메뉴 건너뛰기




Volumn , Issue , 2006, Pages 60-67

Information security Systems vs. Critical information infrastructure protection Systems - Similarities and differences

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; INFORMATION SYSTEMS; MATHEMATICAL MODELS; SECURITY SYSTEMS; STANDARDIZATION;

EID: 34848899205     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEPCOS-RELCOMEX.2006.30     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 1
    • 34848818918 scopus 로고    scopus 로고
    • European CI2RCO 6FP project
    • 2RCO 6FP project, http://www.ci2rco.org
  • 2
    • 34848894667 scopus 로고    scopus 로고
    • BS-7799-2:2002 Information security management systems, Specification with guidance for use, British Standard Institution
    • BS-7799-2:2002 Information security management systems - Specification with guidance for use, British Standard Institution.
  • 3
    • 34848913562 scopus 로고    scopus 로고
    • A. Białas, Critical information infrastructure protection - research issues and activities, In: A. Stepnowski (Editor), A. Ruciński & K. Kosmowski (Co-Editors), Proceedings of the IEEE Int. Conf. on Technologies for Homeland Security and Safety- TEHOSS'2005, Gdansk, 2005, ISBN 83-917681-9-8, pp. 369-374.
    • A. Białas, "Critical information infrastructure protection - research issues and activities", In: A. Stepnowski (Editor), A. Ruciński & K. Kosmowski (Co-Editors), Proceedings of the IEEE Int. Conf. on Technologies for Homeland Security and Safety- TEHOSS'2005, Gdansk, 2005, ISBN 83-917681-9-8, pp. 369-374.
  • 4
    • 84883260518 scopus 로고    scopus 로고
    • A. Białas, A UML approach in the ISMS implementation, IFIP 11.1 & 11.5 Working Conference, Fairfax (VA), December 2005 (will be Published by Springer).
    • A. Białas, "A UML approach in the ISMS implementation", IFIP 11.1 & 11.5 Working Conference, Fairfax (VA), December 2005 (will be Published by Springer).
  • 5
    • 33750985021 scopus 로고    scopus 로고
    • The ISMS Business Environment Elaboration Using a UML Approach
    • K. Zieliński, T. Szmuc Eds, IOS Press, Amsterdam. ISBN: 1 58603-559-2, pp
    • A. Białas, "The ISMS Business Environment Elaboration Using a UML Approach" In K. Zieliński, T. Szmuc (Eds.), Software Engineering: Evolution and Emerging Technologies, IOS Press, Amsterdam. ISBN: 1 58603-559-2, pp. 99-110.
    • Software Engineering: Evolution and Emerging Technologies , pp. 99-110
    • Białas, A.1
  • 6
    • 34848911743 scopus 로고    scopus 로고
    • A. Bialas, Using ISMS concept for critical information infrastructure protection, Proc. of the Int. Workshop on Complex Network and Infrastructure Protection - CNIP'06, Rome, March 28-29,2006 (accepted for the presentation and publication), http://ciip.casaccia.enea.it/ cnip06
    • A. Bialas, "Using ISMS concept for critical information infrastructure protection", Proc. of the Int. Workshop on "Complex Network and Infrastructure Protection - CNIP'06", Rome, March 28-29,2006 (accepted for the presentation and publication), http://ciip.casaccia.enea.it/ cnip06
  • 7
    • 34848874599 scopus 로고    scopus 로고
    • Guidelines for the management of IT Security (GMITS), Part 1-4
    • ISO/IEC TR 13335
    • ISO/IEC TR 13335, Guidelines for the management of IT Security (GMITS), Part 1-4.
  • 8
    • 34848851727 scopus 로고    scopus 로고
    • Common Criteria for IT Security Evaluation, Part 1-3
    • ISO/IEC 15408
    • ISO/IEC 15408, Common Criteria for IT Security Evaluation, Part 1-3.
  • 9
    • 0003692134 scopus 로고    scopus 로고
    • Code of practice for information security management
    • ISO/IEC 17799
    • ISO/IEC 17799, Code of practice for information security management.
  • 10
    • 0003615659 scopus 로고    scopus 로고
    • Functional safety of electrical/electronic/programmable electronic safety related systems, Part 1-7
    • IEC 61508, The Institution of Electrical Engineers
    • IEC 61508, Functional safety of electrical/electronic/programmable electronic safety related systems, Part 1-7, The Institution of Electrical Engineers.
  • 11
    • 34848862260 scopus 로고    scopus 로고
    • K. Kosmowski, Functional safety and security management in critical systems, In: A. Stepnowski (Editor), A. Ruciński & K. Kosmowski (Co-Editors), Proc. of the IEEE Int. Conf. on Technologies for Homeland Security and Safety - TEHOSS'2005, Gdansk, 2005, ISBN 83-917681-9-8, pp. 323-332.
    • K. Kosmowski, "Functional safety and security management in critical systems", In: A. Stepnowski (Editor), A. Ruciński & K. Kosmowski (Co-Editors), Proc. of the IEEE Int. Conf. on Technologies for Homeland Security and Safety - TEHOSS'2005, Gdansk, 2005, ISBN 83-917681-9-8, pp. 323-332.
  • 13
    • 34848894666 scopus 로고    scopus 로고
    • Protection of Critical Infrastructures - Baseline Protection Concept, Recommendation for Companies, Bundesministerium des Innern, 2005.
    • Protection of Critical Infrastructures - Baseline Protection Concept, Recommendation for Companies, Bundesministerium des Innern, 2005.
  • 15
    • 34848882304 scopus 로고    scopus 로고
    • An Integrated Approach to Survivability Analysis of Large Complex Critical Infrastructures
    • Frankfurt a. M, September
    • S. Bologna, T. Beer, "An Integrated Approach to Survivability Analysis of Large Complex Critical Infrastructures", Critical Infrastructure Protection (CIP) Workshop, Frankfurt a. M., September 2003, http://www.gi-ev.de/fachbereiche/sicherheit/fg/kritis/CIP-Workshop-GI-03.pdf
    • (2003) Critical Infrastructure Protection (CIP) Workshop
    • Bologna, S.1    Beer, T.2
  • 16
    • 34848854620 scopus 로고    scopus 로고
    • Modelling and Simulation for Critical Infrastructures - Status and Futures Issues
    • Frankfurt a. M, September
    • S. Vernado, "Modelling and Simulation for Critical Infrastructures - Status and Futures Issues", Critical Infrastructure Protection (CIP) Workshop, Frankfurt a. M., September 2003, http://www.gi-ev.de/fachbereiche/ sicherheit/fg/kritis/CIP-Workshop-GI-03.pdf
    • (2003) Critical Infrastructure Protection (CIP) Workshop
    • Vernado, S.1
  • 17
    • 34848928542 scopus 로고    scopus 로고
    • A cybernetic approach for critical infrastructure protection
    • Apr/May
    • W. Schmitz, "A cybernetic approach for critical infrastructure protection", ECN - European CIIP Newsletter, Apr/May 2005, vol. 1, Number 1, pp. 19-21, http://www.ci2rco.org
    • (2005) ECN - European CIIP Newsletter , vol.1 , Issue.1 , pp. 19-21
    • Schmitz, W.1
  • 18
    • 34848914926 scopus 로고    scopus 로고
    • EESA
    • EESA, http://www.itcon-ltd.com
  • 19
    • 34848908109 scopus 로고    scopus 로고
    • UML site, http://www.omg.org/uml
    • UML site


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.