{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:04:27Z","timestamp":1776888267719,"version":"3.51.2"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,6]]},"DOI":"10.1109\/smc54092.2024.10830988","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:39:20Z","timestamp":1737398360000},"page":"3528-3534","source":"Crossref","is-referenced-by-count":3,"title":["MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model"],"prefix":"10.1109","author":[{"given":"Hangyu","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Fei","family":"Lv","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Tech University,Shanghai,China"}]},{"given":"Shuaizong","family":"Si","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Zhiwen","family":"Pan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]},{"given":"Degang","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China"}]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS,Beijing Key Laboratory of IOT Information Security Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_104"},{"key":"ref2","volume-title":"Evolution of ICS attacks and the prospects for future disruptive events","author":"Joseph","year":"2019"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"103131","DOI":"10.1016\/j.jprocont.2023.103131","article-title":"SEAG: A Novel Dynamic Security Risk Assessment Method for Industrial Control Systems with Consideration of Social Engineering","volume":"132","author":"Kaixiang","year":"2023","journal-title":"J. Process Control"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/20438869231200284"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.16.1.2032"},{"key":"ref6","first-page":"1196","article-title":"Case Studies and Use case Scenarios of CPS-IoT","author":"Devanshu","year":"2023","journal-title":"IEEE IITCEE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.21684\/2412-2343-2023-10-4-35-52"},{"key":"ref8","author":"Kaufman","year":"2023","journal-title":"Leadership for CyberBioSecurity: The Case of Oldsmar Water"},{"key":"ref9","volume-title":"ICS cyberthreats in 2023","author":"Goncharov","year":"2023"},{"key":"ref10","first-page":"95","article-title":"Access control in the industrial internet of things","author":"Stavros","year":"2019","journal-title":"Security and privacy trends in the industrial internet of things"},{"key":"ref11","volume-title":"Access Control Models to secure Industry 4.0 Indus-trial Automation and Control Systems","author":"Bjorn","year":"2020"},{"key":"ref12","article-title":"Dynamic Access Control for Industrial Systems","author":"Bjorn","year":"2023","journal-title":"Malardalen University (Sweden)"},{"issue":"1","key":"ref13","first-page":"84","article-title":"G-sir: an insider attack resilient geo-social access control framework","volume":"16","author":"Baracaldo","year":"2017","journal-title":"IEEE TDSC"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16088-2_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00058"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2018.611028"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ijcip.2018.05.004","article-title":"On PLC network security","volume":"22","author":"Asem","year":"2018","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212091"},{"key":"ref20","article-title":"Access Control and Identity Management","author":"Chapple","year":"2020","journal-title":"Jones & Bartlett"},{"key":"ref21","first-page":"1","article-title":"Multi-level user and role concept for a secure plug-and-work based on OPC UA and Automation ML","author":"Schleipen","year":"2015","journal-title":"2015 IEEE 20th ETFA"},{"key":"ref22","article-title":"Secure granular interoperability with OPC UA","volume-title":"INFORMATIK 2019: 50 Jahre Gesellschaft fur Informatik (Workshop-Beitrage)","author":"Watson","year":"2019"},{"issue":"3","key":"ref23","first-page":"2054","article-title":"Shadowplcs: A novel scheme for remote detection of industrial process control attacks","volume":"19","author":"Junjiao","year":"2020","journal-title":"TDSC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2948041"}],"event":{"name":"2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Kuching, Malaysia","start":{"date-parts":[[2024,10,6]]},"end":{"date-parts":[[2024,10,10]]}},"container-title":["2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10830919\/10830920\/10830988.pdf?arnumber=10830988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:52:38Z","timestamp":1737442358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10830988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/smc54092.2024.10830988","relation":{},"subject":[],"published":{"date-parts":[[2024,10,6]]}}}