Skip to main content
  • Conference proceedings
  • © 2006

Critical Information Infrastructures Security

First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4347)

Part of the book sub series: Computer Communication Networks and Telecommunications (LNCCN)

Conference series link(s): CRITIS: International Conference on Critical Information Infrastructures Security

Conference proceedings info: CRITIS 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (22 papers)

  1. Front Matter

  2. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture

    • Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
    Pages 1-14
  3. Experiment Based Validation of CIIP

    • Per Mellstrand, Rune Gustavsson
    Pages 15-29
  4. Security Requirements Model for Grid Data Management Systems

    • Syed Naqvi, Philippe Massonet, Alvaro Arenas
    Pages 30-41
  5. Assessing the Risk of an Information Infrastructure Through Security Dependencies

    • F. Baiardi, S. Suin, C. Telmon, M. Pioli
    Pages 42-54
  6. Modelling Risk and Identifying Countermeasure in Organizations

    • Yudistira Asnar, Paolo Giorgini
    Pages 55-66
  7. A Framework for Conceptualizing Social Engineering Attacks

    • Jose J. Gonzalez, Jose M. Sarriegi, Alazne Gurrutxaga
    Pages 79-90
  8. An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)

    • Sandro Bologna, Giovanni Di Costanzo, Eric Luiijf, Roberto Setola
    Pages 91-102
  9. Intelligent Network-Based Early Warning Systems

    • Karsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak
    Pages 103-111
  10. Protection of Components Based on a Smart-Card Enhanced Security Module

    • Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell
    Pages 128-139
  11. Revisiting Colored Networks and Privacy Preserving Censorship

    • Yvo Desmedt, Yongge Wang, Mike Burmester
    Pages 140-150
  12. PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios

    • Cristina Satizábal, Rafael Páez, Jordi Forné
    Pages 151-165
  13. Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios

    • Cristina Alcaraz, Rodrigo Roman
    Pages 166-178
  14. Trust Establishment in Ad Hoc and Sensor Networks

    • Efthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis
    Pages 179-194
  15. Enforcing Trust in Pervasive Computing with Trusted Computing Technology

    • Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
    Pages 195-209
  16. Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems

    • M. Bermúdez-Edo, R. Salazar-Hernández, J. Díaz-Verdejo, P. García-Teodoro
    Pages 210-221
  17. High-Speed Intrusion Detection in Support of Critical Infrastructure Protection

    • Salvatore D’Antonio, Francesco Oliviero, Roberto Setola
    Pages 222-234
  18. Rational Choice of Security Measures Via Multi-parameter Attack Trees

    • Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson
    Pages 235-248

Other Volumes

  1. Critical Information Infrastructures Security

About this book

Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of critical information infrastructures. This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006), that was held between August 31 and September 1, 2006 on Samos, Greece, and was hosted by the University of the Aegean, Department of Information and Communication Systems Engineering, Laboratory of Information and Communication Systems Security (Info-Sec-Lab). In response to the CRITIS 2006 call for papers, 57 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and relevance to critical infrastructures. At the end of the reviewing process, only 22 papers were selected for presentation, resulting in an acceptance rate of 38%. Revisions were not checked and the authors bear full responsibility for the content of their papers.

Keywords

  • Backbone
  • Trusted Computing
  • access control
  • ad hoc networks
  • architecture
  • communication
  • continuity of services
  • critical information systems
  • critical infrastructures
  • data security
  • grid security
  • identity theft
  • networks
  • organization
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Information and Communication Technologies, University of A Coruña, Spain

    Javier Lopez

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access