메뉴 건너뛰기




Volumn 4347 LNCS, Issue , 2006, Pages 1-14

CRUTIAL: The blueprint of a reference critical information infrastructure architecture

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED SYSTEMS ARCHITECTURES; ELECTRICAL UTILITIES; INFORMATION INFRASTRUCTURES; RESEARCH EFFORTS; SECURITY METHODS; SYSTEMS SECURITY;

EID: 84873800450     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11962977_1     Document Type: Conference Paper
Times cited : (9)

References (28)
  • 2
    • 0242314137 scopus 로고    scopus 로고
    • President's Critical Infrastructure Protection Board and Office of Energy Assurance U.S. Department of Energy. U.S. Department of Energy
    • President's Critical Infrastructure Protection Board and Office of Energy Assurance U.S. Department of Energy. 21 Steps to Improve Cyber Security of SCADA Networks. U.S. Department of Energy, 2002.
    • (2002) 21 Steps to Improve Cyber Security of SCADA Networks.
  • 4
    • 34047192955 scopus 로고    scopus 로고
    • NISCC good practice guide on firewall deployment for SCADA and process control networks
    • February. Revision 1.4
    • E. Byres, J. Karsch, and J. Carter. NISCC good practice guide on firewall deployment for SCADA and process control networks. Technical report, NISCC, February 2005. Revision 1.4.
    • (2005) Technical Report, NISCC
    • Byres, E.1    Karsch, J.2    Carter, J.3
  • 5
    • 77956994520 scopus 로고    scopus 로고
    • Attacks and accidents: Policy to protect the power grid's critical computing and communication needs
    • Stanford University, May
    • J. Cieslewicz. Attacks and accidents: Policy to protect the power grid's critical computing and communication needs. Senior interdisciplinary honors thesis in international security studies, Stanford University, May 2004.
    • (2004) Senior Interdisciplinary Honors Thesis in International Security Studies
    • Cieslewicz, J.1
  • 8
    • 31944451961 scopus 로고    scopus 로고
    • Security of critical control systems sparks concern
    • January
    • D. Geer. Security of critical control systems sparks concern. IEEE Computer, pages 20-23, January 2006.
    • (2006) IEEE Computer , pp. 20-23
    • Geer, D.1
  • 15
    • 51449101349 scopus 로고    scopus 로고
    • Getting a grip on the grid
    • December
    • V. Madani and D. Novosel. Getting a grip on the grid. IEEE Spectrum, 42(12):42-47, December 2005.
    • (2005) IEEE Spectrum , vol.42 , Issue.12 , pp. 42-47
    • Madani, V.1    Novosel, D.2
  • 20
    • 34047144699 scopus 로고    scopus 로고
    • Common vulnerabilities in critical infrastructure control systems
    • Sandia National Laboratories, May
    • J. Stamp, J. Dillinger, W. Young, and J. DePoy. Common vulnerabilities in critical infrastructure control systems. Technical report, Sandia National Laboratories, May 2003.
    • (2003) Technical Report
    • Stamp, J.1    Dillinger, J.2    Young, W.3    Depoy, J.4
  • 23
    • 84855556571 scopus 로고    scopus 로고
    • The enemy within: System complexity and organizational surprises
    • In M. Dunn and V. Mauer, editors, Center for Security Studies, ETH Zurich
    • M. van Eeten, E. Roe, P. Schulman, and M. de Bruijne. The enemy within: System complexity and organizational surprises. In M. Dunn and V. Mauer, editors, International CIIP Handbook 2006, volume II, pages 89-110. Center for Security Studies, ETH Zurich, 2006.
    • (2006) International CIIP Handbook 2006 , vol.II , pp. 89-110
    • Van Eeten, M.1    Roe, E.2    Schulman, P.3    De Bruijne, M.4
  • 27
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-tolerant architectures: Concepts and design
    • In R. Lemos, C. Gacek, and A. Romanovsky, editors
    • P. Veríssimo, N. F. Neves, and M. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677, pages 3-36. 2003.
    • (2003) Architecting Dependable Systems , vol.2677 , pp. 3-36
    • Veríssimo, P.1    Neves, N.F.2    Correia, M.3
  • 28
    • 77649269871 scopus 로고    scopus 로고
    • Terrorist capabilities for cyber-attack
    • In M. Dunn and V. Mauer, editors, Center for Security Studies, ETH Zurich
    • C. Wilson. Terrorist capabilities for cyber-attack. In M. Dunn and V. Mauer, editors, International CIIP Handbook 2006, volume II, pages 69-88. Center for Security Studies, ETH Zurich, 2006.
    • (2006) International CIIP Handbook 2006 , vol.II , pp. 69-88
    • Wilson, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.