Critical Information Infrastructures Security (Record no. 94957)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05688nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-69084-9 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730193957.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2006 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540690849 |
-- | 978-3-540-69084-9 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/11962977 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Lopez, Javier. |
Relator term | author. |
Relationship | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
9 (RLIN) | 155207 |
245 10 - TITLE STATEMENT | |
Title | Critical Information Infrastructures Security |
Medium | [electronic resource] : |
Remainder of title | First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 / |
Statement of responsibility, etc. | by Javier Lopez. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2006. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | X, 285 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Computer Communication Networks and Telecommunications, |
International Standard Serial Number | 2945-9184 ; |
Volume/sequential designation | 4347 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture -- Experiment Based Validation of CIIP -- Security Requirements Model for Grid Data Management Systems -- Assessing the Risk of an Information Infrastructure Through Security Dependencies -- Modelling Risk and Identifying Countermeasure in Organizations -- Modelling and Analysing Network Security Policies in a Given Vulnerability Setting -- A Framework for Conceptualizing Social Engineering Attacks -- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP) -- Intelligent Network-Based Early Warning Systems -- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field Study -- Protection of Components Based on a Smart-Card Enhanced Security Module -- Revisiting Colored Networks and Privacy Preserving Censorship -- PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios -- Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios -- Trust Establishment in Ad Hoc and Sensor Networks -- Enforcing Trust in Pervasive Computing with Trusted Computing Technology -- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems -- High-Speed Intrusion Detection in Support of Critical Infrastructure Protection -- Rational Choice of Security Measures Via Multi-parameter Attack Trees -- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) -- Vulnerabilities and Possible Attacks Against the GPRS Backbone Network -- A Framework for Secure and Verifiable Logging in Public Communication Networks. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Key sectors of modern economies depend highly on ICT. The information flowing through the resulting technological super-infrastructure as well as the information being processed by the complex computing systems that underpin it becomes crucial because its disruption, disturbance or loss can lead to high financial, material and, sometimes, human loss. As a consequence, the security and dependability of this infrastructure become critical and its protection a major objective for governments, companies and the research community. CRITIS has been born as an event that aims to bring together researchers and professionals from universities, private companies and public administrations interested or involved in all security-related heterogeneous aspects of critical information infrastructures. This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS 2006), that was held between August 31 and September 1, 2006 on Samos, Greece, and was hosted by the University of the Aegean, Department of Information and Communication Systems Engineering, Laboratory of Information and Communication Systems Security (Info-Sec-Lab). In response to the CRITIS 2006 call for papers, 57 papers were submitted. Each paper was reviewed by three members of the Program Committee, on the basis of significance, novelty, technical quality and relevance to critical infrastructures. At the end of the reviewing process, only 22 papers were selected for presentation, resulting in an acceptance rate of 38%. Revisions were not checked and the authors bear full responsibility for the content of their papers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing |
General subdivision | Management. |
9 (RLIN) | 155208 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 155209 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Algorithms. |
9 (RLIN) | 3390 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT Operations. |
9 (RLIN) | 31703 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 155210 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540690832 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540834366 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Computer Communication Networks and Telecommunications, |
International Standard Serial Number | 2945-9184 ; |
Volume/sequential designation | 4347 |
9 (RLIN) | 155211 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/11962977">https://doi.org/10.1007/11962977</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.