Abstract | ||
---|---|---|
In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1007/978-3-540-85571-2_1 | WADS |
Keywords | DocType | Citations |
adequate architectural construct,access control model,computerized nature,organization-level security policy,main aspect,non-predicted situation,critical information infrastructure,critical information infrastructures,crutial architecture,middleware device,global information flow,modern critical information infrastructure,middleware,information flow,information infrastructure | Conference | 13 |
PageRank | References | Authors |
0.77 | 15 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Paulo Veríssimo | 1 | 2513 | 187.25 |
Nuno F. Neves | 2 | 86 | 7.47 |
Miguel Correia | 3 | 1056 | 71.21 |
Yves Deswarte | 4 | 1142 | 156.24 |
Anas Abou El Kalam | 5 | 433 | 40.81 |
Andrea Bondavalli | 6 | 886 | 133.06 |
Alessandro Daidone | 7 | 56 | 4.71 |