All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F23%3A10474024" target="_blank" >RIV/00216208:11320/23:10474024 - isvavai.cz</a>

  • Result on the web

    <a href="https://verso.is.cuni.cz/pub/verso.fpl?fname=obd_publikace_handle&handle=mQBFS.bTJy" target="_blank" >https://verso.is.cuni.cz/pub/verso.fpl?fname=obd_publikace_handle&handle=mQBFS.bTJy</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1515/auto-2022-0135" target="_blank" >10.1515/auto-2022-0135</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

  • Original language description

    Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/GC20-24814J" target="_blank" >GC20-24814J: FluidTrust – Enabling trust by fluid access control to data and physical resources in Industry 4.0 systems</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2023

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    AT-Automatisierungstechnik

  • ISSN

    0178-2312

  • e-ISSN

    2196-677X

  • Volume of the periodical

    71

  • Issue of the periodical within the volume

    6

  • Country of publishing house

    DE - GERMANY

  • Number of pages

    10

  • Pages from-to

    443-452

  • UT code for WoS article

    001004217900003

  • EID of the result in the Scopus database

    2-s2.0-85161539803