Dynamic Access Control in Industry 4.0 Systems
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F23%3A10467548" target="_blank" >RIV/00216208:11320/23:10467548 - isvavai.cz</a>
Result on the web
<a href="https://doi.org/10.1007/978-3-662-65004-2_6" target="_blank" >https://doi.org/10.1007/978-3-662-65004-2_6</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-662-65004-2_6" target="_blank" >10.1007/978-3-662-65004-2_6</a>
Alternative languages
Result language
angličtina
Original language name
Dynamic Access Control in Industry 4.0 Systems
Original language description
Industry 4.0 enacts ad-hoc cooperation between machines, humans, and organizations in supply and production chains. The cooperation goes beyond rigid hierarchical process structures and increases the levels of efficiency, customization, and individualisation of end-products. Efficient processing and cooperation requires exploiting various sensor and process data and sharing them across various entities including computer systems, machines, mobile devices, humans, and organisations. Access control is a common security mechanism to control data sharing between involved parties. However, access control to virtual resources is not sufficient in presence of Industry 4.0 because physical access has a considerable effect on the protection of information and systems. In addition, access control mechanisms have to become capable of handling dynamically changing situations arising from ad-hoc horizontal cooperation or changes in the environment of Industry 4.0 systems. Established access control mechanisms do not consider dynamic changes and the combination with physical access control yet. Approaches trying to address these shortcomings exist but often do not consider howto get information such as the sensitivity of exchanged information. This chapter proposes a novel approach to control physical and virtual access tied to the dynamics of custom product engineering, hence, establishing confidentiality in ad-hoc horizontal processes. The approach combines static design-time analyses to discover data properties with a dynamic runtime access control approach that evaluates policies protecting virtual and physical assets. The runtime part uses data properties derived from the static design-time analysis, as well as the environment or system status to decide about access.
Czech name
—
Czech description
—
Classification
Type
C - Chapter in a specialist book
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/GC20-24814J" target="_blank" >GC20-24814J: FluidTrust – Enabling trust by fluid access control to data and physical resources in Industry 4.0 systems</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2023
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Book/collection name
Digital Transformation: Core Technologies and Emerging Topics from a Computer Science Perspective
ISBN
978-3-662-65003-5
Number of pages of the result
28
Pages from-to
143-170
Number of pages of the book
526
Publisher name
Springer-Verlag
Place of publication
Berlin
UT code for WoS chapter
001074949600007