000 05849nam a22006375i 4500
001 978-3-540-89173-4
003 DE-He213
005 20240730195333.0
007 cr nn 008mamaa
008 100509s2008 gw | s |||| 0|eng d
020 _a9783540891734
_9978-3-540-89173-4
024 7 _a10.1007/978-3-540-89173-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aCritical Information Infrastructures Security
_h[electronic resource] :
_bSecond International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 /
_cedited by Bernhard Hämmerli.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXI, 362 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5141
505 0 _aSession 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal BasedCyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are orgaized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.
650 0 _aComputer networks .
_931572
650 0 _aUser interfaces (Computer systems).
_911681
650 0 _aHuman-computer interaction.
_96196
650 0 _aComputers and civilization.
_921733
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aAlgorithms.
_93390
650 1 4 _aComputer Communication Networks.
_9159936
650 2 4 _aUser Interfaces and Human Computer Interaction.
_931632
650 2 4 _aComputers and Society.
_931668
650 2 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aAlgorithms.
_93390
700 1 _aHämmerli, Bernhard.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9159937
710 2 _aSpringerLink (Online service)
_9159938
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540890959
776 0 8 _iPrinted edition:
_z9783540891741
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5141
_9159939
856 4 0 _uhttps://doi.org/10.1007/978-3-540-89173-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95584
_d95584