E-Book, Englisch, 362 Seiten, eBook
Reihe: Security and Cryptology
Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007
E-Book, Englisch, 362 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-540-89173-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Session 1: R&D Agenda.- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project.- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research.- Session 2: Communication Risk and Assurance I.- An Analysis of Cyclical Interdependencies in Critical Infrastructures.- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures.- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry.- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.- Session 3: Communication Risk and Assurance II.- Managing Critical Infrastructures through Virtual Network Communities.- The Structure of the Sense of Security, Anshin.- Securing Agents against Malicious Host in an Intrusion Detection System.- Session 4: Code of Practice and Metrics.- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project.- Expert System CRIPS: Support of Situation Assessment and Decision Making.- Using Dependent CORAS Diagrams to Analyse Mutual Dependency.- A Methodology to Estimate Input-Output Inoperability Model Parameters.- Session 5: Information Sharing and Exchange.- Efficient Access Control for Secure XML Query Processing in Data Streams.- An Approach to Trust Management Challenges for Critical Infrastructures.- Session 6: Continuity of Services and Resiliency.- Detecting DNS Amplification Attacks.- LoRDAS: A Low-Rate DoS Attack against Application Servers.- Intra Autonomous System Overlay Dedicated to Communication Resilience.- A Proposal for the Definition of Operational Plans to Provide Dependability and Security.- Session 7: SCADA and Embedded Security.- Application of Kohonen Maps to Improve Security Tests on Automation Devices.- Ideal BasedCyber Security Technical Metrics for Control Systems.- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability.- Session 8: Threats and Attacks Modeling.- A General Model and Guidelines for Attack Manifestation Generation.- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications.- Attack Modeling of SIP-Oriented SPIT.- A Malware Detector Placement Game for Intrusion Detection.- Session 9: Information Exchange and Modelling.- Modeling and Simulating Information Security Management.- Design of a Platform for Information Exchange on Protection of Critical Infrastructures.- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.