“The CRUTIAL Architecture for Critical Information Infrastructures”

From Navigators

(Difference between revisions)
Jump to: navigation, search
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))
Line 1: Line 1:
{{Publication
{{Publication
-
|title=
+
|type=incollection
-
   
+
|title=The CRUTIAL Architecture for Critical Information Infrastructures
-
 
+
|author=Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone
-
 
+
|month=aug
-
 
+
|year=2007
-
   
+
|abstract=In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.
-
        The CRUTIAL Architecture for Critical Information Infrastructures
+
|booktitle=Architecting Dependable Systems V
-
|author=
+
|editor=Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira,  
-
        Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone
+
|volume=5135
-
|url=
+
|series=LNCS
-
        http://www.navigators.di.fc.ul.pt/archive/papers/verissimo-crutial-ads-dez07-final.pdf
+
|url=http://www.navigators.di.fc.ul.pt/archive/papers/verissimo-crutial-ads-dez07-final.pdf
-
|abstract=
+
-
        In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.
+
-
|type=
+
-
        incollection
+
-
|booktitle=
+
-
        Architecting Dependable Systems V, LNCS 5135, Lemos, R.d.; Di Giandomenico, F.; Gacek, C.; Muccini, H.; Vieira, M. (Eds.) 2008
+
-
|month=
+
-
        aug
+
-
|year=
+
-
        2007
+
-
|ResearchLine=
+
-
        Fault And Intrusion Tolerance in Open Distributed Systems (FIT)
+
}}
}}

Revision as of 17:18, 14 January 2013

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone

in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS

Missing publisher, Aug. 2007, vol. 5135.

Abstract: In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.

Download paper

Download The CRUTIAL Architecture for Critical Information Infrastructures

Export citation

BibTeX

Project(s):

Missing ResearchLine

Personal tools
Navigators toolbox