{"id":"https://openalex.org/W4293234286","doi":"https://doi.org/10.1145/3510547.3517926","title":"Attribute Based Access Control Model for Protecting Programmable Logic Controllers","display_name":"Attribute Based Access Control Model for Protecting Programmable Logic Controllers","publication_year":2022,"publication_date":"2022-04-18","ids":{"openalex":"https://openalex.org/W4293234286","doi":"https://doi.org/10.1145/3510547.3517926"},"language":"en","primary_location":{"id":"doi:10.1145/3510547.3517926","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3510547.3517926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033169572","display_name":"Shwetha Gowdanakatte","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shwetha Gowdanakatte","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008904412","display_name":"Indrakshi Ray","orcid":"https://orcid.org/0000-0002-0714-7676"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrakshi Ray","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019231096","display_name":"Siv Hilde Houmb","orcid":"https://orcid.org/0000-0003-1897-5132"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Siv Hilde Houmb","raw_affiliation_strings":["Norwegian University of Science and Technology, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Oslo, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033169572"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":0.5303,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70771483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7145591974258423},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6978693604469299},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6456788778305054},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5829981565475464},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5512804985046387},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5302431583404541},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.46148955821990967},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4568006694316864},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.44647422432899475},{"id":"https://openalex.org/keywords/control-logic","display_name":"Control logic","score":0.43389222025871277},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4177801012992859},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.37078481912612915},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36098477244377136},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3393731117248535},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13172787427902222},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.10459598898887634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7145591974258423},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6978693604469299},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6456788778305054},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5829981565475464},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5512804985046387},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5302431583404541},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.46148955821990967},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4568006694316864},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.44647422432899475},{"id":"https://openalex.org/C2776350369","wikidata":"https://www.wikidata.org/wiki/Q843479","display_name":"Control logic","level":2,"score":0.43389222025871277},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4177801012992859},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.37078481912612915},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36098477244377136},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3393731117248535},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13172787427902222},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.10459598898887634},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3510547.3517926","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3510547.3517926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5722133124","display_name":null,"funder_award_id":"CNS 1822118","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2142993476","https://openalex.org/W2298494124","https://openalex.org/W2586694115","https://openalex.org/W2802563616","https://openalex.org/W2911542307","https://openalex.org/W2980075564","https://openalex.org/W3177650213"],"related_works":["https://openalex.org/W2012580748","https://openalex.org/W4319436457","https://openalex.org/W4289106691","https://openalex.org/W2903880611","https://openalex.org/W3026309498","https://openalex.org/W2498969563","https://openalex.org/W4308975484","https://openalex.org/W2126079094","https://openalex.org/W3203500078","https://openalex.org/W2905358853"],"abstract_inverted_index":{"Industrial":[0],"Control":[1,97],"Systems":[2],"(ICS)":[3],"were":[4],"traditionally":[5],"designed":[6],"as":[7,33],"stand-alone":[8],"systems":[9],"and":[10,38,47,50,70,89,103,127],"isolated":[11],"from":[12,62,67],"Internet":[13],"Technology":[14],"(IT)":[15],"networks.":[16],"With":[17],"the":[18,23,54,92,124],"advancement":[19],"in":[20,29],"communication":[21],"technology,":[22],"attack":[24],"surface":[25],"has":[26],"increased;":[27],"vulnerabilities":[28,65],"ICS":[30,61,105],"components":[31],"such":[32],"Programmable":[34],"Logic":[35],"Controllers":[36],"(PLC),":[37],"Human":[39],"Machine":[40],"Interfaces":[41],"(HMI)":[42],"can":[43,120],"now":[44],"be":[45,121],"accessed":[46],"exploited.":[48],"Authentication":[49],"access":[51,71],"control":[52,72],"form":[53],"first":[55],"level":[56],"of":[57,94],"defense":[58],"for":[59,115],"protecting":[60],"attacks.":[63,109],"Unfortunately,":[64],"stemming":[66],"improper":[68],"authentication":[69],"are":[73],"very":[74],"common.":[75],"We":[76,110],"focus":[77],"our":[78],"attention":[79],"to":[80,108],"investigate":[81],"these":[82],"vulnerabilities,":[83],"specifically":[84],"those":[85],"centered":[86],"around":[87],"PLCs,":[88],"demonstrate":[90,128],"how":[91,118],"use":[93],"Attribute-Based":[95],"Access":[96],"(ABAC)":[98],"helps":[99],"protect":[100],"against":[101,131],"them":[102],"make":[104],"more":[106],"resilient":[107],"design":[111],"an":[112],"ABAC":[113],"model":[114],"PLC,":[116],"show":[117],"it":[119],"enforced,":[122],"analyze":[123],"resulting":[125],"system":[126],"their":[129],"resilience":[130],"some":[132],"sample":[133],"vulnerabilities.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
