LEADER 01172nam--2200397---450- 001 990000725850203316 005 20060120085911.0 010 $a2-9505767-3-7 035 $a0072585 035 $aUSA010072585 035 $a(ALEPH)000072585USA01 035 $a0072585 100 $a20011109d1998----km-y0itay0103----ba 101 0 $afre$aeng 102 $aFR 105 $a||||||||001yy 200 1 $aArt et football, football and art$e1860-1960$eimpressionisme, cubisme, pop-art$fPierre Chazaud 210 $aTouland$cMandala$dcopyr. 1998 215 $a159 p.$d24 cm 300 $aTesto in francese e inglese 410 0$12001 606 $aSport nell'arte 606 $aCalcio 676 $a704.94 700 1$aCHAZAUD,$bPierre$0328279 801 0$aIT$bsalbc$gISBD 912 $a990000725850203316 951 $aXII.2.C. 645(VII E 631)$b160430 L.M.$cVII E$d00078474 959 $aBK 969 $auma 979 $aCHIARA$b40$c20011109$lUSA01$h0957 979 $c20020403$lUSA01$h1721 979 $aPATRY$b90$c20040406$lUSA01$h1650 979 $aCOPAT6$b90$c20060120$lUSA01$h0859 996 $aArt et football, football and art$9962501 997 $aUNISA LEADER 06602nam 22007935 450 001 996466242203316 005 20220413183722.0 010 $a3-540-69084-0 024 7 $a10.1007/11962977 035 $a(CKB)1000000000283791 035 $a(SSID)ssj0000317063 035 $a(PQKBManifestationID)11251774 035 $a(PQKBTitleCode)TC0000317063 035 $a(PQKBWorkID)10287508 035 $a(PQKB)11330388 035 $a(DE-He213)978-3-540-69084-9 035 $a(MiAaPQ)EBC3068645 035 $a(PPN)123140196 035 $a(EXLCZ)991000000000283791 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCritical Information Infrastructures Security$b[electronic resource] $eFirst International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 /$fby Javier Lopez 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 285 p.) 225 1 $aComputer Communication Networks and Telecommunications ;$v4347 300 $aInternational conference proceedings. 311 $a3-540-69083-2 320 $aIncludes bibiliographical references and index. 327 $aCRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture -- Experiment Based Validation of CIIP -- Security Requirements Model for Grid Data Management Systems -- Assessing the Risk of an Information Infrastructure Through Security Dependencies -- Modelling Risk and Identifying Countermeasure in Organizations -- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting -- A Framework for Conceptualizing Social Engineering Attacks -- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP) -- Intelligent Network-Based Early Warning Systems -- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study -- Protection of Components Based on a Smart-Card Enhanced Security Module -- Revisiting Colored Networks and Privacy Preserving Censorship -- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios -- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios -- Trust Establishment in Ad Hoc and Sensor Networks -- Enforcing Trust in Pervasive Computing with Trusted Computing Technology -- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems -- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection -- Rational Choice of Security Measures Via Multi-parameter Attack Trees -- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) -- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network -- A Framework for Secure and Verifiable Logging in Public Communication Networks. 330 $aKey sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of critical information infrastructures. This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006), that was held between August 31 and September 1, 2006 on Samos, Greece, and was hosted by the University of the Aegean, Department of Information and Communication Systems Engineering, Laboratory of Information and Communication Systems Security (Info-Sec-Lab). In response to the CRITIS 2006 call for papers, 57 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and relevance to critical infrastructures. At the end of the reviewing process, only 22 papers were selected for presentation, resulting in an acceptance rate of 38%. Revisions were not checked and the authors bear full responsibility for the content of their papers. 410 0$aComputer Communication Networks and Telecommunications ;$v4347 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a005.8 700 $aLo?pez$b Javier$g(Javier Lo?pez-Mun?oz)$4aut$4http://id.loc.gov/vocabulary/relators/aut 701 $aLo?pez$b Javier$01096793 906 $aBOOK 912 $a996466242203316 996 $aCritical Information Infrastructures Security$92816739 997 $aUNISA