrates all of the above requirements. This paper proposes an innovative version of ArchiMateĀ® for the SCADA components modelling purpose to enrich their collaborations and, more particularly, the description of their behavior endorsed in the cyber-policy. Our work has been illustrated in the frame of a critical infrastructure in the field of petroleum supply and storage networks

    Prosumer's Responsibilities?... On Stage to a Dedicated Framework for Services Sharing and Compliance in the Healthcare Domain.

    Get PDF
    This chapter addresses issues relating the clarification of responsibilities associated to business services. The definition of the constraints is part of the definition of the services. The main objective is to describe the influence of the constraints in the service elaboration mechanisms. The authors propose an approach for the specification of the constraints associated to services and for the management of access rights needed to use and exploit services. The usage of services is strongly coupled with the stakeholderā€™s responsibilities. Finally, the authors discuss a usage scenario implementing this approach in the context of sensitive data exchange between stakeholders from the healthcare domain. Furthermore, they describe how the constraints are defined. </jats:p
    corecore