CRITIS'06 1st International Workshop on Critical Information Infrastructures Security August 30 - September 2, 2006, Samos Island, Greece - in conjunction with ISC’06 |
|
CRUTIAL:
The Blueprint of a Reference Critical Information Infrastructure
Architecture
Paulo
Veríssimo, Nuno Ferreira Neves, and Miguel Correia
Faculty of Sciences,
University of Lisboa, Portugal
Experiment Based Validation of CIIP
Per
Mellstrand, Rune Gustavsson
Blekinge Institute of
Technology, Sweden
Security Requirements Model for
Grid Data Management Systems
Syed
Naqvi1, Philippe
Massonet1, Alvaro Arenas2
1Centre of Excellence in
Information and Communication Technologies (CETIC), Belgium
2CCLRC Rutherford
Appleton Laboratory, United Kingdom
F.Baiardi+,
S.Suin+, C.Telmon+, M.Pioli*
(+)Dipartimento
di Informatica, Universita di Pisa, Italy
(*) Enel
Distribuzione, ENEL, Italy
Modelling
Risk and Identifying Countermeasure in Organizations
Yudistira
Asnar and Paolo Giorgini
Department of Information
and Communication
Technology, University of Trento, Italy
Modelling
and Analysing Network Security Policies in a given Vulnerability Setting
Roland
Rieke
Fraunhofer Institute for
Secure Information
Technology SIT, Germany
A Framework for
Conceptualizing Social Engineering Attacks
Jose
J. Gonzalez1, Jose M. Sarriegi2, Alazne Gurrutxaga2
1 Agder University
College, Norway
2 Tecnun (University
of Navarra), Spain
An
Overview of R&D activities in Europe on Critical Information
Infrastructure
Protection (CIIP)
Sandro
Bologna1, Giovanni Di Costanzo1, Eric Luiijf2,
and Roberto Setola3
1 ENEA, Italy
2 TNO, Netherlands
3 Universitá CAMPUS Bio-Medico,
Italy
Intelligent
Network-Based Early Warning Systems
Karsten
Bsufka, Olaf Kroll-Peters, and Sahin Albayrak
Technische Universität
Berlin, DAI-Labor, Germany
An Early Warning System for Home Users and
SMEs: The
Ropes to Skip
Urs
E. Gattiker
CyTRAP Labs,
Switzerland
Security And Resilience In Information
Society: The
European Approach
(INVITED TALK)
Andrea Servida
Deputy Head of Unit, European Commission
Information Society and Media Directorate General
Protection of
Components based on a Smart-Card
Enhanced Security Module
Joaquín
García-Alfaro1, Sergio Castillo1, Jordi
Castellà-Roca2,
Guillermo Navarro1, and Joan Borrell1
1DEIC-UAB, Spain
2DEiM-ETSE-URV, Spain
Revisiting
Colored Networks and Privacy Preserving Censorship
Yvo
Desmedt1,3, Yongge Wang2, and Mike Burmester3
1 University College
London, UK
2 UNC
Charlotte, USA
3 Florida State
University, USA
PROSEARCH: A Protocol to Simplify Path Discovery
in Critical Scenarios
Cristina
Satizábal12, Rafael Páez1, Jordi
Forné1
1 Telematics
Engineering Department, Technical University of Catalonia, Spain
2 Engineering
and Architecture Department. Pamplona University, Colombia
Applying
Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
Cristina
Alcaraz and Rodrigo Roman
Computer Science Department,
University of
Malaga, Spain
Trust
Establishment in Ad Hoc and Sensor Networks
Efthimia
Aivaloglou, Stefanos Gritzalis, and Charalabos Skianis
Department of Information
and Communication
Systems Engineering, University of the Aegean, Greece
Enforcing
Trust in Pervasive Computing with Trusted Computing Technology
Shiqun
Li1,2, Shane Balfe3,
Jianying Zhou2, and Kefei Chen1
1 Department of Computer
Science and Engineering, Shanghai Jiaotong University Shanghai, China
2 Institute
for Infocomm Research, Singapore
3 Royal Holloway,
University of London, United Kingdom
Proposals on Assessment
Environments for Anomaly-based Network Intrusion Detection Systems
M.
Bermúdez-Edo, R. Salazar-Hernández, J.
Díaz-Verdejo, P. García-Teodoro
Department. of Signal
Theory, Telematics and
Communications, University of Granada, Spain
High-speed
Intrusion Detection in Support of Critical Infrastructure Protection
Salvatore
D'Antonio1, Francesco Oliviero2, and Roberto
Setola3
1 Lab. ITeM - Consorzio
Interuniversitario Nazionale per l'Informatica – CINI, Italy
2 Dipartimento di Informatica e
Sistemistica - University of Napoli Federico II, Italy
3 Complex Systems & Security
Lab - University CAMPUS Bio-Medico of Roma, Italy
Rational Choice of Security Measures via
Multi-Parameter Attack Trees
Ahto Buldas1,2,3, Peeter
Laud1,2,
Jaan Priisalu4, Märt Saarepera5, and Jan
Willemson1,2
1 Cybernetica, Estonia
2 University of Tartu, Estonia
3 Tallinn University of Technology, Estonia
4 Hansapank, Estonia
5 Independent researcher, Estonia
Multidomain Virtual Security Negotiation over
the Session Initiation Protocol (SIP)
Daniel J.
Martínez-Manzano, Gabriel López, Antonio F.
Gómez-Skarmeta
Department of Information
and Communications
Engineering, University of Murcia, Spain
Vulnerabilities and Possible Attacks against the
GPRS Backbone Network
Christos Xenakis, Lazaros
Merakos
Department of Informatics &
Telecommunications,
University of Athens, Greece
A Framework for Secure and Verifiable Logging in
Public Communication Networks
Vassilios
Stathopoulos1, Panayiotis Kotzanikolaou1 and
Emmanouil
Magkos2
1 Authority for the
Assurance of Communications Security and Privacy (ADAE), Greece
2 Ionian University, Greece