Skip to main content
  • Conference proceedings
  • © 2011

Critical Information Infrastructure Security

5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers

  • Up-to-date- results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6712)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRITIS: International Conference on Critical Information Infrastructures Security

Conference proceedings info: CRITIS 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

  2. Inter-dependency Assessment in the ICT-PS Network: The MIA Project Results

    • Emiliano Casalicchio, Sandro Bologna, Luigi Brasca, Stefano Buschi, Emanuele Ciapessoni, Gregorio D’Agostino et al.
    Pages 1-12
  3. A Quantitative Risk Analysis Approach for Deliberate Threats

    • Nikos Vavoulas, Christos Xenakis
    Pages 13-25
  4. Towards Understanding Recurring Large Scale Power Outages: An Endogenous View of Inter-organizational Effects

    • Finn Olav Sveen, Josune Hernantes, Jose J. Gonzalez, Eliot Rich
    Pages 43-54
  5. Early Warning System for Cascading Effect Control in Energy Control Systems

    • Cristina Alcaraz, Angel Balastegui, Javier Lopez
    Pages 55-66
  6. Anonymity and Privacy in Distributed Early Warning Systems

    • Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, Sascha Todt
    Pages 81-92
  7. A Formal Adversary Capability Model for SCADA Environments

    • Thomas Richard McEvoy, Stephen D. Wolthusen
    Pages 93-103
  8. A Cloud Provider-Agnostic Secure Storage Protocol

    • Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis
    Pages 104-115
  9. State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor

    • Igor Nai Fovino, Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, Alberto Trombetta
    Pages 116-127
  10. A Formally Verified Mechanism for Countering SPIT

    • Yannis Soupionis, Stylianos Basagiannis, Panagiotis Katsaros, Dimitris Gritzalis
    Pages 128-139
  11. Trust and Reputation for Information Exchange in Critical Infrastructures

    • Filipe Caldeira, Edmundo Monteiro, Paulo Simões
    Pages 140-152
  12. A Modelling Approach for Interdependency in Digital Systems-of-Systems Security - Extended Abstract

    • Adedayo Adetoye, Sadie Creese, Michael Goldsmith, Paul Hopkins
    Pages 153-156
  13. Back Matter

Other Volumes

  1. Critical Information Infrastructures Security

About this book

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access