O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Policy takes an important role in most security management systems including critical cyber-physical infrastructure. Since policies are specified by the administrators of the system, the specification must consider human factors such as ease of understanding. Policies should also be analyzable formally so that it is possible to verify policy implementations and detect potential conflicts and inconsistencies. This Part consists of three chapters on policy issues and configuration management.

Chapter 22 titled “Managing and Securing Critical Infrastructure – A Semantic Policy and Trust Driven Approach” considers the use of high-level semantic policies to manage the trust relationship among entities involved in a cyber-physical infrastructure when ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required