{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882733,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340498","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DTE Access Control Model for Integrated ICS Systems"],"prefix":"10.1145","author":[{"given":"Khaoula","family":"Es-Salhi","sequence":"first","affiliation":[{"name":"IMT Atlantique - LabSTICC, Cesson S\u00e9vign\u00e9, France"}]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[{"name":"University of Western Brittany - LabSTICC, Brest, France"}]},{"given":"Nora","family":"Cuppens","sequence":"additional","affiliation":[{"name":"IMT Atlantique - LabSTICC, Cesson S\u00e9vign\u00e9, France"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Draft 14","volume-title":"Enterprise - Control System Integration Part 1: Models and Terminology. ISA-dS95 Standard","year":"1999","unstructured":"1999. Enterprise - Control System Integration Part 1: Models and Terminology. ISA-dS95 Standard ( Draft 14 ) , 1999 (1999). 1999. Enterprise - Control System Integration Part 1: Models and Terminology. ISA-dS95 Standard (Draft 14), 1999 (1999)."},{"key":"e_1_3_2_1_2_1","first-page":"00","volume":"95","year":"2004","unstructured":"2004 . Enterprise - Control System Integration Part 3: Activity Models of Manufacturing Operations Management. ISA-95 Standard 95 . 00 .03 (Draft 16), 2004 (2004). 2004. Enterprise - Control System Integration Part 3: Activity Models of Manufacturing Operations Management. ISA-95 Standard 95.00.03 (Draft 16), 2004 (2004).","journal-title":"ISA-95 Standard"},{"volume-title":"Global Security Mag","year":"2014","key":"e_1_3_2_1_3_1","unstructured":"2014. Global Mag Security . Global Security Mag , October 2014 (2014). 2014. Global Mag Security. Global Security Mag, October 2014 (2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"2014. Tofino Industrial Security Solutions. https:\/\/www.tofinosecurity.com\/why\/overview  2014. Tofino Industrial Security Solutions. https:\/\/www.tofinosecurity.com\/why\/overview"},{"key":"e_1_3_2_1_5_1","unstructured":"2015. The Innominate Security Technologies mGuard website. (2015).  2015. The Innominate Security Technologies mGuard website. (2015)."},{"key":"e_1_3_2_1_6_1","unstructured":"2015. The Tofino Security Appliance website. (2015).  2015. The Tofino Security Appliance website. (2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884237"},{"key":"e_1_3_2_1_8_1","first-page":"47","article-title":"A domain and type enforcement UNIX prototype","volume":"9","author":"Badger Lee","year":"1996","unstructured":"Lee Badger , Daniel F Sterne , David L Sherman , Kenneth M Walker , and Sheila A Haghighat . 1996 . A domain and type enforcement UNIX prototype . Computing Systems 9 , 1 (1996), 47 -- 83 . Lee Badger, Daniel F Sterne, David L Sherman, Kenneth M Walker, and Sheila A Haghighat. 1996. A domain and type enforcement UNIX prototype. Computing Systems 9, 1 (1996), 47--83.","journal-title":"Computing Systems"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of 34th Annual Western Protective Relay Conference.","author":"Bradetich Ryan","year":"2007","unstructured":"Ryan Bradetich and Paul Oman . 2007 . Connecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux . In Proceedings of 34th Annual Western Protective Relay Conference. Ryan Bradetich and Paul Oman. 2007. Connecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux. In Proceedings of 34th Annual Western Protective Relay Conference."},{"key":"e_1_3_2_1_10_1","volume-title":"Implementing SCADA Security Policies Via Security-Enhanced Linux. In proceedings of the 10th Annual Western Power Delivery Automation Conference.","author":"Bradetich Ryan","year":"2008","unstructured":"Ryan Bradetich and Paul Oman . 2008 . Implementing SCADA Security Policies Via Security-Enhanced Linux. In proceedings of the 10th Annual Western Power Delivery Automation Conference. Ryan Bradetich and Paul Oman. 2008. Implementing SCADA Security Policies Via Security-Enhanced Linux. In proceedings of the 10th Annual Western Power Delivery Automation Conference."},{"key":"e_1_3_2_1_11_1","volume-title":"Luca Durante, and Adriano Valenzano.","author":"Cereia Marco","year":"2014","unstructured":"Marco Cereia , Ivan Cibrario Bertolotti , Luca Durante, and Adriano Valenzano. 2014 . Latency evaluation of a firewall for industrial networks based on the Tofino industrial security solution. In Emerging Technology and Factory Automation (ETFA), 2014 IEEE. IEEE , 1--8. Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, and Adriano Valenzano. 2014. Latency evaluation of a firewall for industrial networks based on the Tofino industrial security solution. In Emerging Technology and Factory Automation (ETFA), 2014 IEEE. IEEE, 1--8."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005177"},{"volume-title":"2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 1--8.","author":"Cheminod M.","key":"e_1_3_2_1_13_1","unstructured":"M. Cheminod , L. Durante , A. Valenzano , and C. Zunino . 2016. Performance impact of commercial industrial firewalls on networked control systems . In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 1--8. M. Cheminod, L. Durante, A. Valenzano, and C. Zunino. 2016. Performance impact of commercial industrial firewalls on networked control systems. In 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA). 1--8."},{"key":"e_1_3_2_1_14_1","article-title":"Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities","author":"La Torre Gonzalo De","year":"2019","unstructured":"Gonzalo De La Torre , Paul Rad , and Kim-Kwang Raymond Choo . 2019 . Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities . Journal of Network and Computer Applications. Gonzalo De La Torre, Paul Rad, and Kim-Kwang Raymond Choo. 2019. Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities. Journal of Network and Computer Applications.","journal-title":"Journal of Network and Computer Applications."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R. C. Diovu and J. T. Agee. 2017. A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks. 2017 IEEE PES PowerAfrica (2017).  R. C. Diovu and J. T. Agee. 2017. A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks. 2017 IEEE PES PowerAfrica (2017).","DOI":"10.1109\/PowerAfrica.2017.7991195"},{"volume-title":"2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON).","author":"Diovu R. C.","key":"e_1_3_2_1_16_1","unstructured":"R. C. Diovu and J. T. Agee . 2017. Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks . In 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON). R. C. Diovu and J. T. Agee. 2017. Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks. In 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of 11th annual computer security application conference. 241--48","author":"Ferraiolo David","year":"1995","unstructured":"David Ferraiolo , Janet Cugini , and D Richard Kuhn . 1995 . Role-based access control (RBAC): Features and motivations . In Proceedings of 11th annual computer security application conference. 241--48 . David Ferraiolo, Janet Cugini, and D Richard Kuhn. 1995. Role-based access control (RBAC): Features and motivations. In Proceedings of 11th annual computer security application conference. 241--48."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596147"},{"key":"e_1_3_2_1_19_1","unstructured":"L. A. Rojas H. Eslava and D. Pineda. 2015. An algorithm for optimal firewall placement. iec61850 substations \u00e2\u0102\u0130 Journal of Power and Energy Engineering (2015).  L. A. Rojas H. Eslava and D. Pineda. 2015. An algorithm for optimal firewall placement. iec61850 substations \u00e2\u0102\u0130 Journal of Power and Energy Engineering (2015)."},{"volume-title":"2016 14th Annual Conference on Privacy, Security and Trust (PST).","author":"Hachana S.","key":"e_1_3_2_1_20_1","unstructured":"S. Hachana , F. Cuppens , and N. Cuppens-Boulahia . 2016. Towards a new generation of industrial firewalls: Operational-process aware filtering . In 2016 14th Annual Conference on Privacy, Security and Trust (PST). S. Hachana, F. Cuppens, and N. Cuppens-Boulahia. 2016. Towards a new generation of industrial firewalls: Operational-process aware filtering. In 2016 14th Annual Conference on Privacy, Security and Trust (PST)."},{"key":"e_1_3_2_1_21_1","volume-title":"Annual Linux Showcase & Conference.","author":"Hallyn Serge E","year":"2000","unstructured":"Serge E Hallyn and Phil Kearns . 2000 . Domain and Type Enforcement for Linux .. In Annual Linux Showcase & Conference. Serge E Hallyn and Phil Kearns. 2000. Domain and Type Enforcement for Linux.. In Annual Linux Showcase & Conference."},{"volume-title":"2013 Third International Conference on Communications and Information Technology (ICCIT). 179--184","author":"Hayes G.","key":"e_1_3_2_1_22_1","unstructured":"G. Hayes and K. El-Khatib . 2013. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol . In 2013 Third International Conference on Communications and Information Technology (ICCIT). 179--184 . G. Hayes and K. El-Khatib. 2013. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In 2013 Third International Conference on Communications and Information Technology (ICCIT). 179--184."},{"key":"e_1_3_2_1_23_1","volume-title":"Suzanne Lightman and Adam Hahn","author":"Marshall Abrams Keith Stouffer Victoria Pillitteri","year":"2015","unstructured":"Victoria Pillitteri Marshall Abrams Keith Stouffer , Suzanne Lightman and Adam Hahn . 2015 . Guide to industrial control systems (ICS) security. NIST special publication, vol. 800 , no.82, 2015 800, 82 (2015), 16--16. Victoria Pillitteri Marshall Abrams Keith Stouffer, Suzanne Lightman and Adam Hahn. 2015. Guide to industrial control systems (ICS) security. NIST special publication, vol. 800, no.82, 2015 800, 82 (2015), 16--16."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A. H. Khosroshahi and H. Shahinzadeh. 2016. Security technology by using firewall for smart grid. Bulletin of Electrical Engineering and Informatics (2016).  A. H. Khosroshahi and H. Shahinzadeh. 2016. Security technology by using firewall for smart grid. Bulletin of Electrical Engineering and Informatics (2016).","DOI":"10.11591\/545"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/268478"},{"key":"e_1_3_2_1_26_1","unstructured":"Schweitzer Engineering Laboratories. {n. d.}. SEL-3021-1 Serial Encrypting Transceiver. Pullman Washington ({n. d.}).  Schweitzer Engineering Laboratories. {n. d.}. SEL-3021-1 Serial Encrypting Transceiver. Pullman Washington ({n. d.})."},{"key":"e_1_3_2_1_27_1","unstructured":"Schweitzer Engineering Laboratories. {n. d.}. SEL-3620 Ethernet Security Gateway. Pullman Washington ({n. d.}).  Schweitzer Engineering Laboratories. {n. d.}. SEL-3620 Ethernet Security Gateway. Pullman Washington ({n. d.})."},{"key":"e_1_3_2_1_28_1","volume-title":"SCADAWall: A CPI-enabled firewall model for SCADA security. Computers & Security 80 (10","author":"Li Dong","year":"2018","unstructured":"Dong Li , Huaqun Guo , Jianying Zhou , Luying Zhou , and Jun Wen . 2018. SCADAWall: A CPI-enabled firewall model for SCADA security. Computers & Security 80 (10 2018 ). Dong Li, Huaqun Guo, Jianying Zhou, Luying Zhou, and Jun Wen. 2018. SCADAWall: A CPI-enabled firewall model for SCADA security. Computers & Security 80 (10 2018)."},{"volume-title":"Advances in Computer","author":"Majdalawieh Munir","key":"e_1_3_2_1_29_1","unstructured":"Munir Majdalawieh , Francesco Parisi-Presicce , and Duminda Wijesekera . 2006. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework . In Advances in Computer , Information, and Systems Sciences, and Engineering, Khaled Elleithy, Tarek Sobh, Ausif Mahmood, Magued Iskander, and Mohammad Karim (Eds.). Springer Netherlands . Munir Majdalawieh, Francesco Parisi-Presicce, and Duminda Wijesekera. 2006. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework. In Advances in Computer, Information, and Systems Sciences, and Engineering, Khaled Elleithy, Tarek Sobh, Ausif Mahmood, Magued Iskander, and Mohammad Karim (Eds.). Springer Netherlands."},{"key":"e_1_3_2_1_30_1","volume-title":"Ubiquitous Computing, and Dependable Applications","author":"Nagarajan Anand","year":"2010","unstructured":"Anand Nagarajan and Christian Damsgaard Jensen\u00e2\u0102\u0103 . 2010. A generic role based access control model for wind power systems. Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications ( 2010 ). Anand Nagarajan and Christian Damsgaard Jensen\u00e2\u0102\u0103. 2010. A generic role based access control model for wind power systems. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2010)."},{"volume-title":"2016 IEEE Symposium on Technologies for Homeland Security (HST).","author":"Nivethan J.","key":"e_1_3_2_1_31_1","unstructured":"J. Nivethan and M. Papa . 2016. A Linux-based firewall for the DNP3 protocol . In 2016 IEEE Symposium on Technologies for Homeland Security (HST). J. Nivethan and M. Papa. 2016. A Linux-based firewall for the DNP3 protocol. In 2016 IEEE Symposium on Technologies for Homeland Security (HST)."},{"key":"e_1_3_2_1_32_1","first-page":"2013","volume-title":"ANSSI","author":"National Cybersecurity Agency of France.","year":"2013","unstructured":"National Cybersecurity Agency of France. 2013 . Classification Method and Key Measures . ANSSI , 2013 (2013). National Cybersecurity Agency of France. 2013. Classification Method and Key Measures. ANSSI, 2013 (2013)."},{"key":"e_1_3_2_1_33_1","volume-title":"DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings","volume":"1","author":"Oostendorp Karen A","year":"2000","unstructured":"Karen A Oostendorp , Lee Badger , Christopher D Vance , Wayne G Morrison , Michael J Petkac , David L Sherman , and Daniel F Sterne . 2000 . Domain and type enforcement firewalls . In DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings , Vol. 1 . IEEE, 351--361. Karen A Oostendorp, Lee Badger, Christopher D Vance, Wayne G Morrison, Michael J Petkac, David L Sherman, and Daniel F Sterne. 2000. Domain and type enforcement firewalls. In DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings, Vol. 1. IEEE, 351--361."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2013.59"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.122011.110151"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"A. Shahzad M. Lee Y. K. Lee S. Kim N. Xiong J. Y. Choi and Y. Cho. 2015. Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information.  A. Shahzad M. Lee Y. K. Lee S. Kim N. Xiong J. Y. Choi and Y. Cho. 2015. Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information.","DOI":"10.3390\/sym7031176"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.17706\/jcp.11.5.432-438"},{"key":"e_1_3_2_1_38_1","volume-title":"2008 IEEE International Conference on Industrial Technology.","author":"Wang Baoyi","year":"2008","unstructured":"Baoyi Wang , Shaomin Zhang , and Zhilei Zhang . 2008 . DRBAC based access control method in substation automation system . In 2008 IEEE International Conference on Industrial Technology. Baoyi Wang, Shaomin Zhang, and Zhilei Zhang. 2008. DRBAC based access control method in substation automation system. In 2008 IEEE International Conference on Industrial Technology."},{"volume-title":"2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).","author":"Wei D.","key":"e_1_3_2_1_39_1","unstructured":"D. Wei , F. Darie , and L. Shen . 2013. Application layer security proxy for smart Grid substation automation systems . In 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT). D. Wei, F. Darie, and L. Shen. 2013. Application layer security proxy for smart Grid substation automation systems. In 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159999"},{"key":"e_1_3_2_1_41_1","volume-title":"Evaluation of Industrial Firewall Performance Issues in Automation and Control Networks. In 2018 29th Biennial Symposium on Communications (BSC). IEEE, 1--5.","author":"Zvabva Davison","year":"2018","unstructured":"Davison Zvabva , Pavol Zavarsky , Sergey Butakov , and John Luswata . 2018 . Evaluation of Industrial Firewall Performance Issues in Automation and Control Networks. In 2018 29th Biennial Symposium on Communications (BSC). IEEE, 1--5. Davison Zvabva, Pavol Zavarsky, Sergey Butakov, and John Luswata. 2018. Evaluation of Industrial Firewall Performance Issues in Automation and Control Networks. In 2018 29th Biennial Symposium on Communications (BSC). IEEE, 1--5."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":41,"alternative-id":["10.1145\/3339252.3340498","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340498","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}