1,029
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Model for the Analysis of Security Policies in Industrial Networks

      Published
      proceedings-article
      1 , 1 , 1 , 2 , 1
      1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) (ICSCSR)
      ICS & SCADA Cyber Security Research 2013
      16-17 September 2013
      Role Based Access Control, Security policy analysis, Security of industrial networks
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            September 2013
            September 2013
            : 66-77
            Affiliations
            [1 ]National Research Council of Italy – IEIIT

            c.so Duca degli Abruzzi 24

            I-10129 Torino

            Italy

            www.ieiit.cnr.it
            [2 ]Politecnico di Torino – DAUIN

            c.so Duca degli Abruzzi 24

            I-10129 Torino

            Italy

            www.ieiit.cnr.it
            Article
            10.14236/ewic/ICSCSR2013.8
            52514dc4-5fb7-4625-a287-29276f5f03a2
            © Ivan Cibrario Bertolotti et al. Published by BCS Learning and Development Ltd. 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013), Leicester, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013)
            ICSCSR
            1
            Leicester, UK
            16-17 September 2013
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2013
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICSCSR2013.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security policy analysis,Security of industrial networks,Role Based Access Control

            Comments

            Comment on this article