메뉴 건너뛰기




Volumn 6, Issue 6, 2008, Pages 44-51

The crutial way of critical infrastructure protection

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; COMMUNICATION SERVICES; CRITICAL EQUIPMENTS; CRITICAL INFRASTRUCTURE PROTECTIONS; CRITICAL INFRASTRUCTURES; DISTRIBUTED FIREWALLS; NETWORKED COMPUTERS; OPERATIONAL STATE; PHYSICAL PROCESS; SECURITY POLICIES; SELF-HEALING;

EID: 58849119555     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.158     Document Type: Article
Times cited : (71)

References (13)
  • 1
    • 84868880295 scopus 로고    scopus 로고
    • CIA Confirms Cyber Attack Caused Multi-City Power Outage
    • SANS Institute
    • SANS Institute, "CIA Confirms Cyber Attack Caused Multi-City Power Outage," SANS NewsBites, vol. 10, no. 5, 2008; www.sans.org/ newsletters/newsbites/news bites.php?vol=108&issue=5.
    • (2008) SANS NewsBites , vol.10 , Issue.5
  • 2
    • 51849150631 scopus 로고    scopus 로고
    • The Crutial Reference Critical Information Infrastructure Architecture: A Blueprint
    • P. Veríssimo, N.F. Neves, and M. Correia, "The Crutial Reference Critical Information Infrastructure Architecture: A Blueprint," Int'l J. System of Systems Eng., vol. 1, nos. 1/2, 2008, pp. 78-95.
    • (2008) Int'l J. System of Systems Eng , vol.1 , Issue.1-2 , pp. 78-95
    • Veríssimo, P.1    Neves, N.F.2    Correia, M.3
  • 3
    • 58849113988 scopus 로고    scopus 로고
    • S.M. Bellovin, Distributed Firewalls, ;login:, Nov. 1999; www.usenix.org/publications/login/1999-11/ features/firewalls, html.
    • S.M. Bellovin, "Distributed Firewalls," ;login:, Nov. 1999; www.usenix.org/publications/login/1999-11/ features/firewalls, html.
  • 4
    • 46849103389 scopus 로고    scopus 로고
    • Access Control for Collaborative Systems: A Web Services Based Approach
    • A. Abou El Kalam et al., "Access Control for Collaborative Systems: A Web Services Based Approach," Proc. IEEE Int'l Conf. Web Services, 2007, pp. 1064-1071.
    • (2007) Proc. IEEE Int'l Conf. Web Services , pp. 1064-1071
    • Abou El Kalam, A.1
  • 5
    • 33747276448 scopus 로고    scopus 로고
    • Intrusion-Tolerant Middleware: The Road to Automatic Security
    • P. Veríssimo et al., "Intrusion-Tolerant Middleware: The Road to Automatic Security," IEEE Security & Privacy, vol. 4, no. 4, 2006, pp. 54-62.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 54-62
    • Veríssimo, P.1
  • 6
    • 27644448706 scopus 로고    scopus 로고
    • Implementing Trustworthy Services Using Replicated State Machines
    • F.B. Schneider and L. Zhou, "Implementing Trustworthy Services Using Replicated State Machines," IEEE Security & Privacy, vol. 3, no. 5, 2005, pp. 34-43.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.5 , pp. 34-43
    • Schneider, F.B.1    Zhou, L.2
  • 7
    • 0017943762 scopus 로고
    • Operating Under Stress and Strain, IBBB
    • Mar
    • L.H. Fink and K. Carlsen, "Operating Under Stress and Strain," IBBB Spectrum, Mar. 1978, pp. 48-53.
    • (1978) Spectrum , pp. 48-53
    • Fink, L.H.1    Carlsen, K.2
  • 8
    • 27544466016 scopus 로고    scopus 로고
    • P. Sousa, N.F. Neves, and P. Veríssimo, How Resilient Are Distributed / Fault/Intrusion-Tolerant Systems? Proc. 35th IEEE/IFIP Int'l Conf. Dependable Systems and Networks, 2005, pp. 98-107.
    • P. Sousa, N.F. Neves, and P. Veríssimo, "How Resilient Are Distributed / Fault/Intrusion-Tolerant Systems?" Proc. 35th IEEE/IFIP Int'l Conf. Dependable Systems and Networks, 2005, pp. 98-107.
  • 11
    • 38949093199 scopus 로고    scopus 로고
    • Traveling through Wormholes: A New Look at Distributed Systems Models
    • P. Veríssimo. "Traveling through Wormholes: A New Look at Distributed Systems Models," ACM SIGACT News, vol. 37, no. 1, 2006.
    • (2006) ACM SIGACT News , vol.37 , Issue.1
    • Veríssimo, P.1
  • 12
    • 21644433634 scopus 로고    scopus 로고
    • P. Barham et al., Xen and the Art of Virtualization, Proc. 19th ACM Symp. Operating Systems Principles, 2003, pp. 164-177.
    • P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles, 2003, pp. 164-177.
  • 13
    • 58849147768 scopus 로고    scopus 로고
    • Project Deliverable D2, Crutial European Commission project IST-2004-27513, Jan
    • F. Garrone et al., "Analysis of New Control Applications," Project Deliverable D2, Crutial European Commission project IST-2004-27513, Jan. 2007.
    • (2007) Analysis of New Control Applications
    • Garrone, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.