[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Protecting an invaluable and ever-widening infrastructure

Published: 01 June 1998 Publication History
First page of PDF

References

[1]
Critical Foundations. Protecting America's Infrastructures, report of the President's Commission on Critical Infrastructure Protection, Washington, Oct. 1997.
[2]
Executive Order 13010. Critical infrastructure protection. Jul. 15, 1996 and as amended Nov. 13, 1996. This and other PCCIP-related material can be accessed at www.pccip.gov/.
[3]
Greenberg, L.T., Goodman, S.E. and Soo Hoo, K.J. Old Law for a New World? The applicability of international law to information warfare. Center for International Security and Arms Control, Institute for International Studies, Stanford University, Feb. 1997.
[4]
Greenberg, L.T., International and legal issues of infrastructure protection: Is it a small world after all? In K.J. Soo Hoo, et al., Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda. CISAC, IIS, Stanford University, Oct. 1997.
[5]
Kyodo Report. Press release by MITI, Tokyo, Sept. 1, 1997.

Cited By

View all

Index Terms

  1. Protecting an invaluable and ever-widening infrastructure

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Communications of the ACM
      Communications of the ACM  Volume 41, Issue 6
      June 1998
      96 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/276609
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 June 1998
      Published in CACM Volume 41, Issue 6

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)100
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2011)Critical Infrastructure ProtectionICT Ethics and Security in the 21st Century10.4018/978-1-60960-573-5.ch011(214-230)Online publication date: 2011
      • (2006)Changes in MIS research: status and themes from 1989 to 2000International Journal of Information Systems and Change Management10.1504/IJISCM.2006.0082851:1(3-35)Online publication date: 1-Nov-2006
      • (2003)Refereed Is the mouse click mighty enough to bring society to its knees?Computers and Security10.1016/S0167-4048(03)00412-722:4(322-336)Online publication date: 1-May-2003
      • (2001)GlobalGuard: creating the IETF-IDWG Intrusion Alert Protocol (IAP)Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'0110.1109/DISCEX.2001.932189(22-34)Online publication date: 2001

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media