legal and illegal information flows. Overall, our met-
hod can successfully identify the high-risk informa-
tion flows, and thus the high-risk nodes that are sus-
ceptable to participate in an illegal information flow.
This is an important feedback, because we can point
out the nodes that are vulnerable and need more accu-
rate access control rules.
Our future work is to identify whether potential il-
legal information flow risk is transferred from the
previous connection to the next one, where illegal in-
formation flow of one transaction may be propagated
to the next transaction within a business process. Our
vision is to evaluate our approach in real world IIoT
environments, such as smart manufacturing or smart
grid.
ACKNOWLEDGEMENTS
This work has been supported in part by a research
grant offered by the Hellenic Ministry of Digital Go-
vernance to the Research Centre of the Athens Uni-
versity of Economics & Business, Greece (2022-24).
REFERENCES
Bell, D., & La Padula, L., Secure computer systems: Unifi-
ed exposition and Multics interpretation. MTR-2997,
MITRE Corp., USA, 1976.
Cai, G., Shi, L., & Sui, X. (2009, October). Illegal Infor-
mation Flow Detection in Electronic Institution. In
2009 3
rd
International Conference on Genetic and
Evolutionary Computing (pp. 240-243). IEEE.
Denning, D. E. (1976). A lattice model of secure informa-
tion flow. Com. of the ACM, 19(5), 236-243.
Downs, D., Rub, J., Kung, K., & Jordan, C. (1985, April).
Issues in discretionary access control. In 1985 IEEE
Symposium on Security and Privacy (pp. 208-208).
IEEE.
ENISA (2018). Good Practices for Security of Internet of
Things in the context of Smart Manufacturing. Euro-
pean Union Agency for Network and Information Se-
curity (ENISA).
Hammer, C., & Snelting, G. (2009). Flow-sensitive, context
-sensitive, and object-sensitive information flow con-
trol based on program dependence graphs. Inter-
national Journal of Information Security, 8(6), 399-
422.
Hedin, D., & Sabelfeld, A. (2012). A perspective on infor-
mation-flow control. In Software safety and securi-
ty (pp. 319-347). IOS Press.
Jaume, M., Tong, V., & Mé, L. (2011, December). Flow
based interpretation of access control: Detection of il-
legal information flows. In ICISS (pp. 72-86).
Kotzanikolaou, P., Theoharidou, M., & Gritzalis, D. (2013
a, March). Cascading effects of common-cause failures
in critical infrastructures. In 7
th
IFIP International Co-
nference (pp. 171-182). Springer.
Kotzanikolaou, P., Theoharidou, M., & Gritzalis, D. (2013
b). Assessing n-order dependencies between critical
infrastructures. International Journal of Critical Infra-
structures 6, 9(1-2), 93-110.
Masri, W., Podgurski, A., & Leon, D. (2004, November).
Detecting and debugging insecure information flows.
In 15
th
International Symposium on Software Re-
liability Engineering (pp. 198-209). IEEE.
Nakamura, S., Ogiela, L., Enokido, T., & Takizawa, M.
(2018). An information flow control model in a topic-
based publish/subscribe system. Journal of High-Speed
Networks, 24(3), 243-257.
Nakamura, S., Enokido, T., Barolli, L., & Takizawa, M.
(2019, June). Capability-based information flow con-
trol model in the IoT. In 13
th
International Conference
on Innovative Mobile and Internet Services in
Ubiquitous Computing (pp. 63-71). Springer
Salonikias, S., Gouglidis, A., Mavridis, I., & Gritzalis, D.
(2019). Access control in the industrial internet of
things. Security and privacy trends in the industrial
internet of things, 95-114.
Samarati, P., & de Vimercati, S. C. (2001). Access control:
Policies, models, and mechanisms. In Foundations of
Security Analysis and Design: Tutorial Lectures 1 (pp.
137-196). Springer.
Sandhu, R. (1993). Lattice-based access control mo-
dels. Computer, 26(11), 9-19.
Sandhu, R., Coyne, E., Feinstein, H., & Youman, C. (1996).
Role-based access control models. Computer, 29 (2),
38-47.
Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund,
M. (2018). Industrial internet of things: Challenges,
opportunities, and directions. IEEE transactions on
industrial informatics, 14(11), 4724-4734.
Zimmermann, J., Mé, L., & Bidan, C. (2003). An improved
reference flow control model for policy-based intrusion
detection. Lecture notes in Computer Science, 2808,
291-308.