Critical Information Infrastructures Security
Springer Berlin (Verlag)
9783540690832 (ISBN)
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.- Experiment Based Validation of CIIP.- Security Requirements Model for Grid Data Management Systems.- Assessing the Risk of an Information Infrastructure Through Security Dependencies.- Modelling Risk and Identifying Countermeasure in Organizations.- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting.- A Framework for Conceptualizing Social Engineering Attacks.- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP).- Intelligent Network-Based Early Warning Systems.- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study.- Protection of Components Based on a Smart-Card Enhanced Security Module.- Revisiting Colored Networks and Privacy Preserving Censorship.- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios.- Trust Establishment in Ad Hoc and Sensor Networks.- Enforcing Trust in Pervasive Computing with Trusted Computing Technology.- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems.- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection.- Rational Choice of Security Measures Via Multi-parameter Attack Trees.- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP).- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network.- A Framework for Secure and Verifiable Logging in Public Communication Networks.
| Erscheint lt. Verlag | 14.12.2006 |
|---|---|
| Reihe/Serie | Computer Communication Networks and Telecommunications | Lecture Notes in Computer Science |
| Zusatzinfo | X, 285 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 426 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Access Control • ad hoc networks • Algorithm analysis and problem complexity • Architecture • Backbone • Communication • continuity of services • critical information systems • critical infrastructures • Data Security • grid security • Identity Theft • information assurance • Information Security • Intrusion Detection • Key Management • Mobile Security • Networks • Network Security • organization • peer-to-peer trust model • privacy • Public Key Infrastructure • requirement analysis • risk analysis • Secure Communications • security • security management • sensor networks • Systems Security • threats analysis • trusted computing • trust management • unconditional security • vulnerability |
| ISBN-13 | 9783540690832 / 9783540690832 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich