The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
Javier Lopez Livres






The Gov Geeks Guide to Government Soft Skills
- 218pages
- 8 heures de lecture
Emerging Challenges for Security, Privacy and Trust
24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings
- 460pages
- 17 heures de lecture
The 24th IFIP International Information Security Conference (SEC 2009), held in Pafos, Cyprus, showcased the commitment and expertise of information security professionals globally. With 176 submissions, only 39 papers were selected for presentation, reflecting a competitive acceptance rate of 22%. This volume compiles the chosen works, emphasizing the novelty and technical quality of the research. The conference also highlights the collaborative efforts of numerous volunteers who contributed to its success, set against the backdrop of Cyprus's natural beauty and rich history.
Information Security
18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
- 583pages
- 21 heures de lecture
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.
Information Security Practice and Experience
11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
- 590pages
- 21 heures de lecture
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
Risks and Security of Internet and Systems
9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers
- 275pages
- 10 heures de lecture
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
Public key infrastructure
- 374pages
- 14 heures de lecture
These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28–30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Islands Government and the Private Law Department at UIB. This year’s event was the fourth event in the EuroPKI Workshops series. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); and Turin, Italy, (2006). In response to the call for papers, 77 papers were submitted to this year’s workshop, setting a record of the highest number of papers submitted to an EuroPKI event so far and confirming an increased interest in PKI research and in the EuroPKI event. Each paper was reviewed by three members of the Program Committee, and evaluated on the basis of its significance, novelty, technical quality and relevance to the workshop. The paper selection process was very competitive: of the papers submitted, only 21 full papers and 8 short papers were selected for presentation at the workshop and inclusion in this volume.
Key sectors of modern economies are heavily reliant on ICT, making the information processed by this technological super-infrastructure crucial. Disruption or loss of this information can lead to significant financial, material, and even human losses, highlighting the importance of security and dependability in these systems. Protecting this infrastructure is a major objective for governments, companies, and the research community. CRITIS was established to unite researchers and professionals from universities, private companies, and public administrations focused on various security aspects of critical information infrastructures. This volume presents the proceedings from the 1st International Workshop on Critical Information Infrastructure Security, held from August 31 to September 1, 2006, in Samos, Greece, hosted by the University of the Aegean's Department of Information and Communication Systems Engineering. In response to the call for papers, 57 submissions were received, each reviewed by three Program Committee members based on significance, novelty, technical quality, and relevance. Ultimately, 22 papers were selected for presentation, resulting in a 38% acceptance rate. Authors are responsible for the content of their papers, as revisions were not checked.