skip to main content
10.1145/2459976.2460044acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

On the use of the Clark-Wilson security model to protect industrial automation control systems

Published: 08 January 2013 Publication History

Abstract

IEC 62443 is a work-in-progress standard specifying the requirements for protecting industrial automation control systems against cyber-initiated attacks such as Stuxnet, Confiker, DKU, and most recently Flame. Part 1-3 specifies Jaquith-based security metrics to be used to determine compliance with IEC 62443 security policies, requirements and audit criteria. In order to align the metrics with system requirements and audit criteria which are specified as a base requirement and if needed one or more requirement enhancements, a formal model is needed. Furthermore, the model must accommodate the concept of security levels defined in IEC 62443. The Clark-Wilson Security Model is used to provide a formal framework of rules for compliance and enforcement. This paper describes how the model could be used and identifies deficiencies in IEC 62443 that need to be addressed.

References

[1]
D. D. Clark and D. R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," IEEE Technical Paper, 1987.
[2]
"Framework for Key Management Extensions," American National Standards Institute Standard ANS/ABA X9.69--1999, 1999.
[3]
A. Jaquith, Security Metrics: replacing fear, uncertainty and doubt. Boston, MA, United States: Pearson Education, Inc., 2007.

Cited By

View all
  • (2020)Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook2020 IEEE International Conference on Electro Information Technology (EIT)10.1109/EIT48999.2020.9208279(155-161)Online publication date: Jul-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Clark-Wilson security model
  2. Jaquith metrics
  3. compliance rules
  4. cybersecurity
  5. enforcement rules
  6. industrial automation control system protection

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Enhancing User Privacy Protection by Enforcing Clark-Wilson Security Model on Facebook2020 IEEE International Conference on Electro Information Technology (EIT)10.1109/EIT48999.2020.9208279(155-161)Online publication date: Jul-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media