메뉴 건너뛰기




Volumn , Issue , 2014, Pages 291-297

Advanced security management system for critical infrastructures

Author keywords

collaboration; critical infrastructure; privacy; risk assessment; security management

Indexed keywords

C (PROGRAMMING LANGUAGE); DATA PRIVACY; ECONOMICS; INDUSTRIAL MANAGEMENT; PUBLIC WORKS; RISK ASSESSMENT;

EID: 84906738301     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IISA.2014.6878837     Document Type: Conference Paper
Times cited : (6)

References (27)
  • 1
    • 84863941155 scopus 로고    scopus 로고
    • Security Management of the ports' information systems
    • accessed August 2012
    • Polemi, N.: Security Management of the ports' information systems. ENISA Personal study. Available at http://www.enisa.europa.eu (accessed August 2012).
    • ENISA Personal Study
    • Polemi, N.1
  • 2
    • 84906747868 scopus 로고    scopus 로고
    • Analysing mes needs and expectations in the area of information security
    • Reynolds, D., Rabey, K, Polemi, N.: Analysing mes needs and expectations in the area of information security. ENlSA report (2008), available at http://www.enisa.europa.eu/act/sr/reports/microenterprises/files/ wg-micro-report.
    • (2008) ENlSA Report
    • Reynolds, D.1    Rabey, K.2    Polemi, N.3
  • 3
    • 84864645384 scopus 로고    scopus 로고
    • Trusted collaborative services for the IT security management of SMEs/mEs
    • Ntouskas, T., Papanikas, D. and Polemi, N. (2012) 'Trusted collaborative services for the IT security management of SMEs/mEs", In: J. Electronic Security and Digital Forensics, Vol. 4, Nos. 2/3, pp. 124-137.
    • (2012) J. Electronic Security and Digital Forensics , vol.4 , Issue.2-3 , pp. 124-137
    • Ntouskas, T.1    Papanikas, D.2    Polemi, N.3
  • 6
    • 84906747869 scopus 로고    scopus 로고
    • North American Reliability Corporation (NERC), available at http://www.nerc.com.
  • 7
    • 10444235697 scopus 로고    scopus 로고
    • Critical infrastructure protection in The Netherlands: A quick-scan
    • Galiker U., Pedersen P., Petersen K. Eds., accessed May 2010
    • Luiijf E., Burger H., Klaver M., "Critical Infrastructure Protection in The Netherlands: A Quick-scan", Galiker U., Pedersen P., Petersen K. (Eds.), in Proc. of EI C AR Conference, 2003 (accessed May 2010)
    • (2003) Proc. of EI C AR Conference
    • Luiijf, E.1    Burger, H.2    Klaver, M.3
  • 8
    • 77956416528 scopus 로고    scopus 로고
    • Ministry of the Interior and Kingdom Relations, National risk assessment method guide, Netherlands, June 2008
    • Ministry of the Interior and Kingdom Relations, National risk assessment method guide 2008. National Security Programme, Netherlands, June 2008, Available at http://www.minbzk.nJ/lbzk2006uk!subjects/publicsafety/ publicationslllS6471 national risk!, (Accessed May 2010)
    • (2008) National Security Programme
  • 13
    • 1842829828 scopus 로고    scopus 로고
    • National Institute for Standards and Technology, NlST Special Publication, USA, July
    • National Institute for Standards and Technology, Risk management guide for information technology systems, NlST Special Publication 800-30, USA, July 2002.
    • (2002) Risk Management Guide for Information Technology Systems , pp. 800-830
  • 14
    • 33746338083 scopus 로고    scopus 로고
    • Carnegie Mellon University, June, accessed December 2010
    • OCTAVE Method Implementation Guide Version 2.0, Carnegie Mellon University, June 2001. Available at http://www.cert.org/octave/(accessed December 2010).
    • (2001) Method Implementation Guide Version 2.0
  • 15
    • 84906747861 scopus 로고    scopus 로고
    • Operationally critical threat, asset, and vulnerability evaluation (OCT A VE)
    • Software Engineering Institute, Carnegie Mellon University
    • [IS] Alberts, Christopher & Dorofee, Audrey. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCT A VE) Method Implementation Guide, v2.0. Software Engineering Institute, Carnegie Mellon University, 2001. http://www.cert.orgloctave/.
    • (2001) Method Implementation Guide, v2.0
  • 16
    • 84906747862 scopus 로고    scopus 로고
    • Insight Consulting, United Kingdom
    • Insight Consulting, CRAMM User Guide, Issue 5.1, United Kingdom, 2005.
    • (2005) CRAMM User Guide , Issue.51
  • 17
    • 1842829828 scopus 로고    scopus 로고
    • National Institute for Standards and Technology, NlST Special Publication, USA, July
    • National Institute for Standards and Technology, Risk management guide for information technology systems, NlST Special Publication 800-30, USA, July 2002.
    • (2002) Risk Management Guide for Information Technology Systems , pp. 800-830
  • 18
    • 33746338083 scopus 로고    scopus 로고
    • Carnegie Mellon University, June, accessed December 2010
    • OCTAVE Method Implementation Guide Version 2.0, Carnegie Mellon University, June 2001. Available at http://www.cert.orgloctave/(accessed December 2010).
    • (2001) OCTAVE Method Implementation Guide Version 2.0
  • 20
    • 84906747864 scopus 로고    scopus 로고
    • Insight Consulting, United Kingdom
    • Insight Consulting, CRAMM User Guide, Issue 5.1, United Kingdom, 2005.
    • (2005) CRAMM User Guide , Issue.51
  • 21
    • 84906770543 scopus 로고    scopus 로고
    • National Infrastructure Protection
    • US Department of Homeland Security, National Infrastructure Protection. Plan (2009), http://www.dhs. gov Ixprevprot/programsled ito rial-0827. sh tm.
    • (2009) Plan
  • 22
    • 80052695194 scopus 로고    scopus 로고
    • Methodologies and applications for critical infrastructure protection: State-of-the-art
    • October
    • Yusta J. M., Correa G. J., Lacal-Anintegui R., "Methodologies and applications for critical infrastructure protection: State-of-the-art", ESLSEVIER, Energy Policy, Vol. 39, No. 10., pp. 6100-6119, October 2011.
    • (2011) ESLSEVIER, Energy Policy , vol.39 , Issue.10 , pp. 6100-6119
    • Yusta, J.M.1    Correa, G.J.2    Lacal-Anintegui, R.3
  • 23
    • 77954469802 scopus 로고    scopus 로고
    • Design principles of a secure federated elm-government framework
    • Special Issue on "Users and uses of electronic governance"
    • A. Karantjias, S. Papastergiou, N. Polemi, "Design Principles of a Secure Federated elm-Government Framework", International Journal of Electronic Governance (IJEG), Special Issue on "Users and uses of electronic governance", Vol. 2, No 4, 2009
    • (2009) International Journal of Electronic Governance (IJEG) , vol.2 , Issue.4
    • Karantjias, A.1    Papastergiou, S.2    Polemi, N.3
  • 24
    • 84906747865 scopus 로고    scopus 로고
    • A user-centric & federated Single-Sign-In lAM system for SOA elm-frameworks
    • Special Issue on "Usability and Privacy Issues in Electronic and Mobile Government"
    • A. Karantjias, N. Polemi, T. Stamati, D. Martakos, "A user-centric & federated Single-Sign-In lAM system for SOA elm-frameworks", International Journal of Electronic Government (UEG), Special Issue on "Usability and Privacy Issues in Electronic and Mobile Government", 2009
    • (2009) International Journal of Electronic Government (UEG)
    • Karantjias, A.1    Polemi, N.2    Stamati, T.3    Martakos, D.4
  • 25
    • 84906747866 scopus 로고    scopus 로고
    • A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM)
    • eJETA
    • [2S] A. Karantjias, T. Stamati, N. Polemi, D. Martakos, "A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM) ", Electronic Joumal on E-Commerce Tools and Applications (eJETA), 2009
    • (2009) Electronic Joumal on E-commerce Tools and Applications
  • 26
    • 84906747856 scopus 로고    scopus 로고
    • Collaborative Cyber/Physical Security Management System CYSM
    • Collaborative Cyber/Physical Security Management System (CYSM) Project (2013), Available at: http://www.cvsm.eu
    • Project (2013)
  • 27
    • 84906734665 scopus 로고    scopus 로고
    • Multi Order Dependency approaches for Managing Cascading effects in Ports', Grant Agreement HOME/2013/CIPS/AE/400000S093
    • Multi Order Dependency approaches for Managing Cascading effects in Ports' Global Supply Chain and their integration in Risk Assessment frameworks (Medusa), (2014), Grant Agreement HOME/2013/CIPS/AE/400000S093
    • (2014) Global Supply Chain and Their Integration in Risk Assessment Frameworks (Medusa)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.