LEADER 06424nam 22009135 450 001 9910483114703321 005 20251226203941.0 010 $a1-283-43791-0 010 $a9786613437914 010 $a3-540-89173-0 024 7 $a10.1007/978-3-540-89173-4 035 $a(CKB)2550000000011534 035 $a(SSID)ssj0000399461 035 $a(PQKBManifestationID)11955140 035 $a(PQKBTitleCode)TC0000399461 035 $a(PQKBWorkID)10376364 035 $a(PQKB)10205972 035 $a(DE-He213)978-3-540-89173-4 035 $a(MiAaPQ)EBC3065275 035 $a(MiAaPQ)EBC6511685 035 $a(Au-PeEL)EBL6511685 035 $a(OCoLC)1204040486 035 $a(PPN)149040520 035 $a(EXLCZ)992550000000011534 100 $a20100509d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCritical Information Infrastructures Security $eSecond International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007 /$fedited by Bernhard Hämmerli 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XI, 362 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5141 300 $aIncludes index. 311 08$a3-540-89095-5 320 $aIncludes bibliographical references and index. 327 $aSession 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal BasedCyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are orgaized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5141 606 $aComputer networks 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aComputers and civilization 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aUser Interfaces and Human Computer Interaction 606 $aComputers and Society 606 $aData and Information Security 606 $aCryptology 606 $aAlgorithms 615 0$aComputer networks. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aComputers and civilization. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 14$aComputer Communication Networks. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputers and Society. 615 24$aData and Information Security. 615 24$aCryptology. 615 24$aAlgorithms. 676 $a005.8 702 $aLo?pez$b Javier$g(Javier Lo?pez-Mun?oz), 702 $aHa?mmerli$b Bernhard M. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483114703321 996 $aCritical Information Infrastructures Security$92584647 997 $aUNINA