{"id":"https://openalex.org/W4405440329","doi":"https://doi.org/10.1109/pst62714.2024.10788047","title":"The Value of Strong Identity and Access Management for ICS/OT Security","display_name":"The Value of Strong Identity and Access Management for ICS/OT Security","publication_year":2024,"publication_date":"2024-08-28","ids":{"openalex":"https://openalex.org/W4405440329","doi":"https://doi.org/10.1109/pst62714.2024.10788047"},"language":"en","primary_location":{"id":"doi:10.1109/pst62714.2024.10788047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst62714.2024.10788047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050394662","display_name":"Mohammad Reza Nosouhi","orcid":"https://orcid.org/0000-0001-6959-0975"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohammad Reza Nosouhi","raw_affiliation_strings":["Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090563946","display_name":"Zubair Baig","orcid":"https://orcid.org/0000-0002-9245-2703"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zubair Baig","raw_affiliation_strings":["Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077501988","display_name":"Robin Doss","orcid":"https://orcid.org/0000-0001-6143-6850"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robin Doss","raw_affiliation_strings":["Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019765014","display_name":"Praveen Gauravaram","orcid":"https://orcid.org/0000-0001-9135-2930"},"institutions":[{"id":"https://openalex.org/I4210142080","display_name":"Services Australia","ror":"https://ror.org/03gwaxw53","country_code":"AU","type":"government","lineage":["https://openalex.org/I2801453606","https://openalex.org/I4210142080","https://openalex.org/I4210163987"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Praveen Gauravaram","raw_affiliation_strings":["Tata Consultancy Services (TCS) Ltd.,Brisbane,Australia"],"affiliations":[{"raw_affiliation_string":"Tata Consultancy Services (TCS) Ltd.,Brisbane,Australia","institution_ids":["https://openalex.org/I4210142080"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061159860","display_name":"Debi Prasad Pati","orcid":null},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debi Prasad Pati","raw_affiliation_strings":["Tata Consultancy Services (TCS) Ltd.,Kolkata,India"],"affiliations":[{"raw_affiliation_string":"Tata Consultancy Services (TCS) Ltd.,Kolkata,India","institution_ids":["https://openalex.org/I55215948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054544231","display_name":"Divyans Mahansaria","orcid":"https://orcid.org/0000-0002-0235-6110"},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Divyans Mahansaria","raw_affiliation_strings":["Tata Consultancy Services (TCS) Ltd.,Kolkata,India"],"affiliations":[{"raw_affiliation_string":"Tata Consultancy Services (TCS) Ltd.,Kolkata,India","institution_ids":["https://openalex.org/I55215948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017825429","display_name":"Keshav Sood","orcid":"https://orcid.org/0000-0002-2127-1438"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Keshav Sood","raw_affiliation_strings":["Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Cyber Research and Innovation Centre, Deakin University,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5050394662"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37287872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9014999866485596,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9014999866485596,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.6129870414733887},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5528678894042969},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5260010957717896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.470575749874115},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4523197412490845},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.34587275981903076},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.2610260248184204},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08825230598449707}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.6129870414733887},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5528678894042969},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5260010957717896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.470575749874115},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4523197412490845},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34587275981903076},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2610260248184204},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08825230598449707},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst62714.2024.10788047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst62714.2024.10788047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/28251713","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/28251713","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2766130346","https://openalex.org/W3208113910","https://openalex.org/W4237332204","https://openalex.org/W6790633310"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W1807703735","https://openalex.org/W4238930562","https://openalex.org/W4313185140","https://openalex.org/W2124644269","https://openalex.org/W4226026616","https://openalex.org/W1532113758","https://openalex.org/W3016057931","https://openalex.org/W2046178677","https://openalex.org/W2378169081"],"abstract_inverted_index":{"As":[0],"the":[1,32,53,78,82,89,97,104,107],"integration":[2],"of":[3,55,85],"digital":[4],"technologies":[5],"with":[6,69],"Industrial":[7],"Control":[8],"Systems":[9],"(ICS)":[10],"and":[11,43,64,88,152],"Operational":[12],"Technology":[13],"(OT)":[14],"continues":[15],"to":[16,40,109,171],"deepen,":[17],"these":[18],"systems":[19],"increasingly":[20],"become":[21],"targets":[22],"for":[23,74,102],"sophisticated":[24],"cyber":[25,119],"attacks.":[26],"These":[27],"attacks":[28],"not":[29],"only":[30,135],"threaten":[31],"operational":[33],"integrity":[34],"but":[35],"also":[36],"pose":[37],"significant":[38,159],"risks":[39],"national":[41],"security":[42,57],"public":[44],"safety.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,143],"provide":[50],"insights":[51],"into":[52],"value":[54],"ICS/OT":[56,76,122,177],"solutions":[58],"that":[59,127,133,145],"are":[60,129,166],"based":[61],"on":[62,168],"Identity":[63],"Access":[65],"Management":[66],"(IAM).":[67],"Beginning":[68],"presenting":[70],"an":[71,86],"abstraction":[72],"model":[73],"typical":[75],"attacks,":[77],"paper":[79,105],"systematically":[80],"outlines":[81],"main":[83],"stages":[84],"attack":[87,131,174],"corresponding":[90],"vectors":[91,132,175],"employed":[92],"by":[93],"adversaries.":[94],"Drawing":[95],"from":[96],"MITRE":[98],"ATT&CK":[99],"framework":[100],"tailored":[101],"ICS,":[103],"quantifies":[106],"extent":[108],"which":[110],"IAM-based":[111],"mitigation":[112],"approaches":[113],"can":[114,134],"strengthen":[115],"defense-in-depth":[116],"mechanisms":[117],"against":[118],"threats":[120],"targeting":[121],"environments.":[123,178],"Our":[124],"findings":[125],"show":[126],"there":[128],"modern":[130],"be":[136],"mitigated":[137],"through":[138],"robust":[139],"IAM":[140],"solutions.":[141],"Moreover,":[142],"found":[144],"while":[146],"advanced":[147],"techniques":[148],"such":[149],"as":[150],"firewall":[151],"gateway-based":[153],"intelligent":[154],"threat":[155],"detection":[156],"play":[157],"a":[158],"role":[160],"in":[161,176],"safeguarding":[162],"I":[163],"CS/OT,":[164],"they":[165],"insufficient":[167],"their":[169],"own":[170],"address":[172],"several":[173]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
