In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. © Springer-Verlag Berlin Heidelberg 2008.

The crutial architecture for critical information infrastructures / P. Verissimo; N. Neves; M. Correia; A. Abou El Kalam; Y. Deswarte; A. Bondavalli; and A. Daidone. - STAMPA. - (2008), pp. 1-27. [10.1007/978-3-540-85571-2_1]

The crutial architecture for critical information infrastructures

BONDAVALLI, ANDREA;DAIDONE, ALESSANDRO
2008

Abstract

In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. © Springer-Verlag Berlin Heidelberg 2008.
2008
9783540855705
Architecting Dependable Systems V, volume 5135 of LNCS
1
27
P. Verissimo; N. Neves; M. Correia; A. Abou El Kalam; Y. Deswarte; A. Bondavalli; and A. Daidone
File in questo prodotto:
File Dimensione Formato  
springerA26.pdf

Accesso chiuso

Tipologia: Versione finale referata (Postprint, Accepted manuscript)
Licenza: Tutti i diritti riservati
Dimensione 106.86 kB
Formato Adobe PDF
106.86 kB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/372825
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 19
  • ???jsp.display-item.citation.isi??? ND
social impact