The CRUTIAL architecture for critical information infrastructures (Articolo in rivista)

Type
Label
  • The CRUTIAL architecture for critical information infrastructures (Articolo in rivista) (literal)
Anno
  • 2008-01-01T00:00:00+01:00 (literal)
Alternative label
  • Verissimo P.; Neves N.; Correia M.; Deswarte Y.; El Kalam A. A.; Bondavalli A.; Daidone A. (2008)
    The CRUTIAL architecture for critical information infrastructures
    in Lecture notes in computer science
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Verissimo P.; Neves N.; Correia M.; Deswarte Y.; El Kalam A. A.; Bondavalli A.; Daidone A. (literal)
Pagina inizio
  • 1 (literal)
Pagina fine
  • 27 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 5135 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • In: Architecting Dependable Systems V. pp. 1 - 27. Rogerio de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marlon Vieira (eds.). (Lecture Notes in Computer Science, vol. 5135). Germany: Springer, 2008. (literal)
Note
  • ISI Web of Science (WOS) (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • University of Lisbon, LAAS-CNRS, University of Toulouse, CNR-ISTI, Pisa - Dipartimento di Sistemi e Informatica, Università di Firenze (literal)
Titolo
  • The CRUTIAL architecture for critical information infrastructures (literal)
Abstract
  • In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Insieme di parole chiave di
data.CNR.it