Today's critical communication technologies (ICTs) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This work addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the policy-based management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the scope of the European FP7 MICIE project, to allow information exchan...
Critical infrastructure (CI) services are constantly consumed by the society and are expected to be ...
The goal of policy-based security management is to enable military personnel to specify security req...
Security in information and communication technology currently relies on a collection of mostly un-r...
Today’s Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to ...
http://cmuportugal.org/tiercontent.aspx?id=2940Critical infrastructure (CI) services are consumed by...
Today’s Critical Infrastructures (CI) are highly interdependent in order to deliver their services w...
Representing one of the most technological dependencies of contemporary societies, Critical Infrastr...
Nowadays, the increase of interdependencies among different Critical Infrastructures (CI) makes it m...
Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several s...
Critical Infrastructures (CIs) such as power distribution are referred to as “Critical” as, in case ...
Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming i...
Currently, there is an increasing tendency to migrate the management of communications and informati...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
International audienceAlthough trust is recognized as important in security issues of computer netwo...
Trust establishment is an important problem which often arises everyday. We need to assess the trust...
Critical infrastructure (CI) services are constantly consumed by the society and are expected to be ...
The goal of policy-based security management is to enable military personnel to specify security req...
Security in information and communication technology currently relies on a collection of mostly un-r...
Today’s Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to ...
http://cmuportugal.org/tiercontent.aspx?id=2940Critical infrastructure (CI) services are consumed by...
Today’s Critical Infrastructures (CI) are highly interdependent in order to deliver their services w...
Representing one of the most technological dependencies of contemporary societies, Critical Infrastr...
Nowadays, the increase of interdependencies among different Critical Infrastructures (CI) makes it m...
Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several s...
Critical Infrastructures (CIs) such as power distribution are referred to as “Critical” as, in case ...
Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs) are becoming i...
Currently, there is an increasing tendency to migrate the management of communications and informati...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
International audienceAlthough trust is recognized as important in security issues of computer netwo...
Trust establishment is an important problem which often arises everyday. We need to assess the trust...
Critical infrastructure (CI) services are constantly consumed by the society and are expected to be ...
The goal of policy-based security management is to enable military personnel to specify security req...
Security in information and communication technology currently relies on a collection of mostly un-r...