Formally Verified On-Line Diagnosis
IEEE Transactions on Software Engineering
Reliable computer systems (3rd ed.): design and evaluation
Reliable computer systems (3rd ed.): design and evaluation
Threshold-Based Mechanisms to Discriminate Transient from Intermittent Faults
IEEE Transactions on Computers
Protection in operating systems
Communications of the ACM
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Optimal Discrimination between Transient and Permanent Faults
HASE '98 The 3rd IEEE International Symposium on High-Assurance Systems Engineering
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Implementation of Threshold-based Diagnostic Mechanisms for COTS-Based Applications
SRDS '02 Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems
Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications
IEEE Transactions on Dependable and Secure Computing
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Intrusion-Tolerant Middleware: The Road to Automatic Security
IEEE Security and Privacy
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters
IEEE Transactions on Dependable and Secure Computing
Trust and reputation management for critical infrastructure protection
International Journal of Electronic Security and Digital Forensics
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Architecting and validating dependable systems: experiences and visions
Architecting dependable systems VII
International Journal of Applied Mathematics and Computer Science - SPECIAL SECTION: Efficient Resource Management for Grid-Enabled Applications
Integrating fault-tolerant techniques into the design of critical systems
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Hi-index | 0.00 |
In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.