Skip to main content

Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2008)

Abstract

This paper describes a security platform as a complex system of holonic communities, that are hierarchically organized, but self-reconfigurable when some of them are detached or cannot otherwise operate. Furthermore, every possible subset of holons may work autonomously, while maintaining self-conscience of its own mission, action lines and goals. Each holonic unit, either elementary or composite, retains some capabilities for sensing (perception), transmissive apparatus (communication), computational processes (elaboration), authentication/authorization (information security), support for data exchange (visualization & interaction), actuators (mission), ambient representation (geometric reasoning), knowledge representation (logic reasoning), situation representation and forecasting (simulation), intelligent feedback (command & control). The higher the organizational level of the holonic unit, the more complex and sophisticated each of its characteristic features.

Development funded by a research grant from the Italian Ministry of University and Research (MUR) to TRS, which stands for “Technology and Research for Security”, a spinoff company from University Roma Tre and Theorematica.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gell-Mann, M.: What is complexity? Complexity 1(1), 16–19 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  2. Complex Systems Society (CSS), http://css.csregistry.org

  3. Dooley, K.: A complex adaptive systems model of organization change. Nonlinear Dynamics, Psychology, & Life Science 1(1), 69–97 (1997)

    Article  MATH  Google Scholar 

  4. Waldrop, M.M.: Complexity: The Emerging Science at the Edge of Order and Chaos. Simon & Schuster, New York (1993)

    Google Scholar 

  5. Hilaire, V., Koukam, A., Rodriguez, S.: An adaptive agent architecture for holonic multi-agent systems. ACM Trans. Auton. Adapt. Syst. 3(1), 1–24 (2008)

    Article  Google Scholar 

  6. Koestler, A.: The ghost in the machine. Arkana, London (1967)

    Google Scholar 

  7. Keil, D., Goldin, D.: Indirect interaction in environments for multiagent systems. In: Weyns, D., Parunak, V., Michel, F. (eds.) E4MAS 2005. LNCS, vol. 3830, pp. 68–87. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Weyns, D., Van Dyke Parunak, H., Michel, F. (eds.): E4MAS 2006. LNCS, vol. 3830. Springer, Heidelberg (2006)

    Google Scholar 

  9. Koschan, A., Pollefeys, M., Abidi, M.: 3D Imaging for Safety and Security. Computational Imaging and Vision, vol. 35. Springer, New York (2007)

    Book  Google Scholar 

  10. Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edn. Wiley, Chichester (2003)

    Book  Google Scholar 

  11. Rueda, L., Mery, D., Kittler, J. (eds.): CIARP 2007. LNCS, vol. 4756. Springer, Heidelberg (2007)

    Google Scholar 

  12. Howarth, R.J.: Spatial models for wide-area visual surveillance: Computational approaches and spatial building-blocks. Artif. Intell. Rev. 23(2), 97–155 (2005)

    Article  Google Scholar 

  13. Paoluzzi, A.: Geometric Programming for Computer Aided Design. John Wiley & Sons, Chicester (2003)

    Book  Google Scholar 

  14. Backus, J., Williams, J.H., Wimmers, E.L.: An introduction to the programming language FL. In: Research topics in functional programming, pp. 219–247. Addison-Wesley Longman Publ., Boston (1990)

    Google Scholar 

  15. Aiken, A., Williams, J.H., Wimmers, E.L.: The FL project: The design of a functional language (1991) (unpublished report )

    Google Scholar 

  16. Sebe, I.O., Hu, J., You, S., Neumann, U.: 3d video surveillance with augmented virtual environments. In: IWVS 2003: First ACM SIGMM international workshop on Video surveillance, pp. 107–112. ACM Press, New York (2003)

    Chapter  Google Scholar 

  17. Girgensohn, A., Kimber, D., Vaughan, J., Yang, T., Shipman, F., Turner, T., Rieffel, E., Wilcox, L., Chen, F., Dunnigan, T.: DOTS: support for effective video surveillance. In: MULTIMEDIA 2007: Proceedings of the 15th international conference on Multimedia, pp. 423–432. ACM, New York (2007)

    Google Scholar 

  18. Paoluzzi, A., Scorzelli, G.: Pattern-driven mapping from architectural plans to solid models of buildings. In: Israel-Italy Bi-National Conf. on Shape Modeling and Reasoning for Industrial and Biomedical Appl., Haifa, Israel, Technion (2007)

    Google Scholar 

  19. Bajaj, C., Paoluzzi, A., Scorzelli, G.: Progressive conversion from B-rep to BSP for streaming geometric modeling. Computer-Aided Design and Applications 3(5(6)) (2006)

    Google Scholar 

  20. Scorzelli, G., Paoluzzi, A., Pascucci, V.: Parallel solid modeling using BSP dataflow. Journal of Computational Geometry and Applications 18(5), 441–467 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Assogna, P. et al. (2009). Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03552-4_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03551-7

  • Online ISBN: 978-3-642-03552-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics