Learn More
SUMMARY The need to integrate the operation of computer applications is becoming an increasingly prominent issue in industrial firms. Mechanisms have to be developed to allow these systems to share the information they generate and use—to ensure that elements of data with a common meaning, in different systems, have consistent values. The applications are(More)
Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a system. Many access control models exist that are able to support this basic requirement. One of the properties examined in the context of these models is their ability to successfully restrict access to resources.(More)
Utility networks are part of every nation's critical infrastructure, and their protection is now seen as a high priority objective. In this paper, we propose a threat awareness architecture for critical infrastructures, which we believe will raise security awareness and increase resilience in utility networks. We first describe an investigation of trends(More)
  • 1