Critical Information Infrastructures Security: First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of critical information infrastructures. This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006), that was held between August 31 and September 1, 2006 on Samos, Greece, and was hosted by the University of the Aegean, Department of Information and Communication Systems Engineering, Laboratory of Information and Communication Systems Security (Info-Sec-Lab). In response to the CRITIS 2006 call for papers, 57 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and relevance to critical infrastructures. At the end of the reviewing process, only 22 papers were selected for presentation, resulting in an acceptance rate of 38%. Revisions were not checked and the authors bear full responsibility for the content of their papers.

Author(s): Paulo VerĂ­ssimo, Nuno Ferreira Neves (auth.), Javier Lopez (eds.)
Series: Lecture Notes in Computer Science 4347 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 285
Tags: Computer Communication Networks; Systems and Data Security; Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Computers and Society

Front Matter....Pages -
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture....Pages 1-14
Experiment Based Validation of CIIP....Pages 15-29
Security Requirements Model for Grid Data Management Systems....Pages 30-41
Assessing the Risk of an Information Infrastructure Through Security Dependencies....Pages 42-54
Modelling Risk and Identifying Countermeasure in Organizations....Pages 55-66
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting....Pages 67-78
A Framework for Conceptualizing Social Engineering Attacks....Pages 79-90
An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)....Pages 91-102
Intelligent Network-Based Early Warning Systems....Pages 103-111
Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study....Pages 112-127
Protection of Components Based on a Smart-Card Enhanced Security Module....Pages 128-139
Revisiting Colored Networks and Privacy Preserving Censorship....Pages 140-150
PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios....Pages 151-165
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios....Pages 166-178
Trust Establishment in Ad Hoc and Sensor Networks....Pages 179-194
Enforcing Trust in Pervasive Computing with Trusted Computing Technology....Pages 195-209
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems....Pages 210-221
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection....Pages 222-234
Rational Choice of Security Measures Via Multi-parameter Attack Trees....Pages 235-248
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)....Pages 249-261
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network....Pages 262-272
A Framework for Secure and Verifiable Logging in Public Communication Networks....Pages 273-284
Back Matter....Pages -