[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Castrucci et al., 2012 - Google Patents

Design and implementation of a mediation system enabling secure communication among Critical Infrastructures

Castrucci et al., 2012

View PDF
Document ID
2335624537068973599
Author
Castrucci M
Neri A
Caldeira F
Aubert J
Khadraoui D
Aubigny M
Harpes C
Simões P
Suraci V
Capodieci P
Publication year
Publication venue
International Journal of Critical Infrastructure Protection

External Links

Snippet

Nowadays, the increase of interdependencies among different Critical Infrastructures (CI) makes it more and more difficult to protect without using a systemic approach that considers a single infrastructure as part of a complex system of infrastructures. A strong collaboration …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Pohrmen et al. Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: a survey
US10958662B1 (en) Access proxy platform
Castrucci et al. Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
Misra et al. Securing the internet of things
Liu et al. Cyber security and privacy issues in smart grids
Metke et al. Smart grid security technology
US8327441B2 (en) System and method for application attestation
Yakubu et al. Security challenges in fog-computing environment: a systematic appraisal of current developments
Kalogridis et al. Toward unified security and privacy protection for smart meter networks
Dehalwar et al. Blockchain-based trust management and authentication of devices in smart grid
Li et al. Blockchain-empowered data-driven networks: A survey and outlook
Johnson et al. Cybersecurity for electric vehicle charging infrastructure
Yadav et al. A review of possibilities and solutions of cyber attacks in smart grids
Gil Pérez et al. RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms
Patwary et al. Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
Chowdhury Security in cloud computing
Doelitzscher et al. Sun behind clouds-on automatic cloud security audits and a cloud audit policy language
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Gupta Non-functional requirements elicitation for edge computing
Sukiasyan et al. Secure data exchange in Industrial Internet of Things
Quadar et al. Cybersecurity issues of IoT in ambient intelligence (AmI) environment
Gupta et al. A survey on the security of pervasive online social networks (POSNs)
Monir A Lightweight Attribute-Based Access Control System for IoT.
Ravi et al. Secured energy ecosystems under distributed energy resources penetration
Jena et al. A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment