scholarly journals Trust Management in Collaborative Systems for Critical Infrastructure Protection

2018 ◽  
Vol 2018 ◽  
pp. 1-15
Author(s):  
Nawal Ait Aali ◽  
Amine Baina ◽  
Loubna Echabbi

Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several security policies must be applied among the organizations of CI. Based on our conducted study about the different constraints and requirements of the collaborative systems within CI, we reached a security solution: Tr-OrBAC. Its principle is to evaluate the trustworthiness of collaborating organizations based on relevant trust criteria aimed at enhancing collaboration decision-making. The taken decision presents the attribution of the access to the desired service based on calculated trust score which is the result of the combination of the trust criteria values. Generally, the desired services do not meet the same criticism, security requirements, sensitivity, etc. Also, the collaboration context varies from a set of collaborating organizations to another. In this sense, the importance of each trust criterion depends on the desired service and the collaboration context. In this paper, we focus on detailing the trust criteria used in our approach for collaborative system security. Then, we analyze the context variability with the trust evaluation process. In addition, we present a case study to demonstrate and illustrate the feasibility of our solution for CI protection, especially the electrical grid.

2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


Author(s):  
Yagnik A Rathod

In compare to Authentication for identification and relationship of an identity of a user with its task and process within the system, authorization in access control is much anxious about confirming that user and its task in the form of system process, access to the assets of any particular domain is only approved when proven obedient to the identified policies. Access control and authorization is always an area of interest for researchers for enhancing security of critical assets from many decades. Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer level of granularity in access policies for domain like smart grid. Technical advancement of current era demands that critical infrastructure like traditional electrical grid open ups to the modern information and communication technology to get the benefit in terms of efficiency, scalability, accessibility and transparency for better adaptability in real world. Incorporation of ICT with electric grid makes it possible to do greater level of bi-directional interaction among stake holders like customer, generation units, distribution units and administrations and these leads international organization to contribute for standardization of smart grid concepts and technology so that the realization of smart grid becomes reality. Smart grid is a distributed system of very large scale by its nature and needs to integrate available legacy systems with its own security requirements. Cloud computing proven to be most efficient approach for said requirements and we have identified openstack as our cloud platform. We have integrated ABAC approach with default RBAC approach of openstack and provide a frame work that supports and integrate multiple access control polices in making authorization decisions. Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.


Author(s):  
Kendal Smith

As an essential element of homeland security, critical infrastructure protection requires a professional, highly educated workforce and community of leaders at all levels of government and in the private sector. Yet there are few structured and comprehensive higher education programs in critical infrastructure protection. This case study reviews an education initiative that partners the U.S. Department of Homeland Security with the Center for Infrastructure Protection and Homeland Security at the George Mason University School of Law in an effort to develop and distribute critical infrastructure protection courses and materials that will become part of a comprehensive, unified approach to homeland security education.


2021 ◽  
Author(s):  
Vladimir M. Cvetković ◽  
Andrija Kezunović

Abstract Recognized as the basis for maintaining the functionality of the community in disaster conditions, the protection of critical infrastructure is one of the most important measures to improve the resilience of society. Starting from the fact that society can be affected by various natural and anthropogenic disasters, the subject of this chapter refers to a comprehensive analysis of the security aspects of critical infrastructure protection in anthropogenic (man-made) disasters. On the other hand, the social goal of the research is to determine the level of public awareness of the importance of protecting critical infrastructure from these disasters. By applying the quantitative research tradition, quantitative research was realized in the area of ​​the city of Belgrade, in which 200 respondents were interviewed by the method of random sampling. The obtained research results unequivocally indicate that preventive action in this area should be mainly focused on the adoption of strategies based on which plans are made to prevent the occurrence of these disasters, as well as operational procedures for the protection of critical infrastructure.


Author(s):  
Graeme Pye ◽  
Matthew Warren ◽  
William Hutchinson

The protection of Australian critical infrastructures and the choices made in terms of priorities and cost all impact upon the planning, precautions, and security aspects of protecting these important systems. Often, the choices made will have an ethical imperative that is difficult to assess at the time the decision is taken, and it is only after an incident that the truth of the choices made become fully evident. This is the focus of this discussion that highlights the issues of earlier resource funding choices made and how an ethical choice had to be made, with regard to protecting the security of a water supply infrastructure, or that of a community under the threat of bushfire as outlined in the case study.


2021 ◽  
Author(s):  
Vladimir M. Cvetković ◽  
Andrija Kezunović

Abstract Recognized as the basis for maintaining the functionality of the community in disaster conditions, the protection of critical infrastructure is one of the essential measures to improve society's resilience. Starting from the fact that society can be affected by various natural and anthropogenic disasters, the subject of this chapter refers to a comprehensive analysis of the security aspects of critical infrastructure protection in anthropogenic (anthropogenic) disasters. On the other hand, the social goal of the research is to determine the level of public awareness of the importance of protecting critical infrastructure from these disasters. By applying the quantitative research tradition, quantitative research was realized in Belgrade, in which 200 respondents were interviewed by random sampling. The obtained research results unequivocally indicate that preventive action in this area should be mainly focused on adopting strategies based on which plans are made to prevent these disasters and operational procedures from protecting critical infrastructure.


2018 ◽  
Vol 6 (1) ◽  
Author(s):  
Firrean Firrean

Special Economic Zones (SEZ) is a region with certain limits within the jurisdiction of Indonesia which is set to perform economic functions and obtain certain facilities. One SEZ developed in North Sumatra Province and included in the National Strategic Area (KSN) Medan - Binjai - Deli Serdang - Karo is SEZ Sei Mangke. SEZ Sei Mangke is defined in PP 29 of 2012 on 27 February 2012 and is the first KEK in Indonesia which was inaugurated its operation by President Joko Widodo on January 27, 2015. KSN Mebidangro itself is an area of priority spatial arrangement because it has a very important influence nationally against state sovereignty, defense and state security, economic, social, cultural, and / or environment, including areas designated as world heritage. This research is an evaluative research intended to find out the end of a policy program in order to determine recommendation of last policy by using CIPO model which includes four stages: (1) context, (2) input, (3) process, and (4) output. The research method used is case study by applying qualitative research that aims to make an accurate interpretation of the characteristics of the object under study. Findings on the evaluation context indicate that the program is generally running well, but some aspects of synergy and policy optimization as well as financing support from central and local government need to be improved. In the input evaluation, and evaluation process some aspects need to be improved because the findings show the weakness of some aspects is the result of lack of synergy and optimization of policy and support from local government. Interesting from the evaluation of ouput is that with some weaknesses in the input and process components, it turns out the evaluation findings ouput show Seek Mangke SEZ development can still run well. The recommendation of this research is to improve the quality of policy synergy / program of SEZ Seek development by improving several aspects that are categorized in each stage of evaluation


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 388
Author(s):  
Santos Bringas ◽  
Rafael Duque ◽  
Alicia Nieto-Reyes ◽  
Cristina Tîrnăucă ◽  
José Luis Montaña

Collaborative systems support shared spaces, where groups of users exchange interactions. In order to ensure the usability of these systems, an intuitive interactions’ organization and that each user has awareness information to know the activity of others are necessary. Usability laboratories allow evaluators to verify these requirements. However, laboratory usability evaluations can be problematic for reproducing mobile and ubiquitous contexts, as they restrict the place and time in which the user interacts with the system. This paper presents a framework for building software support that it collects human–machine interactions in mobile and ubiquitous contexts and outputs an assessment of the system’s usability. This framework is constructed through learning that is based on neural networks, identifying sequences of interactions related to usability problems when users carry out collaborative activities. The paper includes a case study that puts the framework into action during the development process of a smartphone application that supports collaborative sport betting.


Sign in / Sign up

Export Citation Format

Share Document