Abstract
The connection between critical infrastructure Protection (CIP) and critical information infrastructures protection (CIIP) is a major research area. We describe our view of how a combined experimental approach can be used to build targeted resilient software required for critical infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
EC Critical Information Infrastructure Research Co-ordinatiion (CI2RCO), http://www.ci2rco.org
EC sixth framework program A coordination Action on ICT vulnerabilities of power systems and the relevant defence methodologies (“GRID”)
Global Grid Forum, http://www.gridforum.org/
Europe’s Information Society, europa.eu.int/information_society/text_en.htm
Mellstrand, P., Gustavsson, R.: Dynamic Protection of Software Execution Environment. In: Proceedings of the 2nd International Conference on Critical Infrastructures (2004)
Mellstrand, P., Gustavsson, R.: Preventing Buffer Overflows by Dynamic Environment Hardening. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)
Mellstrand, P., Gustavsson, R.: An Experiment Driven Approach Towards Dependable and Sustainable Future Energy Systems. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)
Gustavsson, R.: Ensuring dependability in service oriented computing. In: Proceedings of The 2006 International Conference on Security & Management (SAM 2006) at The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas (2006)
Gustavsson, R., Mellstrand, P.: Ensuring Quality of Service in Service Oriented Critical Infrastructures. In: Proceedings of International Workshop on Complex Network and Infrastructure Protection, CNIP 2006, March 28-29 (2006) (invited paper to journal)
Hsueh, T.T., Iyer, R.: Fault injection techniques and tools. IEEE Computer, 75–82 (April 1997)
Antoniou, G., van Harmelen, F.: A Semantic Web Primer. Cooperative Information Systems series. The MIT Press, Cambridge (2004)
Mellstrand, P.: Protecting Software Execution by Dynamic Environment Hardening. BTH licentiate dissertation series no. 2005:12 (2005)
Lewis, T.: Critical Infrastructures Protection in Homeland Security. Defending a Networked Nation. Wiley Interscience, Chichester (2006)
Rahman, H.A., Beznosov, K., Marti, J.R.: Source of Failures and Their Impacts on Critical Infrastructures as Identified from 12 Years Public Failure Reports. In: Proceedings of the 3rd International Conference on Critical Infrastructures (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mellstrand, P., Gustavsson, R. (2006). Experiment Based Validation of CIIP. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_2
Download citation
DOI: https://doi.org/10.1007/11962977_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)