Critical Information Infrastructures Security: Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"


This book constitutes the thoroughly refereed post-conference
proceedings of the Second International Workshop on Critical Information
Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain,
in October 2007 in conjunction with ITCIP 2007, the first conference on
Information Technology for Critical Infrastructure Protection.

The 29 revised full papers presented were carefully reviewed and
selected from a total of 75 submissions. The papers address all
security-related heterogeneous aspects of critical information
infrastructures and are orgaized in topical sections on R&D agenda,
communication risk and assurance, code of practice and metrics,
information sharing and exchange, continuity of services and resiliency,
SCADA and embedded security, threats and attacks modeling, as well as
information exchange and modeling.

Author(s): Uwe Bendisch, Sandro Bologna, Gwendal Le Grand, Eric Luiijf (auth.), Javier Lopez, Bernhard M. Hämmerli (eds.)
Series: Lecture Notes in Computer Science 5141
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 362
Tags: Computer Communication Networks; Systems and Data Security; Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Computers and Society

Front Matter....Pages -
Towards a European Research Agenda for CIIP: Results from the CI 2 RCO Project....Pages 1-12
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research....Pages 13-24
An Analysis of Cyclical Interdependencies in Critical Infrastructures....Pages 25-36
A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures....Pages 37-48
Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry....Pages 49-57
Advanced Reaction Using Risk Assessment in Intrusion Detection Systems....Pages 58-70
Managing Critical Infrastructures through Virtual Network Communities....Pages 71-82
The Structure of the Sense of Security, Anshin....Pages 83-93
Securing Agents against Malicious Host in an Intrusion Detection System....Pages 94-105
UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project....Pages 106-123
Expert System CRIPS: Support of Situation Assessment and Decision Making....Pages 124-134
Using Dependent CORAS Diagrams to Analyse Mutual Dependency....Pages 135-148
A Methodology to Estimate Input-Output Inoperability Model Parameters....Pages 149-160
Efficient Access Control for Secure XML Query Processing in Data Streams....Pages 161-172
An Approach to Trust Management Challenges for Critical Infrastructures....Pages 173-184
Detecting DNS Amplification Attacks....Pages 185-196
LoRDAS: A Low-Rate DoS Attack against Application Servers....Pages 197-209
Intra Autonomous System Overlay Dedicated to Communication Resilience....Pages 210-222
A Proposal for the Definition of Operational Plans to Provide Dependability and Security....Pages 223-234
Application of Kohonen Maps to Improve Security Tests on Automation Devices....Pages 235-245
Ideal Based Cyber Security Technical Metrics for Control Systems....Pages 246-260
Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability....Pages 261-273
A General Model and Guidelines for Attack Manifestation Generation....Pages 274-286
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications....Pages 287-298
Attack Modeling of SIP-Oriented SPIT....Pages 299-310
A Malware Detector Placement Game for Intrusion Detection....Pages 311-326
Modeling and Simulating Information Security Management....Pages 327-336
Design of a Platform for Information Exchange on Protection of Critical Infrastructures....Pages 337-348
Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors....Pages 349-360
Back Matter....Pages -