-
1
-
-
84863941155
-
Security Management of the ports' information systems
-
accessed August 2012
-
Polemi, N.: Security Management of the ports' information systems. ENISA Personal study. Available at http://www.enisa.europa.eu (accessed August 2012).
-
ENISA Personal Study
-
-
Polemi, N.1
-
2
-
-
84906747868
-
Analysing mes needs and expectations in the area of information security
-
Reynolds, D., Rabey, K, Polemi, N.: Analysing mes needs and expectations in the area of information security. ENlSA report (2008), available at http://www.enisa.europa.eu/act/sr/reports/microenterprises/files/ wg-micro-report.
-
(2008)
ENlSA Report
-
-
Reynolds, D.1
Rabey, K.2
Polemi, N.3
-
3
-
-
84864645384
-
Trusted collaborative services for the IT security management of SMEs/mEs
-
Ntouskas, T., Papanikas, D. and Polemi, N. (2012) 'Trusted collaborative services for the IT security management of SMEs/mEs", In: J. Electronic Security and Digital Forensics, Vol. 4, Nos. 2/3, pp. 124-137.
-
(2012)
J. Electronic Security and Digital Forensics
, vol.4
, Issue.2-3
, pp. 124-137
-
-
Ntouskas, T.1
Papanikas, D.2
Polemi, N.3
-
4
-
-
84869597110
-
A collaborative system offering security management services for SMEs/mEs
-
R. Bashroush, et al. Eds., LNlCST 99, Springer
-
Ntouskas, T., Papanikas, D., Polemi N, "A collaborative system offering security management services for SMEs/mEs", in Proc. of the 7th IEEE International Conference in Global Security, Safety and Sustainabilit (ICGS3-2011), R. Bashroush, et al. (Eds.), LNlCST 99, Springer, pp. 220-228, 2012
-
(2012)
Proc. of the 7th IEEE International Conference in Global Security, Safety and Sustainabilit (ICGS3-2011)
, pp. 220-228
-
-
Ntouskas, T.1
Papanikas, D.2
Polemi, N.3
-
6
-
-
84906747869
-
-
North American Reliability Corporation (NERC), available at http://www.nerc.com.
-
-
-
-
7
-
-
10444235697
-
Critical infrastructure protection in The Netherlands: A quick-scan
-
Galiker U., Pedersen P., Petersen K. Eds., accessed May 2010
-
Luiijf E., Burger H., Klaver M., "Critical Infrastructure Protection in The Netherlands: A Quick-scan", Galiker U., Pedersen P., Petersen K. (Eds.), in Proc. of EI C AR Conference, 2003 (accessed May 2010)
-
(2003)
Proc. of EI C AR Conference
-
-
Luiijf, E.1
Burger, H.2
Klaver, M.3
-
8
-
-
77956416528
-
-
Ministry of the Interior and Kingdom Relations, National risk assessment method guide, Netherlands, June 2008
-
Ministry of the Interior and Kingdom Relations, National risk assessment method guide 2008. National Security Programme, Netherlands, June 2008, Available at http://www.minbzk.nJ/lbzk2006uk!subjects/publicsafety/ publicationslllS6471 national risk!, (Accessed May 2010)
-
(2008)
National Security Programme
-
-
-
13
-
-
1842829828
-
-
National Institute for Standards and Technology, NlST Special Publication, USA, July
-
National Institute for Standards and Technology, Risk management guide for information technology systems, NlST Special Publication 800-30, USA, July 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
, pp. 800-830
-
-
-
14
-
-
33746338083
-
-
Carnegie Mellon University, June, accessed December 2010
-
OCTAVE Method Implementation Guide Version 2.0, Carnegie Mellon University, June 2001. Available at http://www.cert.org/octave/(accessed December 2010).
-
(2001)
Method Implementation Guide Version 2.0
-
-
-
15
-
-
84906747861
-
Operationally critical threat, asset, and vulnerability evaluation (OCT A VE)
-
Software Engineering Institute, Carnegie Mellon University
-
[IS] Alberts, Christopher & Dorofee, Audrey. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCT A VE) Method Implementation Guide, v2.0. Software Engineering Institute, Carnegie Mellon University, 2001. http://www.cert.orgloctave/.
-
(2001)
Method Implementation Guide, v2.0
-
-
-
16
-
-
84906747862
-
-
Insight Consulting, United Kingdom
-
Insight Consulting, CRAMM User Guide, Issue 5.1, United Kingdom, 2005.
-
(2005)
CRAMM User Guide
, Issue.51
-
-
-
17
-
-
1842829828
-
-
National Institute for Standards and Technology, NlST Special Publication, USA, July
-
National Institute for Standards and Technology, Risk management guide for information technology systems, NlST Special Publication 800-30, USA, July 2002.
-
(2002)
Risk Management Guide for Information Technology Systems
, pp. 800-830
-
-
-
18
-
-
33746338083
-
-
Carnegie Mellon University, June, accessed December 2010
-
OCTAVE Method Implementation Guide Version 2.0, Carnegie Mellon University, June 2001. Available at http://www.cert.orgloctave/(accessed December 2010).
-
(2001)
OCTAVE Method Implementation Guide Version 2.0
-
-
-
19
-
-
84906747863
-
Operationally critical threat, asset, and vulnerability evaluation
-
Carnegie Mellon University
-
Alberts, Christopher & Dorofee, Audrey. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCT A VE) Method Implementation Guide, v2.0. Software Engineering Institute, Carnegie Mellon University, 2001. http://www.cert.orgloctave/.
-
(2001)
(OCT a VE) Method Implementation Guide, V2.0. Software Engineering Institute
-
-
Alberts, C.1
Dorofee, A.2
-
20
-
-
84906747864
-
-
Insight Consulting, United Kingdom
-
Insight Consulting, CRAMM User Guide, Issue 5.1, United Kingdom, 2005.
-
(2005)
CRAMM User Guide
, Issue.51
-
-
-
21
-
-
84906770543
-
-
National Infrastructure Protection
-
US Department of Homeland Security, National Infrastructure Protection. Plan (2009), http://www.dhs. gov Ixprevprot/programsled ito rial-0827. sh tm.
-
(2009)
Plan
-
-
-
22
-
-
80052695194
-
Methodologies and applications for critical infrastructure protection: State-of-the-art
-
October
-
Yusta J. M., Correa G. J., Lacal-Anintegui R., "Methodologies and applications for critical infrastructure protection: State-of-the-art", ESLSEVIER, Energy Policy, Vol. 39, No. 10., pp. 6100-6119, October 2011.
-
(2011)
ESLSEVIER, Energy Policy
, vol.39
, Issue.10
, pp. 6100-6119
-
-
Yusta, J.M.1
Correa, G.J.2
Lacal-Anintegui, R.3
-
23
-
-
77954469802
-
Design principles of a secure federated elm-government framework
-
Special Issue on "Users and uses of electronic governance"
-
A. Karantjias, S. Papastergiou, N. Polemi, "Design Principles of a Secure Federated elm-Government Framework", International Journal of Electronic Governance (IJEG), Special Issue on "Users and uses of electronic governance", Vol. 2, No 4, 2009
-
(2009)
International Journal of Electronic Governance (IJEG)
, vol.2
, Issue.4
-
-
Karantjias, A.1
Papastergiou, S.2
Polemi, N.3
-
24
-
-
84906747865
-
A user-centric & federated Single-Sign-In lAM system for SOA elm-frameworks
-
Special Issue on "Usability and Privacy Issues in Electronic and Mobile Government"
-
A. Karantjias, N. Polemi, T. Stamati, D. Martakos, "A user-centric & federated Single-Sign-In lAM system for SOA elm-frameworks", International Journal of Electronic Government (UEG), Special Issue on "Usability and Privacy Issues in Electronic and Mobile Government", 2009
-
(2009)
International Journal of Electronic Government (UEG)
-
-
Karantjias, A.1
Polemi, N.2
Stamati, T.3
Martakos, D.4
-
25
-
-
84906747866
-
A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM)
-
eJETA
-
[2S] A. Karantjias, T. Stamati, N. Polemi, D. Martakos, "A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM) ", Electronic Joumal on E-Commerce Tools and Applications (eJETA), 2009
-
(2009)
Electronic Joumal on E-commerce Tools and Applications
-
-
-
26
-
-
84906747856
-
-
Collaborative Cyber/Physical Security Management System CYSM
-
Collaborative Cyber/Physical Security Management System (CYSM) Project (2013), Available at: http://www.cvsm.eu
-
Project (2013)
-
-
-
27
-
-
84906734665
-
-
Multi Order Dependency approaches for Managing Cascading effects in Ports', Grant Agreement HOME/2013/CIPS/AE/400000S093
-
Multi Order Dependency approaches for Managing Cascading effects in Ports' Global Supply Chain and their integration in Risk Assessment frameworks (Medusa), (2014), Grant Agreement HOME/2013/CIPS/AE/400000S093
-
(2014)
Global Supply Chain and Their Integration in Risk Assessment Frameworks (Medusa)
-
-
|