Model-based real-time evaluation of security patterns: A SCADA system case study

9Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Securing critical systems such as cyber physical systems (CPS) is an important feature especially when it comes to critical transmitted data. At the same time, the implementation of security counter-measures in such systems may impact other functional or non-functional concerns. In this context, we propose a model-based approach for securing critical systems at early design stage. This approach combines security analysis and mitigation solution proposals with multi-concern architectural evaluation. It exploits two views of security countermeasures patterns: abstract and concrete. The abstract view is used to select relevant solutions to security requirements on a logical point of view. Then, the concrete view helps the architect evaluating different possible implementation alternatives against other design constraints. The modeling is based on accepted OMG standards such as UML and MARTE. In this paper, the approach is illustrated on a SCADA (Supervisory Control and Data Acquisition) system case study and a tool chain based on Papyrus UML supports the approach.

Cite

CITATION STYLE

APA

Motii, A., Lanusse, A., Hamid, B., & Bruel, J. M. (2016). Model-based real-time evaluation of security patterns: A SCADA system case study. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9923 LNCS, pp. 375–389). Springer Verlag. https://doi.org/10.1007/978-3-319-45480-1_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free