Critical Infrastructure Protection II

  • Mauricio Papa
  • Sujeet Shenoi

Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Themes And Issues

    1. Dorsey Wilkin, Richard Raines, Paul Williams, Kenneth Hopkinson
      Pages 17-28
  3. Infrastructure Security

    1. Marcelo Masera, Igor Nai Fovino, Rafal Leszczyna
      Pages 31-40
    2. Julian Rrushi, Roy Campbell
      Pages 41-54
  4. Control Systems Security

    1. Terry Fleury, Himanshu Khurana, Von Welch
      Pages 71-85
    2. Jeffrey Hunker, Robert Hutchinson, Jonathan Margulies
      Pages 87-99
    3. Nils Svendsen, Stephen Wolthusen
      Pages 101-113
    4. Ryan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi
      Pages 115-128
    5. Jeffrey Hieb, James Graham
      Pages 129-140
    6. Carlo Bellettini, Julian Rrushi
      Pages 141-156
  5. Security Strategies

    1. Zahid Anwar, Roy Campbell
      Pages 173-187
    2. Amine Baina, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaaniche
      Pages 189-201
  6. Infrastructure Interdependencies

    1. Albert Nieuwenhuijs, Eric Luiijf, Marieke Klaver
      Pages 205-213
    2. Emiliano Casalicchio, Emanuele Galli
      Pages 215-227
    3. Roberto Setola, Sandro Bologna, Emiliano Casalicchio, Vincenzo Masucci
      Pages 229-239
  7. Infrastructure Modeling And Simulation

    1. Paul Craven, Paul Oman
      Pages 243-256
    2. William Tolone, Seok-Won Lee, Wei-Ning Xiang, Joshua Blackwell, Cody Yeager, Andrew Schumpert et al.
      Pages 257-268

About these proceedings

Introduction

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:

- Themes and Issues

- Infrastructure Security

- Control Systems Security

- Security Strategies

- Infrastructure Interdependencies

- Infrastructure Modeling and Simulation

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Critical Infrastructure Protection II is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Mauricio Papa is an Associate Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Control Systems Security Cyberspace Policy Global Business Homeland Security I3P IFIP WG 11.10 Infrastructure Security Interdependence communication computer computer science information modeling

Editors and affiliations

  • Mauricio Papa
    • 1
  • Sujeet Shenoi
    • 1
  1. 1.University of TulsaTulsaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-88523-0
  • Copyright Information IFIP International Federation for Information Processing 2008
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-88522-3
  • Online ISBN 978-0-387-88523-0
  • Series Print ISSN 1868-4238
  • Series Online ISSN 1868-422X
  • About this book