1st International Workshop on
Critical Information Infrastructures Security

August 30 - September 2, 2006, Samos Island, Greece
- in conjunction with ISCí06

Papers presented in CRITIS'06:

(Program - PDF Version (pdf))

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
Paulo Veríssimo, Nuno Ferreira Neves, and Miguel Correia
Faculty of Sciences, University of Lisboa, Portugal
Experiment Based Validation of CIIP

Per Mellstrand, Rune Gustavsson
Blekinge Institute of Technology, Sweden 

Security Requirements Model for Grid Data Management Systems
Syed Naqvi1, Philippe Massonet1, Alvaro Arenas2
1Centre of Excellence in Information and Communication Technologies (CETIC), Belgium
2CCLRC Rutherford Appleton Laboratory, United Kingdom

Assessing the Risk of an Information Infrastructure through Security Dependencies
F.Baiardi+, S.Suin+, C.Telmon+, M.Pioli*
Dipartimento di Informatica, Universita di Pisa, Italy
(*) Enel Distribuzione, ENEL, Italy

Modelling Risk and Identifying Countermeasure in Organizations
Yudistira Asnar and Paolo Giorgini
Department of Information and Communication Technology, University of Trento, Italy

Modelling and Analysing Network Security Policies in a given Vulnerability Setting
Roland Rieke
Fraunhofer Institute for Secure Information Technology SIT, Germany

A Framework for Conceptualizing Social Engineering Attacks
Jose J. Gonzalez1, Jose M. Sarriegi2, Alazne Gurrutxaga2
1 Agder University College, Norway
2 Tecnun (University of Navarra), Spain

An Overview of R&D activities in Europe on Critical Information Infrastructure Protection (CIIP)
Sandro Bologna1, Giovanni Di Costanzo1, Eric Luiijf2, and Roberto Setola3
1 ENEA, Italy
2 TNO, Netherlands
3 Universitá CAMPUS Bio-Medico, Italy

Intelligent Network-Based Early Warning Systems
Karsten Bsufka, Olaf Kroll-Peters, and Sahin Albayrak
Technische Universität Berlin, DAI-Labor, Germany

An Early Warning System for Home Users and SMEs: The Ropes to Skip
Urs E. Gattiker
CyTRAP Labs, Switzerland

Security And Resilience In Information Society: The European Approach
Andrea Servida 
Deputy Head of Unit, European Commission
Information Society and Media Directorate General

Protection of Components based on a Smart-Card Enhanced Security Module
Joaquín García-Alfaro1, Sergio Castillo1, Jordi Castellà-Roca2, Guillermo Navarro1, and Joan Borrell1
1DEIC-UAB, Spain

Revisiting Colored Networks and Privacy Preserving Censorship
Yvo Desmedt1,3, Yongge Wang2, and Mike Burmester3
1 University College London, UK
2 UNC Charlotte, USA
3 Florida State University, USA

PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios
Cristina Satizábal12, Rafael Páez1, Jordi Forné1
1 Telematics Engineering Department, Technical University of Catalonia, Spain
2 Engineering and Architecture Department. Pamplona University, Colombia

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
Cristina Alcaraz and Rodrigo Roman
Computer Science Department, University of Malaga, Spain

Trust Establishment in Ad Hoc and Sensor Networks
Efthimia Aivaloglou, Stefanos Gritzalis, and Charalabos Skianis
Department of Information and Communication Systems Engineering, University of the Aegean, Greece

Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li1,2, Shane Balfe3, Jianying Zhou2, and Kefei Chen1
1 Department of Computer Science and Engineering, Shanghai Jiaotong University Shanghai, China
2 Institute for Infocomm Research, Singapore
3 Royal Holloway, University of London, United Kingdom

Proposals on Assessment Environments for Anomaly-based Network Intrusion Detection Systems
M. Bermúdez-Edo, R. Salazar-Hernández, J. Díaz-Verdejo, P. García-Teodoro
Department. of Signal Theory, Telematics and Communications, University of Granada, Spain

High-speed Intrusion Detection in Support of Critical Infrastructure Protection
Salvatore D'Antonio1, Francesco Oliviero2, and Roberto Setola3
1 Lab. ITeM - Consorzio Interuniversitario Nazionale per l'Informatica – CINI, Italy
2 Dipartimento di Informatica e Sistemistica - University of Napoli Federico II, Italy
3 Complex Systems & Security Lab - University CAMPUS Bio-Medico of Roma, Italy

Rational Choice of Security Measures via Multi-Parameter Attack Trees
Ahto Buldas1,2,3, Peeter Laud1,2, Jaan Priisalu4, Märt Saarepera5, and Jan Willemson1,2
1 Cybernetica, Estonia
2 University of Tartu, Estonia
3 Tallinn University of Technology, Estonia
4 Hansapank, Estonia
5 Independent researcher, Estonia

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)

Daniel J. Martínez-Manzano, Gabriel López, Antonio F. Gómez-Skarmeta
Department of Information and Communications Engineering, University of Murcia, Spain

Vulnerabilities and Possible Attacks against the GPRS Backbone Network

Christos Xenakis, Lazaros Merakos
Department of Informatics & Telecommunications, University of Athens, Greece

A Framework for Secure and Verifiable Logging in Public Communication Networks

Vassilios Stathopoulos1, Panayiotis Kotzanikolaou1 and Emmanouil Magkos2
1 Authority for the Assurance of Communications Security and Privacy (ADAE), Greece
2 Ionian University, Greece

Aegean University Last Modified: September 2006