Advertisement

Critical Information Infrastructures Security

Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers

  • Javier Lopez
  • Bernhard M. Hämmerli
Conference proceedings CRITIS 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5141)

Table of contents

  1. Front Matter
  2. Session 1: R&D Agenda

    1. Uwe Bendisch, Sandro Bologna, Gwendal Le Grand, Eric Luiijf
      Pages 1-12
    2. Alberto Stefanini, Gerard Doorman, Nouredine Hadjsaid
      Pages 13-24
  3. Session 2: Communication Risk and Assurance I

    1. Nils Kalstad Svendsen, Stephen D. Wolthusen
      Pages 25-36
    2. Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel
      Pages 58-70
  4. Session 3: Communication Risk and Assurance II

    1. Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
      Pages 71-82
    2. Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, Carl Hauser
      Pages 83-93
    3. Rafael Páez, Joan Tomàs-Buliart, Jordi Forné, Miguel Soriano
      Pages 94-105
  5. Session 4: Code of Practice and Metrics

    1. Davide Cerotti, Daniele Codetta-Raiteri, Susanna Donatelli, Claudio Brasca, Giovanna Dondossola, Fabrizio Garrone
      Pages 106-123
    2. Hermann Dellwing, Walter Schmitz
      Pages 124-134
    3. Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ketil Stølen
      Pages 135-148
    4. Roberto Setola, Stefano De Porcellinis
      Pages 149-160
  6. Session 5: Information Sharing and Exchange

    1. Ioanna Dionysiou, Deborah Frincke, David Bakken, Carl Hauser
      Pages 173-184
  7. Session 6: Continuity of Services and Resiliency

    1. Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis
      Pages 185-196
    2. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro, Francisco de Toro-Negro
      Pages 197-209
    3. Simon Delamare, Gwendal Le Grand
      Pages 210-222
    4. Daniel J. Martínez-Manzano, Manuel Gil-Pérez, Gabriel López-Millán, Antonio F. Gómez-Skarmeta
      Pages 223-234
  8. Session 7: SCADA and Embedded Security

  9. Session 8: Threats and Attacks Modeling

    1. Ulf E. Larson, Dennis K. Nilsson, Erland Jonsson
      Pages 274-286
    2. John Mallios, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis
      Pages 299-310
    3. Stephan Schmidt, Tansu Alpcan, Şahin Albayrak, Tamer Başar, Achim Mueller
      Pages 311-326
  10. Session 9: Information Exchange and Modelling

    1. Jose M. Sarriegi, Javier Santos, Jose M. Torres, David Imizcoz, Elyoenai Egozcue, Daniel Liberal
      Pages 327-336
    2. Felix Flentge, Césaire Beyel, Erich Rome
      Pages 349-360
  11. Back Matter

About these proceedings

Introduction


This book constitutes the thoroughly refereed post-conference
proceedings of the Second International Workshop on Critical Information
Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain,
in October 2007 in conjunction with ITCIP 2007, the first conference on
Information Technology for Critical Infrastructure Protection.

The 29 revised full papers presented were carefully reviewed and
selected from a total of 75 submissions. The papers address all
security-related heterogeneous aspects of critical information
infrastructures and are orgaized in topical sections on R&D agenda,
communication risk and assurance, code of practice and metrics,
information sharing and exchange, continuity of services and resiliency,
SCADA and embedded security, threats and attacks modeling, as well as
information exchange and modeling.

Keywords

access control ad hoc networks attack modeling critical information systems critical infrastrucures data security denial of service dependability emergency management fingerprinting grid security identity theft impact analysis information technology security

Editors and affiliations

  • Javier Lopez
    • 1
  • Bernhard M. Hämmerli
    • 2
  1. 1.Department of Computer ScienceUniversity of MalagaMálagaSpain
  2. 2.Hochschule Technik und Architektur Luzern (HTA)LuzernSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-89173-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89095-9
  • Online ISBN 978-3-540-89173-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site