信息基础结构安全评定/Critical information infrastructures security
![信息基础结构安全评定/Critical information infrastructures security](http://image.wangchao.net.cn/small/product/1236125895399.jpg)
分類: 图书,计算机/网络,信息安全,
作者: Javier Lopez 著
出 版 社: 广东教育出版社
出版时间: 2006-12-1字数:版次: 1页数: 284印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540690832包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work,research projects,technical reports,etc.).
内容简介
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference.
The 22 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures. Thus dependence on this infrastructure and importance of its security is shown, emerging as a major objective for governments, companies and the research community.
目录
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
Experiment Based Validation of CIIP
Security Requirements Model for Grid Data Management Systems
Assessing the Risk of an Information Infrastructure Through Security Dependencies
Modelling Risk and Identifying Countermeasure in Organizations
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
A Framework for Conceptualizing Social Engineering Attacks
An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)
Intelligent Network-Based Early Warning Systems
Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study
Protection of Components Based on a Smart-Card Enhanced Security Module
Revisiting Colored Networks and Privacy Preserving Censorship
PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
Trust Establishment in Ad Hoc and Sensor Networks
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection
Rational Choice of Security Measures Via Multi-parameter Attack Trees
Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
A Framework for Secure and Verifiable Logging in Public Communication Networks
Author Index