{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:18:17Z","timestamp":1725477497219},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540690832"},{"type":"electronic","value":"9783540690849"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11962977_1","type":"book-chapter","created":{"date-parts":[[2007,1,19]],"date-time":"2007-01-19T00:55:24Z","timestamp":1169168124000},"page":"1-14","source":"Crossref","is-referenced-by-count":9,"title":["CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Ver\u00edssimo","sequence":"first","affiliation":[]},{"given":"Nuno Ferreira","family":"Neves","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"ISO\/IEC Standard 15408, Evaluation Criteria for IT Security, parts 1 to 3 (1999)"},{"key":"1_CR2","unstructured":"President\u2019s Critical Infrastructure\u00a0Protection Board and Office of\u00a0Energy Assurance U.S. Department\u00a0of Energy. 21 Steps to Improve Cyber Security of SCADA Networks. U.S. Department of Energy (2002)"},{"issue":"4","key":"1_CR3","first-page":"223","volume":"1","author":"A. Bondavalli","year":"2004","unstructured":"Bondavalli, A., Chiaradonna, S., Cotroneo, D., Romano, L.: Effective fault treatment for improving the dependability of COTS and legacy-based applications. IEEE Transactions on Parallel and Distributed Systems\u00a01(4), 223\u2013237 (2004)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1_CR4","unstructured":"Byres, E., Karsch, J., Carter, J.: NISCC good practice guide on firewall deployment for SCADA and process control networks. Technical report, NISCC, Revision 1.4 (February 2005)"},{"key":"1_CR5","unstructured":"Cieslewicz, J.: Attacks and accidents: Policy to protect the power grid\u2019s critical computing and communication needs. Senior interdisciplinary honors thesis in international security studies, Stanford University (May 2004)"},{"key":"1_CR6","unstructured":"Dondossola, G., Deconinck, G., Di Giandomenico, F., Donatelli, S., Kaaniche, M., Ver\u00edssimo, P.: Critical utiliy infrastructural resilience. In: International Workshop on Complex Network and Infrastructure Protection (March 2006)"},{"key":"1_CR7","unstructured":"US-Canada Power System Outage\u00a0Task Force. Interim Report: Causes of the August 14th Blackout in the United States and Canada (November 2003)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Geer, D.: Security of critical control systems sparks concern. IEEE Computer, 20\u201323 (January 2006)","DOI":"10.1109\/MC.2006.32"},{"key":"1_CR9","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2006 CSI\/FBI computer crime and security survey. Computer Security Institute (2006)"},{"key":"1_CR10","unstructured":"El Kalam, A.A., Elbaida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e9ge, A., Saurel, C., Trouessin, G.: Organization-based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, pp. 277\u2013288 (2003)"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"5","key":"1_CR12","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2005.847260","volume":"93","author":"H. Li","year":"2005","unstructured":"Li, H., Rosenwald, G.W., Jung, J., Liu, C.: Strategic power infrastructure defense. Proceedings of the IEEE\u00a093(5), 918\u2013933 (2005)","journal-title":"Proceedings of the IEEE"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-30108-0_26","volume-title":"Computer Security \u2013 ESORICS 2004","author":"B. Littlewood","year":"2004","unstructured":"Littlewood, B., Strigini, L.: Redundancy and diversity in security. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 423\u2013438. Springer, Heidelberg (2004)"},{"key":"1_CR14","unstructured":"Luiijf, H., Klaver, M.: The current state of threats. In: e-Security in Europe: Todays Status and The Next Step (October 2004)"},{"issue":"12","key":"1_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2005.1549781","volume":"42","author":"V. Madani","year":"2005","unstructured":"Madani, V., Novosel, D.: Getting a grip on the grid. IEEE Spectrum\u00a042(12), 42\u201347 (2005)","journal-title":"IEEE Spectrum"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Neves, N.F., Antunes, J., Correia, M., Verfssimo, P., Neves, R.: Using attack injection to discover new vulnerabilities. In: Proceedings of the International Conference on Dependable Systems and Networks (June 2006)","DOI":"10.1109\/DSN.2006.72"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Pollet, J.: Developing a solid SCADA security strategy. In: Proceedings of the ISA\/IEEE Sensors for Industry Conference, November 2002, pp. 148\u2013156 (2002)","DOI":"10.1109\/SFICON.2002.1159826"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault\/intrusion-tolerant systems? In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (June 2005)","DOI":"10.1109\/DSN.2005.55"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Sousa, P., Neves, N.F., Ver\u00edssimo, P.: Resilient state machine replication. In: Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing, December 2005, pp. 305\u2013309 (2005)","DOI":"10.1109\/PRDC.2005.55"},{"key":"1_CR20","unstructured":"Stamp, J., Dillinger, J., Young, W., DePoy, J.: Common vulnerabilities in critical infrastructure control systems. Technical report, Sandia National Laboratories (May 2003)"},{"key":"1_CR21","unstructured":"Stouffer, K., Falco, J., Kent, K.: Guide to supervisory control and data acquisition (SCADA) and industrial control systems security. Recommendations of the National Institute of Standards and Technology, Special Publication 800-82, NIST (September 2006) (Initial Public Draft)"},{"key":"1_CR22","unstructured":"Turner, D., Entwisle, S., Friedrichs, O., Ahmad, D., Blackbird, J., Fossi, M., Hanson, D., Gordon, S., Cole, D., Cowlings, D., Morss, D., Bradley, B., Szor, P., Chien, E., Ward, J., Gough, J., Talbot, J.: Symantec Internet security threat report. Trends for January 05\u2013June 05. Symantec, vol.\u00a0VIII (September 2005)"},{"key":"1_CR23","unstructured":"van Eeten, M., Roe, E., Schulman, P., de Bruijne, M.: The enemy within: System complexity and organizational surprises. In: Dunn, M., Mauer, V. (eds.) International CIIP Handbook 2006, vol.\u00a0II, pp. 89\u2013110. Center for Security Studies, ETH Zurich (2006)"},{"key":"1_CR24","unstructured":"Ver\u00edssimo, P.: Lessons learned with NavTech: a framework for reliable large-scale applications. DI\/FCUL TR 02\u201317, Department of Informatics, University of Lisbon (December 2002)"},{"issue":"1","key":"1_CR25","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1122480.1122497","volume":"37","author":"P. Ver\u00edssimo","year":"2006","unstructured":"Ver\u00edssimo, P.: Travelling through wormholes: a new look at distributed systems models. SIGACTN: SIGACT News (ACM Special Interest Group on Automata and Computability Theory)\u00a037(1), 66\u201381 (2006)","journal-title":"SIGACTN: SIGACT News (ACM Special Interest Group on Automata and Computability Theory)"},{"issue":"4","key":"1_CR26","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2006.95","volume":"4","author":"P. Ver\u00edssimo","year":"2006","unstructured":"Ver\u00edssimo, P., Neves, N.F., Cachin, C., Poritz, J., Powell, D., Deswarte, Y., Stroud, R., Welch, I.: Intrusion-tolerant middleware: The road to automatic security. IEEE Security & Privacy\u00a04(4), 54\u201362 (2006)","journal-title":"IEEE Security & Privacy"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Ver\u00edssimo, P., Neves, N.F., Correia, M.: Intrusion-tolerant architectures: Concepts and design. In: Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems, vol.\u00a02677, pp. 3\u201336 (2003)","DOI":"10.1007\/3-540-45177-3_1"},{"key":"1_CR28","unstructured":"Wilson, C.: Terrorist capabilities for cyber-attack. In: Dunn, M., Mauer, V. (eds.) International CIIP Handbook 2006, vol.\u00a0II, pp. 69\u201388. Center for Security Studies, ETH Zurich (2006)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11962977_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:22:26Z","timestamp":1619493746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11962977_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540690832","9783540690849"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11962977_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}