Access control management for SCADA systems

Seng Phil Hong, Gail-Joon Ahn, Wenjuan Xu

Research output: Contribution to journalArticlepeer-review


The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

Original languageEnglish (US)
Pages (from-to)2449-2457
Number of pages9
JournalIEICE Transactions on Information and Systems
Issue number10
StatePublished - Oct 2008


  • Access control
  • Security policy
  • Supervisory control and data acquisition (SCADA)

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence


Dive into the research topics of 'Access control management for SCADA systems'. Together they form a unique fingerprint.

Cite this