Critical Information Infrastructures Security
Springer Berlin (Verlag)
978-3-540-69083-2 (ISBN)
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.- Experiment Based Validation of CIIP.- Security Requirements Model for Grid Data Management Systems.- Assessing the Risk of an Information Infrastructure Through Security Dependencies.- Modelling Risk and Identifying Countermeasure in Organizations.- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting.- A Framework for Conceptualizing Social Engineering Attacks.- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP).- Intelligent Network-Based Early Warning Systems.- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study.- Protection of Components Based on a Smart-Card Enhanced Security Module.- Revisiting Colored Networks and Privacy Preserving Censorship.- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.- Trust Establishment in Ad Hoc and Sensor Networks.- Enforcing Trust in Pervasive Computing with Trusted Computing Technology.- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.- Rational Choice of Security Measures Via Multi-parameter Attack Trees.- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP).- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network.- A Framework for Secure and Verifiable Logging in Public Communication Networks.
Erscheint lt. Verlag | 14.12.2006 |
---|---|
Reihe/Serie | Computer Communication Networks and Telecommunications | Lecture Notes in Computer Science |
Zusatzinfo | X, 285 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 426 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • ad hoc networks • Algorithm analysis and problem complexity • Architecture • Backbone • Communication • continuity of services • critical information systems • critical infrastructures • Data Security • grid security • Identity Theft • information assurance • Information Security • Intrusion Detection • Key Management • Mobile Security • Networks • Network Security • organization • peer-to-peer trust model • privacy • Public Key Infrastructure • requirement analysis • risk analysis • Secure Communications • security • security management • sensor networks • Systems Security • threats analysis • trusted computing • trust management • unconditional security • vulnerability |
ISBN-10 | 3-540-69083-2 / 3540690832 |
ISBN-13 | 978-3-540-69083-2 / 9783540690832 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich