Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /
Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Computer Communication Networks and Telecommunications,
4347 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
- Experiment Based Validation of CIIP
- Security Requirements Model for Grid Data Management Systems
- Assessing the Risk of an Information Infrastructure Through Security Dependencies
- Modelling Risk and Identifying Countermeasure in Organizations
- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
- A Framework for Conceptualizing Social Engineering Attacks
- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)
- Intelligent Network-Based Early Warning Systems
- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study
- Protection of Components Based on a Smart-Card Enhanced Security Module
- Revisiting Colored Networks and Privacy Preserving Censorship
- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios
- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
- Trust Establishment in Ad Hoc and Sensor Networks
- Enforcing Trust in Pervasive Computing with Trusted Computing Technology
- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems
- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection
- Rational Choice of Security Measures Via Multi-parameter Attack Trees
- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
- A Framework for Secure and Verifiable Logging in Public Communication Networks.