Skip to main content

Experiment Based Validation of CIIP

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

The connection between critical infrastructure Protection (CIP) and critical information infrastructures protection (CIIP) is a major research area. We describe our view of how a combined experimental approach can be used to build targeted resilient software required for critical infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. EC Critical Information Infrastructure Research Co-ordinatiion (CI2RCO), http://www.ci2rco.org

  2. EC sixth framework program A coordination Action on ICT vulnerabilities of power systems and the relevant defence methodologies (“GRID”)

    Google Scholar 

  3. Global Grid Forum, http://www.gridforum.org/

  4. Europe’s Information Society, europa.eu.int/information_society/text_en.htm

  5. Mellstrand, P., Gustavsson, R.: Dynamic Protection of Software Execution Environment. In: Proceedings of the 2nd International Conference on Critical Infrastructures (2004)

    Google Scholar 

  6. Mellstrand, P., Gustavsson, R.: Preventing Buffer Overflows by Dynamic Environment Hardening. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)

    Google Scholar 

  7. Mellstrand, P., Gustavsson, R.: An Experiment Driven Approach Towards Dependable and Sustainable Future Energy Systems. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)

    Google Scholar 

  8. Gustavsson, R.: Ensuring dependability in service oriented computing. In: Proceedings of The 2006 International Conference on Security & Management (SAM 2006) at The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas (2006)

    Google Scholar 

  9. Gustavsson, R., Mellstrand, P.: Ensuring Quality of Service in Service Oriented Critical Infrastructures. In: Proceedings of International Workshop on Complex Network and Infrastructure Protection, CNIP 2006, March 28-29 (2006) (invited paper to journal)

    Google Scholar 

  10. Hsueh, T.T., Iyer, R.: Fault injection techniques and tools. IEEE Computer, 75–82 (April 1997)

    Google Scholar 

  11. Antoniou, G., van Harmelen, F.: A Semantic Web Primer. Cooperative Information Systems series. The MIT Press, Cambridge (2004)

    Google Scholar 

  12. Mellstrand, P.: Protecting Software Execution by Dynamic Environment Hardening. BTH licentiate dissertation series no. 2005:12 (2005)

    Google Scholar 

  13. Lewis, T.: Critical Infrastructures Protection in Homeland Security. Defending a Networked Nation. Wiley Interscience, Chichester (2006)

    Book  Google Scholar 

  14. Rahman, H.A., Beznosov, K., Marti, J.R.: Source of Failures and Their Impacts on Critical Infrastructures as Identified from 12 Years Public Failure Reports. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mellstrand, P., Gustavsson, R. (2006). Experiment Based Validation of CIIP. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_2

Download citation

  • DOI: https://doi.org/10.1007/11962977_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics