In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. © Springer-Verlag Berlin Heidelberg 2008.
The crutial architecture for critical information infrastructures / P. Verissimo; N. Neves; M. Correia; A. Abou El Kalam; Y. Deswarte; A. Bondavalli; and A. Daidone. - STAMPA. - (2008), pp. 1-27. [10.1007/978-3-540-85571-2_1]
The crutial architecture for critical information infrastructures
BONDAVALLI, ANDREA;DAIDONE, ALESSANDRO
2008
Abstract
In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows. © Springer-Verlag Berlin Heidelberg 2008.File | Dimensione | Formato | |
---|---|---|---|
springerA26.pdf
Accesso chiuso
Tipologia:
Versione finale referata (Postprint, Accepted manuscript)
Licenza:
Tutti i diritti riservati
Dimensione
106.86 kB
Formato
Adobe PDF
|
106.86 kB | Adobe PDF | Richiedi una copia |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.