Cargando…

Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /

Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lopez, Javier (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Computer Communication Networks and Telecommunications, 4347
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
  • Experiment Based Validation of CIIP
  • Security Requirements Model for Grid Data Management Systems
  • Assessing the Risk of an Information Infrastructure Through Security Dependencies
  • Modelling Risk and Identifying Countermeasure in Organizations
  • Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
  • A Framework for Conceptualizing Social Engineering Attacks
  • An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)
  • Intelligent Network-Based Early Warning Systems
  • Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study
  • Protection of Components Based on a Smart-Card Enhanced Security Module
  • Revisiting Colored Networks and Privacy Preserving Censorship
  • PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios
  • Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
  • Trust Establishment in Ad Hoc and Sensor Networks
  • Enforcing Trust in Pervasive Computing with Trusted Computing Technology
  • Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems
  • High-Speed Intrusion Detection in Support of Critical Infrastructure Protection
  • Rational Choice of Security Measures Via Multi-parameter Attack Trees
  • Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
  • Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
  • A Framework for Secure and Verifiable Logging in Public Communication Networks.