Introduction to DESEC4LCCI 2012

  • Christian Esposito
  • Marco Platania
  • Francesco Brancati
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7613)


This DESEC4LCCI ’12 workshop aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products in the area of dependable and secure computing in large-scale critical systems both from a theoretical and practical perspective. Large-scale Complex Critical Infrastructures (LCCIs), such as water and power supply plants, or transport infrastructures (e.g., airports and seaports), play a key role into several fundamental human activities. It is easy to think about their economic and social impact: the consequences of an outage can be catastrophic in terms of efficiency, economical losses, consumer dissatisfaction, and even indirect harm to people and deaths. Currently, LCCIs make extensive usage of Information and Communications Technology (ICT) (e.g., computing systems, communication networks, and sensing hardware), and especially software systems for LCCI interconnection, control, and management, in charge of providing support for advanced monitoring and control facilities. These systems have to be highly resilient in order to reduce the risk of LCCI catastrophic failures. Nevertheless, the resiliency of future LCCI is compromised by several factors, which can be intentional and unintentional. First, these systems are more and more conceived as the composition of several Off-The-Shelf (OTS) items and/or legacy subsystems, increasing the probability of failure occurrences, due to unexpected or erroneous modes of operation. Second, they have been designed without considering that their size would have significantly grown, crossing national boundaries, and that their operational environment, originally planned to be “closed”, would become “open” to the world to allow interoperability among LCCIs and remote access and control. This implies that the both accidental events and malicious attacks should be taken into account.


Health Information System Critical Infrastructure Electric Power System Malicious Attack Secure Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Christian Esposito
    • 1
  • Marco Platania
    • 2
  • Francesco Brancati
    • 3
  1. 1.ICAR - CNRNapoliItaly
  2. 2.Dipartimento di Ingegneria Informatica Automatica e Gestionale “A. Ruberti”University of Roma La SapienzaRomaItaly
  3. 3.ResiltechPontederaItaly

Personalised recommendations