Skip to main content

Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2009)

Abstract

This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lindemann, U., Maurer, M., Braun, T.: Structural Complexity Management. An Approach for the Field of Product Design. Springer, Berlin (2009)

    Google Scholar 

  2. http://www.erudine.com

  3. Fleischmann, A.: Distributed Systems – Software Design and Implementation, pp. 201–213. Springer, Berlin (1994)

    MATH  Google Scholar 

  4. http://www.jcom1.com

  5. http://www.oasis-open.org

  6. Geiger, G.: On the statistical foundations of non-linear utility theory. European Journal of Operational Research 136, 449–465 (2002)

    Article  MATH  Google Scholar 

  7. Geiger, G.: Risk acceptance from non-linear utility theory. Journal of Risk Research 8, 225–252 (2005)

    Article  Google Scholar 

  8. Geiger, G.: An axiomatic account of status quo-dependent non-expected utility: pragmatic constraints on rational choice under risk. Mathematical Social Sciences 55, 116–142 (2008)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Breiing, M. et al. (2010). Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security. In: Rome, E., Bloomfield, R. (eds) Critical Information Infrastructures Security. CRITIS 2009. Lecture Notes in Computer Science, vol 6027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14379-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14379-3_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14378-6

  • Online ISBN: 978-3-642-14379-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics