Abstract is missing.
- CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure ArchitecturePaulo Veríssimo, Nuno Ferreira Neves, Miguel Correia. 1-14 [doi]
- Experiment Based Validation of CIIPPer Mellstrand, Rune Gustavsson. 15-29 [doi]
- Security Requirements Model for Grid Data Management SystemsSyed Naqvi, Philippe Massonet, Alvaro Arenas. 30-41 [doi]
- Assessing the Risk of an Information Infrastructure Through Security DependenciesFabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli. 42-54 [doi]
- Modelling Risk and Identifying Countermeasure in OrganizationsYudistira Asnar, Paolo Giorgini. 55-66 [doi]
- Modelling and Analysing Network Security Policies in a Given Vulnerability SettingRoland Rieke. 67-78 [doi]
- A Framework for Conceptualizing Social Engineering AttacksJose J. Gonzalez, Jose Maria Sarriegi, Alazne Gurrutxaga. 79-90 [doi]
- An Overview of R&D Activities in Europe on Critical Information Infrastructure Protection (CIIP)Sandro Bologna, Giovanni Di Costanzo, Eric A. M. Luiijf, Roberto Setola. 91-102 [doi]
- Intelligent Network-Based Early Warning SystemsKarsten Bsufka, Olaf Kroll-Peters, Sahin Albayrak. 103-111 [doi]
- Can an Early Warning System for Home Users and SMEs Make a Difference? A Field StudyUrs E. Gattiker. 112-127 [doi]
- Protection of Components Based on a Smart-Card Enhanced Security ModuleJoaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell. 128-139 [doi]
- Revisiting Colored Networks and Privacy Preserving CensorshipYvo Desmedt, Yongge Wang, Mike Burmester. 140-150 [doi]
- PROSEARCH: A Protocol to Simplify Path Discovery in Critical ScenariosCristina Satizábal, Rafael Páez, Jordi Forné. 151-165 [doi]
- Applying Key Infrastructures for Sensor Networks in CIP/CIIP ScenariosCristina Alcaraz, Rodrigo Roman. 166-178 [doi]
- Trust Establishment in Ad Hoc and Sensor NetworksEfthimia Aivaloglou, Stefanos Gritzalis, Charalabos Skianis. 179-194 [doi]
- Enforcing Trust in Pervasive Computing with Trusted Computing TechnologyShiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen. 195-209 [doi]
- Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection SystemsMaría Bermúdez-Edo, R. Salazar-Hernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 210-221 [doi]
- High-Speed Intrusion Detection in Support of Critical Infrastructure ProtectionSalvatore D Antonio, Francesco Oliviero, Roberto Setola. 222-234 [doi]
- Rational Choice of Security Measures Via Multi-parameter Attack TreesAhto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera, Jan Willemson. 235-248 [doi]
- Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)Daniel J. Martínez-Manzano, Gabriel López Millán, Antonio F. Gómez-Skarmeta. 249-261 [doi]
- Vulnerabilities and Possible Attacks Against the GPRS Backbone NetworkChristos Xenakis, Lazaros F. Merakos. 262-272 [doi]
- A Framework for Secure and Verifiable Logging in Public Communication NetworksVassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos. 273-284 [doi]