Critical Information Infrastructures Security Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technolo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lopez, Javier (Επιμελητής έκδοσης), Hämmerli, Bernhard M. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes in Computer Science, 5141
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Session 1: R&D Agenda
  • Towards a European Research Agenda for CIIP: Results from the CI2RCO Project
  • ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
  • Session 2: Communication Risk and Assurance I
  • An Analysis of Cyclical Interdependencies in Critical Infrastructures
  • A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures
  • Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry
  • Advanced Reaction Using Risk Assessment in Intrusion Detection Systems
  • Session 3: Communication Risk and Assurance II
  • Managing Critical Infrastructures through Virtual Network Communities
  • The Structure of the Sense of Security, Anshin
  • Securing Agents against Malicious Host in an Intrusion Detection System
  • Session 4: Code of Practice and Metrics
  • UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project
  • Expert System CRIPS: Support of Situation Assessment and Decision Making
  • Using Dependent CORAS Diagrams to Analyse Mutual Dependency
  • A Methodology to Estimate Input-Output Inoperability Model Parameters
  • Session 5: Information Sharing and Exchange
  • Efficient Access Control for Secure XML Query Processing in Data Streams
  • An Approach to Trust Management Challenges for Critical Infrastructures
  • Session 6: Continuity of Services and Resiliency
  • Detecting DNS Amplification Attacks
  • LoRDAS: A Low-Rate DoS Attack against Application Servers
  • Intra Autonomous System Overlay Dedicated to Communication Resilience
  • A Proposal for the Definition of Operational Plans to Provide Dependability and Security
  • Session 7: SCADA and Embedded Security
  • Application of Kohonen Maps to Improve Security Tests on Automation Devices
  • Ideal Based Cyber Security Technical Metrics for Control Systems
  • Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability
  • Session 8: Threats and Attacks Modeling
  • A General Model and Guidelines for Attack Manifestation Generation
  • A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
  • Attack Modeling of SIP-Oriented SPIT
  • A Malware Detector Placement Game for Intrusion Detection
  • Session 9: Information Exchange and Modelling
  • Modeling and Simulating Information Security Management
  • Design of a Platform for Information Exchange on Protection of Critical Infrastructures
  • Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.