首页 > 最新文献

2009 Fourth International Conference on Critical Infrastructures最新文献

英文 中文
Using UML to model dependencies in systems of systems 使用UML对系统的系统中的依赖关系进行建模
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071492
O. S. Ligaarden
During the last years, mutual dependencies have been apparent in several incidents in critical infrastructures. This has lead to increased focus on the protection of critical infrastructures. One challenge in protecting critical infrastructures is to understand the impact that mutual dependencies have on the overall risk level. In order to do such an analysis, we first need to be able to model dependencies in critical infrastructures. Several inter-connected critical infrastructures make up a system of systems. In our current work in the DIGIT project we are evaluating whether UML and SysML can be suitable candidates for modeling dependencies in systems of systems. In this paper we will present some preliminary results of the use of UML to model dependencies in systems of systems.
在过去几年中,在关键基础设施的几起事件中,明显存在相互依赖性。这导致人们更加重视保护关键基础设施。保护关键基础设施的一个挑战是理解相互依赖对总体风险水平的影响。为了进行这样的分析,我们首先需要能够对关键基础设施中的依赖关系进行建模。几个相互连接的关键基础设施组成了一个系统的系统。在DIGIT项目的当前工作中,我们正在评估UML和SysML是否适合用于系统的系统中的依赖关系建模。在本文中,我们将展示一些使用UML对系统的系统中的依赖关系建模的初步结果。
{"title":"Using UML to model dependencies in systems of systems","authors":"O. S. Ligaarden","doi":"10.1109/CRIS.2009.5071492","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071492","url":null,"abstract":"During the last years, mutual dependencies have been apparent in several incidents in critical infrastructures. This has lead to increased focus on the protection of critical infrastructures. One challenge in protecting critical infrastructures is to understand the impact that mutual dependencies have on the overall risk level. In order to do such an analysis, we first need to be able to model dependencies in critical infrastructures. Several inter-connected critical infrastructures make up a system of systems. In our current work in the DIGIT project we are evaluating whether UML and SysML can be suitable candidates for modeling dependencies in systems of systems. In this paper we will present some preliminary results of the use of UML to model dependencies in systems of systems.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126312740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing systemic information infrastructure malfunction 分析系统信息基础设施故障
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071491
P. Mellstrand, Björn Ståhl
Critical infrastructure information systems are complex, open, connected and heterogeneous computer network systems and - as the name implies - play an important role for some critical infrastructure. These systems occasionally fail and the need arises to explain what happened and assert that whatever it was it will not happen again. In this abstract we describe ongoing work towards an approach for analyzing hard-to-explain behavior in software-intensive systems. This approach is based on input both from the critical infrastructure community and from diagnosing very large deeply embedded systems - two kinds of systems that share several relevant properties in regard to diagnosing malfunction.
关键基础设施信息系统是复杂、开放、互联和异构的计算机网络系统,顾名思义,它在某些关键基础设施中起着重要作用。这些系统偶尔会出现故障,就需要解释发生了什么,并断言无论发生了什么,都不会再发生。在这篇摘要中,我们描述了一种分析软件密集型系统中难以解释的行为的方法。该方法基于来自关键基础设施社区和诊断非常大的深度嵌入式系统的输入—这两种系统在诊断故障方面共享几个相关属性。
{"title":"Analyzing systemic information infrastructure malfunction","authors":"P. Mellstrand, Björn Ståhl","doi":"10.1109/CRIS.2009.5071491","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071491","url":null,"abstract":"Critical infrastructure information systems are complex, open, connected and heterogeneous computer network systems and - as the name implies - play an important role for some critical infrastructure. These systems occasionally fail and the need arises to explain what happened and assert that whatever it was it will not happen again. In this abstract we describe ongoing work towards an approach for analyzing hard-to-explain behavior in software-intensive systems. This approach is based on input both from the critical infrastructure community and from diagnosing very large deeply embedded systems - two kinds of systems that share several relevant properties in regard to diagnosing malfunction.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The EU integrated project IRRIIS on CI dependencies an overview 欧盟综合项目IRRIIS对CI依赖关系的概述
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071495
R. Klein
Infrastructures like power grids and telecommunication networks are key elements of modern societies. These infrastructures are “critical” since failures, attacks or accidents at these infrastructures can severely influence the proper function of the economy, public administration and security services. Critical infrastructures have become increasingly complex and (inter)dependent. As a consequence faults might lead to cascading and escalating effects among heterogeneous infrastructures from energy supply to telecommunication, financial sector, transportation, health and public administration.
电网和电信网络等基础设施是现代社会的关键要素。这些基础设施是“关键的”,因为这些基础设施的故障、攻击或事故会严重影响经济、公共行政和安全服务的正常运作。关键基础设施变得越来越复杂和相互依赖。因此,故障可能导致从能源供应到电信、金融部门、运输、卫生和公共行政等异构基础设施之间的连锁和逐步升级的影响。
{"title":"The EU integrated project IRRIIS on CI dependencies an overview","authors":"R. Klein","doi":"10.1109/CRIS.2009.5071495","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071495","url":null,"abstract":"Infrastructures like power grids and telecommunication networks are key elements of modern societies. These infrastructures are “critical” since failures, attacks or accidents at these infrastructures can severely influence the proper function of the economy, public administration and security services. Critical infrastructures have become increasingly complex and (inter)dependent. As a consequence faults might lead to cascading and escalating effects among heterogeneous infrastructures from energy supply to telecommunication, financial sector, transportation, health and public administration.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"1484 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123367798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Steps towards a Clean-Slate secure Internet infrastructure 迈向全新安全互联网基础设施的步骤
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071497
M. Koyabe, F. El-Moussa
Despite the current Internets critical importance, portions of its architecture are still vulnerable to attacks ranging from malicious software exploits to denial-of-service (DoS). Most of these attacks and vulnerabilities experienced on the Internet today are due to the fact that the Internet architecture and its supporting protocols was primarily designed for a benign and trustworthy environment, with little or no consideration for security issues. This however is no longer the case with todays Internet, which interconnects millions of heterogeneous hosts that span the entire globe.
尽管当前互联网至关重要,但其体系结构的某些部分仍然容易受到从恶意软件利用到拒绝服务(DoS)的攻击。今天在Internet上遇到的大多数攻击和漏洞都是由于Internet体系结构及其支持协议主要是为良性和可信赖的环境而设计的,很少或根本没有考虑安全问题。然而,今天的互联网不再是这种情况,它连接了跨越全球的数百万异构主机。
{"title":"Steps towards a Clean-Slate secure Internet infrastructure","authors":"M. Koyabe, F. El-Moussa","doi":"10.1109/CRIS.2009.5071497","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071497","url":null,"abstract":"Despite the current Internets critical importance, portions of its architecture are still vulnerable to attacks ranging from malicious software exploits to denial-of-service (DoS). Most of these attacks and vulnerabilities experienced on the Internet today are due to the fact that the Internet architecture and its supporting protocols was primarily designed for a benign and trustworthy environment, with little or no consideration for security issues. This however is no longer the case with todays Internet, which interconnects millions of heterogeneous hosts that span the entire globe.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy informatics for co-evolving socio-technical networks 共同发展的社会技术网络的政策信息学
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071486
M. Marathe, C. Barrett, S. Eubank
We summarize our ongoing integrated program to represent and reason about very large co-evolving social, technological, information and organization (STIO) networks. The program comprises of four basic elements: (i) a mathematical and computational theory of co-evolving STIO networks, (ii) methods for integrating diverse data sources to generate synthetic representations of STIO networks, (iii) high performance computing oriented models for simulating the dynamical phenomenon of interest on these networks, and (iv) an integrated high performance oriented pervasive cyber-environment that provides analysts and decision makers a web-based environment that provides seamless access to the models and synthetic networks for policy planning and response. We will illustrate some of these ideas by discussing the development of information-support environments for supporting the study of epidemics in social as well as wireless networks.
我们总结了我们正在进行的集成程序,以表示和推理非常大的共同发展的社会,技术,信息和组织(STIO)网络。该方案包括四个基本要素:(i)共同进化的STIO网络的数学和计算理论,(ii)整合不同数据源以生成STIO网络的综合表示的方法,(iii)用于模拟这些网络上感兴趣的动态现象的高性能计算导向模型,(iv)一个集成的高性能面向普及的网络环境,为分析人员和决策者提供一个基于网络的环境,为政策规划和响应提供对模型和综合网络的无缝访问。我们将通过讨论支持在社会和无线网络中研究流行病的信息支持环境的发展来说明其中的一些想法。
{"title":"Policy informatics for co-evolving socio-technical networks","authors":"M. Marathe, C. Barrett, S. Eubank","doi":"10.1109/CRIS.2009.5071486","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071486","url":null,"abstract":"We summarize our ongoing integrated program to represent and reason about very large co-evolving social, technological, information and organization (STIO) networks. The program comprises of four basic elements: (i) a mathematical and computational theory of co-evolving STIO networks, (ii) methods for integrating diverse data sources to generate synthetic representations of STIO networks, (iii) high performance computing oriented models for simulating the dynamical phenomenon of interest on these networks, and (iv) an integrated high performance oriented pervasive cyber-environment that provides analysts and decision makers a web-based environment that provides seamless access to the models and synthetic networks for policy planning and response. We will illustrate some of these ideas by discussing the development of information-support environments for supporting the study of epidemics in social as well as wireless networks.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart metering for the future energy systems in the Netherlands 荷兰未来能源系统的智能计量
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071484
L. AlAbdulkarim, Z. Lukszo
Over the past few years there has been a keen interest in smart metering across countries of the European Union. This has been strongly motivated by the EU Energy Efficiency Directive, which among other things aims to minimize the environmental impacts of energy generation and to meet the commitments made on climate change under the Kyoto Protocol. However, the system implementation choices and the roll-out process vary among those countries that have already embarked on the implementation of the system. In this paper we present an overview of the smart metering system implementation in the Netherlands, to conclude about possible lessen learnt applicable for different countries coping with transition problems in the energy sector changing from a traditional hierarchical governance structure into a future system with various different distributed generation sources.
在过去的几年里,欧盟各国对智能电表产生了浓厚的兴趣。欧盟能源效率指令(EU Energy Efficiency Directive)大力推动了这一举措,该指令旨在最大限度地减少能源生产对环境的影响,并履行《京都议定书》(Kyoto Protocol)对气候变化做出的承诺。但是,在已经开始实施该制度的国家中,系统实施的选择和推广过程各不相同。在本文中,我们概述了智能计量系统在荷兰的实施,以总结可能的学习适用于不同国家应对能源部门从传统的分层治理结构转变为具有各种不同分布式发电源的未来系统的过渡问题。
{"title":"Smart metering for the future energy systems in the Netherlands","authors":"L. AlAbdulkarim, Z. Lukszo","doi":"10.1109/CRIS.2009.5071484","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071484","url":null,"abstract":"Over the past few years there has been a keen interest in smart metering across countries of the European Union. This has been strongly motivated by the EU Energy Efficiency Directive, which among other things aims to minimize the environmental impacts of energy generation and to meet the commitments made on climate change under the Kyoto Protocol. However, the system implementation choices and the roll-out process vary among those countries that have already embarked on the implementation of the system. In this paper we present an overview of the smart metering system implementation in the Netherlands, to conclude about possible lessen learnt applicable for different countries coping with transition problems in the energy sector changing from a traditional hierarchical governance structure into a future system with various different distributed generation sources.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Thinking about denial of service in Internet protocols 考虑互联网协议中的拒绝服务
Pub Date : 2009-06-12 DOI: 10.1109/CRIS.2009.5071490
T. Aura
Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.
许多重要的服务已经依赖于互联网作为通信媒介。这突出了互联网对拒绝服务攻击的脆弱性。虽然TPC/IP协议栈从未打算提供有保证的服务质量,但许多漏洞都是简单的事故,使DoS攻击者很容易达到他们的目标。在这次演讲中,我建议抵抗dos正在成为所有网络协议的关键要求,并主要从移动协议的设计中提取示例。
{"title":"Thinking about denial of service in Internet protocols","authors":"T. Aura","doi":"10.1109/CRIS.2009.5071490","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071490","url":null,"abstract":"Many critical services have become dependent on the Internet as a communication medium. This has highlighted the vulnerability of the Internet to denial-of-service attacks. While the TPC/IP protocol stack was never intended to provide guaranteed quality of service, many of the vulnerabilities are simple accidents and make it unnecessarily easy for DoS attackers to reach their goals. In this talk, I suggest that DoS-resistance is becoming a key requirement for all network protocols and draw examples mostly from the design of mobility protocols.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is secure telephony possible or even desirable? 安全电话是可能的,甚至是可取的吗?
Pub Date : 2009-04-01 DOI: 10.1109/CRIS.2009.5071489
V. Prevelakis
Telephony as implemented today is not secure. We know that wiretaps (both legal and illegal) are widely used all over the world with ease and impunity. This is due to the fact that the vast majority of voice communications are in the clear.
今天实现的电话并不安全。我们知道,窃听(合法的和非法的)在世界各地被广泛使用,而且不受惩罚。这是因为绝大多数语音通信都是清晰的。
{"title":"Is secure telephony possible or even desirable?","authors":"V. Prevelakis","doi":"10.1109/CRIS.2009.5071489","DOIUrl":"https://doi.org/10.1109/CRIS.2009.5071489","url":null,"abstract":"Telephony as implemented today is not secure. We know that wiretaps (both legal and illegal) are widely used all over the world with ease and impunity. This is due to the fact that the vast majority of voice communications are in the clear.","PeriodicalId":175538,"journal":{"name":"2009 Fourth International Conference on Critical Infrastructures","volume":"30 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fourth International Conference on Critical Infrastructures
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1