The full text of this article
Designing security policies for complex SCADA systems management and protection
by Christophe Feltus; Djamel Khadraoui
International Journal of Information Technology and Management (IJITM), Vol. 15, No. 4, 2016
Abstract: Supervisory control and data acquisition systems (SCADA) are required to deal with increasingly sensitive and crucial situations. The management and protection of these systems must constantly evolve towards integrated decisions support and policies driven by cyber security requirements. The current research stream in this area aims to foster the smartness of the field equipments and the management processes. SCADA components are governed by policies which depend on the components function as well as on the evolution of the crisis which also confer to the latter the latitude to react based on their own perception of the situation evolution. Existing work related to crisis management tends to consider that components evolve and are organised in systems but as far as we know, no systemic solution exists which integrates all of the above requirements. This paper proposes an ArchiMate® extension for SCADA with a broaden explanation of the behaviour endorsed in cyber-policy.
Online publication date: Thu, 22-Sep-2016
is only available to individual subscribers or to users at subscribing institutions.
Go to Inderscience Online Journals to access the Full Text of this article.
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information Technology and Management (IJITM):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable).
See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org