Critical information infrastructures security: third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture Notes in Computer Science
5508 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 396 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642035517 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035750025 | ||
003 | DE-604 | ||
005 | 20091204 | ||
007 | t| | ||
008 | 091001s2009 xx ad|| |||| 10||| eng d | ||
015 | |a 09,N36,0033 |2 dnb | ||
016 | 7 | |a 995947635 |2 DE-101 | |
020 | |a 9783642035517 |c PB. : ca. EUR 66.34 (freier Pr.), ca. sfr 96.50 (freier Pr.) |9 978-3-642-03551-7 | ||
024 | 3 | |a 9783642035517 | |
028 | 5 | 2 | |a 12726011 |
035 | |a (OCoLC)465162294 | ||
035 | |a (DE-599)DNB995947635 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |b C93 I08 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Critical information infrastructures security |b third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers |c Roberto Setola ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XIV, 396 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5508 | |
650 | 4 | |a Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008 | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Rom |2 gnd-content | |
689 | 0 | 0 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Setola, Roberto |e Sonstige |4 oth | |
711 | 2 | |a CRITIS |n 3 |d 2008 |c Rom |j Sonstige |0 (DE-588)16023753-1 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 5508 |w (DE-604)BV000000607 |9 5508 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018610086&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018610086 |
Datensatz im Suchindex
_version_ | 1820875177997631488 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
BLACKOUTS IN POWER TRANSMISSION NETWORKS DUE TO SPATIALLY LOCALIZED LOAD
ANOMALIES 1
CARLA DIONISI, FRANCESCO MARIANT, MARIA CRISTINA RECCHIONI, AND
FRANCESCO ZIRILLI
STABILITY OF A DISTRIBUTED GENERATION NETWORK USING THE KURAMOTO MODELS
14
VINCENZO FIORITI, SILVIA RUZZANTE, ELISA CASTORINI, ELENA MARCHEI, AND
VITTORIO ROSATO
ENABLING SYSTEM OF SYSTEMS ANALYSIS OF CRITICAL INFRASTRUCTURE BEHAVIORS
24
WILLIAM J. TOLONE, E. WRAY JOHNSON, SEOK- WON LEE, WEI-NING XIANG, LYDIA
MARSH, CODY YEAGER, AND JOSH BLACKWELL
INFORMATION MODELLING AND SIMULATION IN LARGE INTERDEPENDENT CRITICAL
INFRASTRUCTURES IN IRRIIS 36
RUEDIGER KLEIN, ERICH ROME, CESAIRE BEYEL, RALF LINNEMANN, WOLF
REINHARDT, AND ANDRIJ USOV
MULTI-LEVEL DEPENDABILITY MODELING OF INTERDEPENDENCIES BETWEEN THE
ELECTRICITY AND INFORMATION INFRASTRUCTURES 48
MARCO BECCUTI, GIULIANA FRANCESCHINIS, MOHAMED KAANICHE, AND KAROMA
KANOUN
INTERDEPENDENCY ANALYSIS IN ELECTRIC POWER SYSTEMS 60
SILVANO CHIARADONNA, FELICITA DI GIANDOMENICO, AND PAOLO LOLLINI
MODELING AND SIMULATION OF COMPLEX INTERDEPENDENT SYSTEMS: A FEDERATED
AGENT-BASED APPROACH 72
EMILIANO CASALICCHIO, EMANUELE GALLI, AND SALVATORE TUCCI
SELF-HEALING AND RESILIENT CRITICAL INFRASTRUCTURES 84
RUNE GUSTAVSSON AND BJOERN STAHL
CRITICAL INFRASTRUCTURES SECURITY MODELING, ENFORCEMENT AND RUNTIME
CHECKING 95
ANAS ABOU EL KALAM AND YVES DESWARTE
INCREASING SECURITY AND PROTECTION THROUGH INFRASTRUCTURE RESILIENCE:
THE INSPIRE PROJECT 109
SALVATORE D'ANTONIO, LUIGI ROMANO, ABDELMAJID KHELIL, AND NEERAJ SURI
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995947635
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
INCREASE OF POWER SYSTEM SURVIVABILITY WITH THE DECISION SUPPORT TOOL
CRIPS BASED ON NETWORK PLANNING AND SIMULATION PROGRAM PSSSINCAL 119
CHRISTINE SCHWAEGERL, OLAF SEIFERT, ROBERT BUSCHMANN, HERMANN DELLWING,
STEFAN GERETSHUBER, AND CLAUS LEICK
INFORMATION MODELLING AND SIMULATION IN LARGE DEPENDENT CRITICAL
INFRASTRUCTURES - AN OVERVIEW ON THE EUROPEAN INTEGRATED PROJECT IRRIIS
131
RUEDIGER KLEIN
ASSESSMENT OF STRUCTURAL VULNERABILITY FOR POWER GRIDS BY NETWORK
PERFORMANCE BASED ON COMPLEX NETWORKS 144
ETTORE BOMPARD, MARCELO MASERA, ROBERTO NAPOLI, AND FEI XUE
USING CENTRALITY MEASURES TO RANK THE IMPORTANCE OF THE COMPONENTS OF A
COMPLEX NETWORK INFRASTRUCTURE 155
FRANCESCO CADINI, ENRICO ZIO, AND CRISTINA-ANDREEA PETRESCU
RADIALNET: AN INTERACTIVE NETWORK TOPOLOGY VISUALIZATION TOOL WITH
VISUAL AUDITING SUPPORT 168
JOAEO P.S. MEDEIROS AND SELAN R. DOS SANTOS
QUANTITATIVE SECURITY RISK ASSESSMENT AND MANAGEMENT FOR RAILWAY
TRANSPORTATION INFRASTRUCTURES 180
FRANCESCO FLAMMINI, ANDREA GAGLIONE, NICOLA MAZZOCCA, AND CONCETTA
PRAGLIOLA
ASSESSING AND IMPROVING SCADA SECURITY IN THE DUTCH DRINKING WATER
SECTOR 190
ERIC LUIIJF, MANOU ALI, AND ANNEMARIE ZIELSTRA
ANALYSIS OF MALICIOUS TRAFFIC IN MODBUS/TCP COMMUNICATIONS 200 TIAGO H.
KOBAYASHI, AGUINALDO B. BATISTA JR., JOAEO PAULO S. MEDEIROS, JOSE MACEDO
F. FILHO, AGOSTINHO M. BRITO JR., AND PAULO S. MOTTA PIRES
SCADA MALWARE, A PROOF OF CONCEPT 211
ANDREA C'ARCANO, IGOR NAI FOVINO, MARCELO MASERA, AND ALBERTO TROMBETTA
TESTBEDS FOR ASSESSING CRITICAL SCENARIOS IN POWER CONTROL SYSTEMS . .
. 223 GIOVANNA DONDOSSOLA, GEERT DECONINCK, FABRIZIO GARRONE, AND HAKEM
BEITOLLAHI
A STRUCTURED APPROACH TO INCIDENT RESPONSE MANAGEMENT IN THE OIL AND GAS
INDUSTRY 235
MARIA B. LINE, EIRIK ALBRECHTSEN, MARTIN GILJE JAATUN, INGER ANNE
T0NDEL, STIG OLE JOHNSEN, ODD HELGE LONGVA, AND IRENE WEER0
IMAGE 3
TABLE OF CONTENTS XIII
SECURITY STRATEGY ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURES 247
JOSE MANUEL TORRES, FINN OLAV SVEEN, AND JOSE MARIA SARRIEGI
EMERGING INFORMATION INFRASTRUCTURES: COOPERATION IN DISASTERS 258
MIKAEL ASPLUND, SIMIN NADJM-TEHRANI, AND JOHAN SIGHOLM
SERVICE MODELING LANGUAGE APPLIED TO CRITICAL INFRASTRUCTURE 271
GIANMARCO BALDINI AND IGOR NAI FOVINO
GRADED SECURITY EXPERT SYSTEM 279
JURI KIVIMAA, ANDRES OJAMAA, AND ENN TYUGU
PROTECTION OF MOBILE AGENTS EXECUTION USING A MODIFIED SELF-VALIDATING
BRANCH-BASED SOFTWARE WATERMARKING WITH EXTERNAL SENTINEL 287 JOAN
TOMAS-BULIART, MARCEL FERNANDEZ, AND MIGUEL SORIANO
ADAPTATION OF MODELLING PARADIGMS TO THE CIS INTERDEPENDENCIES PROBLEM
295
JOSE M. SARRIEGI, FINN OLAV SVEEN, JOSE M. TORRES, AND JOSE J. GONZALEZ
EMPIRICAL FINDINGS ON CRITICAL INFRASTRUCTURE DEPENDENCIES IN EUROPE 302
ERIC LUIIJF, ALBERT NIEUWENHUIJS, MARIEKE KLAVER, MICHEL VAN EETEN, AND
EDITE CRUZ
DEPENDENT AUTOMATA FOR THE MODELLING OF DEPENDENCIES 311
SUSANNA DONATELLI
APPLICATION OF IPK (INFORMATION, PREFERENCES, KNOWLEDGE) PARADIGM FOR
THE MODELLING OF PRECAUTIONARY PRINCIPLE BASED DECISION-MAKING. 319
ADAM MARIA GADOMSKI AND TOMASZ ADAM ZIMNY
DISASTER PROPAGATION IN HETEROGENEOUS MEDIA VIA MARKOVIAN AGENTS . .
328 DAVIDE CEROTTI, MARCO GRIBAUDO, AND ANDREA BOBBIO
A STUDY ON MULTIFORMALISM MODELING OF CRITICAL INFRASTRUCTURES 336
FRANCESCO FLAMMINI, VALERIA VITTORINI, NICOLA MAZZOCCA, AND CONCETTA
PRAGLIOLA
SIMULATION OF CRITICAL ICT INFRASTRUCTURE FOR MUNICIPAL CRISIS
MANAGEMENT 344
ADAM KOZAKIE-WICZ, ANNA FELKNER, AND TOMASZ JORDAN KRUK
AN ONTOLOGY-BASED APPROACH TO BUND SPOT REVELATION IN CRITICAL
INFRASTRUCTURE PROTECTION PLANNING 352
JOSHUA BLACKWELL, WILLIAM J. TOLONE, SEOK-WON LEE, WEI-NING XIANG, AND
LYDIA MARSH
IMAGE 4
XIV TABLE OF CONTENTS
SECURITY OF WATER INFRASTRUCTURE SYSTEMS 360
DEMETRIOS G. ELIADES AND MARIOS M. POLYCARPOU
CRITICAL INFRASTRUCTURES AS COMPLEX SYSTEMS: A MULTI-LEVEL PROTECTION
ARCHITECTURE 368
PIERLUIGI ASSOGNA, GLAUCO BERLOCCHI, ANTONIO DICARLO, FRANCO MILICCHIO,
ALBERTO PAOLUZZI, GIORGIO SCORZELLI, MICHELE VICENTINO, AND ROBERTO
ZOLLO
CHALLENGES CONCERNING THE ENERGY-DEPENDENCY OF THE TELECOM
INFRASTRUCTURE 376
LOTHAR FICKERT, HELMUT MALLECK, AND CHRISTIAN WAKOLBINGER
AN EFFECTIVE APPROACH FOR CASCADING EFFECTS PREVISION IN CRITICAL
INFRASTRUCTURES 386
LUISA FRANCHINA, MARCO CARBONELLI, LAURA GRATTA, CLAUDIO PETRICCA, AND
DANIELE PERUCCHINI
AUTHOR INDEX 395 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035750025 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 465f |
ctrlnum | (OCoLC)465162294 (DE-599)DNB995947635 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035750025</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091204</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">091001s2009 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N36,0033</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995947635</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642035517</subfield><subfield code="c">PB. : ca. EUR 66.34 (freier Pr.), ca. sfr 96.50 (freier Pr.)</subfield><subfield code="9">978-3-642-03551-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642035517</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12726011</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)465162294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995947635</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="b">C93 I08</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical information infrastructures security</subfield><subfield code="b">third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers</subfield><subfield code="c">Roberto Setola ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 396 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5508</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Rom</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Setola, Roberto</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CRITIS</subfield><subfield code="n">3</subfield><subfield code="d">2008</subfield><subfield code="c">Rom</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16023753-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5508</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5508</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018610086&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018610086</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Rom gnd-content |
genre_facet | Konferenzschrift 2008 Rom |
id | DE-604.BV035750025 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:27Z |
institution | BVB |
institution_GND | (DE-588)16023753-1 |
isbn | 9783642035517 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018610086 |
oclc_num | 465162294 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIV, 396 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers Roberto Setola ... (eds.) Berlin [u.a.] Springer 2009 XIV, 396 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5508 Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008 Computer security Congresses Computers Access control Congresses Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Rom gnd-content Kritische Informationsinfrastruktur (DE-588)7636254-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Risikoanalyse (DE-588)4137042-9 s DE-604 Setola, Roberto Sonstige oth CRITIS 3 2008 Rom Sonstige (DE-588)16023753-1 oth Lecture Notes in Computer Science 5508 (DE-604)BV000000607 5508 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018610086&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers Lecture Notes in Computer Science Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008 Computer security Congresses Computers Access control Congresses Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Risikoanalyse (DE-588)4137042-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4137042-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers |
title_auth | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers |
title_exact_search | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers |
title_full | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers Roberto Setola ... (eds.) |
title_fullStr | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers Roberto Setola ... (eds.) |
title_full_unstemmed | Critical information infrastructures security third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers Roberto Setola ... (eds.) |
title_short | Critical information infrastructures security |
title_sort | critical information infrastructures security third international workshop critis 2008 rome italy october 13 15 2008 revised papers |
title_sub | third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 ; revised papers |
topic | Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008 Computer security Congresses Computers Access control Congresses Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Risikoanalyse (DE-588)4137042-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur - Computersicherheit - Datensicherung - Kryptoanalyse - Risikoanalyse - Kongress 2008 Computer security Congresses Computers Access control Congresses Kritische Informationsinfrastruktur Datensicherung Risikoanalyse Kryptoanalyse Computersicherheit Konferenzschrift 2008 Rom |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018610086&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT setolaroberto criticalinformationinfrastructuressecuritythirdinternationalworkshopcritis2008romeitalyoctober13152008revisedpapers AT critisrom criticalinformationinfrastructuressecuritythirdinternationalworkshopcritis2008romeitalyoctober13152008revisedpapers |