Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers /
Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4347 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
- Experiment Based Validation of CIIP
- Security Requirements Model for Grid Data Management Systems
- Assessing the Risk of an Information Infrastructure Through Security Dependencies
- Modelling Risk and Identifying Countermeasure in Organizations
- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
- A Framework for Conceptualizing Social Engineering Attacks
- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)
- Intelligent Network-Based Early Warning Systems
- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study
- Protection of Components Based on a Smart-Card Enhanced Security Module
- Revisiting Colored Networks and Privacy Preserving Censorship
- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios
- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
- Trust Establishment in Ad Hoc and Sensor Networks
- Enforcing Trust in Pervasive Computing with Trusted Computing Technology
- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems
- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection
- Rational Choice of Security Measures Via Multi-parameter Attack Trees
- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
- A Framework for Secure and Verifiable Logging in Public Communication Networks.