LEADER 05961nam 22008175 450 001 9910483768203321 005 20251226200620.0 010 $a3-540-69084-0 024 7 $a10.1007/11962977 035 $a(CKB)1000000000283791 035 $a(SSID)ssj0000317063 035 $a(PQKBManifestationID)11251774 035 $a(PQKBTitleCode)TC0000317063 035 $a(PQKBWorkID)10287508 035 $a(PQKB)11330388 035 $a(DE-He213)978-3-540-69084-9 035 $a(MiAaPQ)EBC3068645 035 $a(PPN)123140196 035 $a(EXLCZ)991000000000283791 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCritical Information Infrastructures Security $eFirst International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /$fby Javier Lopez 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 285 p.) 225 1 $aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4347 300 $aInternational conference proceedings. 311 08$a3-540-69083-2 320 $aIncludes bibiliographical references and index. 327 $aCRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture -- Experiment Based Validation of CIIP -- Security Requirements Model for Grid Data Management Systems -- Assessing the Risk of an Information Infrastructure Through Security Dependencies -- Modelling Risk and Identifying Countermeasure in Organizations -- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting -- A Framework for Conceptualizing Social Engineering Attacks -- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP) -- Intelligent Network-Based Early Warning Systems -- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study -- Protection of Components Based on a Smart-Card Enhanced Security Module -- Revisiting Colored Networks and Privacy Preserving Censorship -- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios -- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios -- Trust Establishment in Ad Hoc and Sensor Networks -- Enforcing Trust in Pervasive Computing with Trusted Computing Technology -- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems -- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection -- Rational Choice of Security Measures Via Multi-parameter Attack Trees -- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) -- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network -- A Framework for Secure and Verifiable Logging in Public Communication Networks. 330 $aKey sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of critical information infrastructures. This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006), that was held between August 31 and September 1, 2006 on Samos, Greece, and was hosted by the University of the Aegean, Department of Information and Communication Systems Engineering, Laboratory of Information and Communication Systems Security (Info-Sec-Lab). In response to the CRITIS 2006 call for papers, 57 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and relevance to critical infrastructures. At the end of the reviewing process, only 22 papers were selected for presentation, resulting in an acceptance rate of 38%. Revisions were not checked and the authors bear full responsibility for the content of their papers. 410 0$aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4347 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aAlgorithms 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aAlgorithms 606 $aIT Operations 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aData protection. 615 0$aAlgorithms. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 701 $aLopez$b Javier$01096793 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483768203321 996 $aCritical Information Infrastructures Security$92816739 997 $aUNINA