Advertisement

A Framework for the Manifestation of Tacit Critical Infrastructure Knowledge

  • Ebrahim Bagheri
  • Ali A. Ghorbani

Abstract

Critical infrastructure systems are tightly-coupled socio-technical systems with complicated behavior. They have emerged as an important focal point of research due to both their vital role in the normal conduct of societal activities as well as their inherent appealing complications for researchers. In this chapter, we will report on our experience in developing techniques, tools and algorithms for revealing and interpreting the hidden intricacies of such systems. The chapter will include the description of several of our technologies that allow for the guided understanding of the current status quo of infrastructure systems through the Astrolabe methodology, the formal profiling of infrastructure systems using the UML-CI meta-modeling mechanism, and also observing the emergent behavior of these complex systems through the application of the agent-based AIMS simulation suite.

Keywords

Multiagent System Object Constraint Language Critical Infrastructure Infrastructure System System Goal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bagheri, E., Ghorbani, A.A.: The state of the art in critical infrastructure protection: a framework for convergence. International Journal of Critical Infrastructures 4(3), 215–244 (2008)CrossRefGoogle Scholar
  2. 2.
    Bagheri, E., Ghorbani, A.A.: UML-CI: A reference model for profiling critical infrastructure systems. Information Systems Frontiers, July 10 (2008) (in press)Google Scholar
  3. 3.
    Turner, J.V., Hunsucker, J.L.: Effective risk management: a goal based approach. International Journal of Technology Management 17(4), 438–458 (1999)CrossRefGoogle Scholar
  4. 4.
    Bagheri, E., Baghi, H., Ghorbani, A.A., Yari, A.: An agent-based service-oriented simulation suite for critical infrastructure behaviour analysis. International Journal of Business Process Integration and Management 2(4), 312–326 (2007)CrossRefGoogle Scholar
  5. 5.
    Basu, N., Pryor, R., Quint, T.: ASPEN: A Microsimulation Model of the Economy. Computational Economics 12(3) (1998)Google Scholar
  6. 6.
    Leontief, W.: Input-output economics. Oxford University Press, New York (1966)Google Scholar
  7. 7.
    Parsons, T.: The System of Modern Societies. Prentice-Hall, Englewood Cliffs (1971)Google Scholar
  8. 8.
    Curry, J.A.: Sociology for the Twenty-First Century, 3rd edn. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  9. 9.
    Scott, W.R.: Organizations: Rational, Natural, and Open Systems. Prentice-Hall, Englewood Cliffs (1992)Google Scholar
  10. 10.
    Scott, W.R.: Technology and structure: An organization-level perspective. In: Goodman, P.S., Sproull, L.S. (eds.) Technology and Organizations. Josey-Bass, San Francisco (1990)Google Scholar
  11. 11.
    Gross, E.: The definition of organizational goals. British Journal of Sociology 20(3), 277–294 (1969)CrossRefGoogle Scholar
  12. 12.
    Cohen, M., March, J., Olsen, J.: A garbage can theory of organizational choice. Administrative science quarterly (1972)Google Scholar
  13. 13.
    Simon, H.A.: Rational decision making in business organizations. American Economic Review 69(4), 493–513 (1979), http://ideas.repec.org/a/aea/aecrev/v69y1979i4p493-513.html Google Scholar
  14. 14.
    Rao, Georgeff, M.P.: BDI-agents: From Theory to Practice. In: Proceedings of the First International Conference on Multiagent Systems, ICMAS 1995 (1995)Google Scholar
  15. 15.
    Bagheri, E., Ghorbani, A.A.: Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. IEEE Transactions on Systems, Man, and Cybernetics, Part A 39(1), 66–85 (2009)CrossRefGoogle Scholar
  16. 16.
    Setola, R., Bologna, S., Casalicchio, E., Masucci, V.: An Integrated Approach For Simulating Interdependencies, Critical Infrastructure Protection II, pp. 229–239. Springer, Heidelberg (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Ebrahim Bagheri
    • 1
  • Ali A. Ghorbani
    • 2
  1. 1.Institute for Information TechnologyNational Research CouncilCanada
  2. 2.Faculty of Computer ScienceUniversity of New BrunswickCanada

Personalised recommendations