Design of a Platform for Information Exchange on Protection of Critical Infrastructures

  • Carlo Ferigato
  • Marcelo Masera
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5141)


In order to face risk in critical infrastructures, coordination and communication are fundamental factors. The fragmentation of the management of infrastructures and the delegation of part of the management of risk to private bodies asks for effective electronic communications. These communications should integrate or substitute traditional face to face communications and protocols and should involve all relevant European actors and regulatory bodies. The technology on which these communications are exchanged should contribute to the creation of mutual trust among the involved actors. The design of an effective information exchange system on critical infrastructures is a huge enterprise since the electronic communication technology is apparently still immature in this respect. Consequently, some theoretical work has still to be done and accurate design is needed before proceeding with the engineering phase.


Critical infrastructure protection message exchange communication disciplines communication protocols 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Directive 96/92/EC of the European Parliament and of the Council of 19 December 1996 concerning common rules for the internal market of electricity. Official Journal of the European Union, L 027 (1997)Google Scholar
  2. 2.
    Gheorghe, A.V., Masera, M., Weijnen, M.P.C., De Vries, L.J.: Critical Infrastructures at Risk. Springer, Dordrecht (2006)CrossRefGoogle Scholar
  3. 3.
    Bazermann, C., Paradis, J. (eds.): Textual Dynamics of the Professions. The University of Wisconsin Press, Madison (1991)Google Scholar
  4. 4.
    NISCC’s Information Exchanges Example Membership Guidelines (March 16, 2007),
  5. 5.
    Green Paper on a European Programme for Critical Infrastructure Protection. Official Journal of the European Union, C 576 (2005)Google Scholar
  6. 6.
    NISCC, Information Exchanges (March 16, 2006),
  7. 7.
    Robert III, H.M., Evans, W.J., Honemann, D.H., Balch, T.J.: Robert’s Rules of Order. Perseus Publishing, Cambridge (2000); Original (1915) (November 17, 2006), Google Scholar
  8. 8.
    Chatham House Rule, lemma in: Wikipedia, the Free Encyclopedia (June 29, 2007);
  9. 9.
    Centre for the Protection of National Infrastructure (June 29, 2007),
  10. 10.
  11. 11.
    BSI - Bundesamt für Sicherheit in der Informationstechnik (June 29, 2007),
  12. 12.
    Skågeby, J., Pargman, D.: File-Sharing Relationships - conflicts of interest in online gift-giving. In: Van Den Besselaar, P., De Michelis, G., Preece, J., Simone, C. (eds.) Communities and Technologies 2005. Springer, Dordrecht (2005)Google Scholar
  13. 13.
    Meridian Conference Agreement and the Traffic Light Protocol. The Quarterly, NISCC (April 2005) (March 22, 2007),
  14. 14.
    Petri, C.A.: Communication Disciplines. In: Proceedings of the Joint IBM University of Newcastle upon Tyne seminar, pp. 171–183 (1977)Google Scholar
  15. 15.
    Levinson, S.C.: Pragmatics. Cambridge University Press, Cambridge (1983)Google Scholar
  16. 16.
    Bradshaw, J.M.: KAoS: An Open Agent Architecture Supporting Reuse, Interoperability and Extensibility (August 24, 2007),
  17. 17.
    Winograd, T., Flores, F.: Understanding Computers and Cognition. Ablex, Norwood (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Carlo Ferigato
    • 1
  • Marcelo Masera
    • 1
  1. 1.Joint Research Centre of the European CommissionInstitute for the Protection and Security of the CitizenIspraItaly

Personalised recommendations