Critical information infrastructures security [electronic resource] : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers / Javier Lopez, Bernhard M. Hämmerli (eds.)
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technolo...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Other title: | CRITIS 2007. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
2008.
|
Series: | Lecture notes in computer science ;
5141. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Session 1: R & D Agenda
- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project
- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
- Session 2: Communication Risk and Assurance I
- An Analysis of Cyclical Interdependencies in Critical Infrastructures
- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures
- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry
- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems
- Session 3: Communication Risk and Assurance II
- Managing Critical Infrastructures through Virtual Network Communities
- The Structure of the Sense of Security, Anshin
- Securing Agents against Malicious Host in an Intrusion Detection System
- Session 4: Code of Practice and Metrics
- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project
- Expert System CRIPS: Support of Situation Assessment and Decision Making
- Using Dependent CORAS Diagrams to Analyse Mutual Dependency
- A Methodology to Estimate Input-Output Inoperability Model Parameters
- Session 5: Information Sharing and Exchange
- Efficient Access Control for Secure XML Query Processing in Data Streams
- An Approach to Trust Management Challenges for Critical Infrastructures
- Session 6: Continuity of Services and Resiliency
- Detecting DNS Amplification Attacks
- LoRDAS: A Low-Rate DoS Attack against Application Servers
- Intra Autonomous System Overlay Dedicated to Communication Resilience
- A Proposal for the Definition of Operational Plans to Provide Dependability and Security
- Session 7: SCADA and Embedded Security
- Application of Kohonen Maps to Improve Security Tests on Automation Devices
- Ideal Based Cyber Security Technical Metrics for Control Systems
- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability
- Session 8: Threats and Attacks Modeling
- A General Model and Guidelines for Attack Manifestation Generation
- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
- Attack Modeling of SIP-Oriented SPIT
- A Malware Detector Placement Game for Intrusion Detection
- Session 9: Information Exchange and Modelling
- Modeling and Simulating Information Security Management
- Design of a Platform for Information Exchange on Protection of Critical Infrastructures
- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.