ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Managing Trust in Critical Infrastructure Protection Information Sharing Systems
ISSE 2004 — Securing Electronic Business Processes
◽
10.1007/978-3-322-84984-7_27
◽
2004
◽
pp. 271-280
Author(s):
John T. Sabo
Keyword(s):
Information Sharing
◽
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Protection Information
Download Full-text
Related Documents
Cited By
References
Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection
Information Security Technical Report
◽
10.1016/s1363-4127(02)02006-x
◽
2002
◽
Vol 7
(2)
◽
pp. 50-56
◽
Cited By ~ 4
Author(s):
Adam Rak
Keyword(s):
Information Sharing
◽
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
Download Full-text
Governance Models Preferences for Security Information Sharing: An Institutional Economics Perspective for Critical Infrastructure Protection
Critical Information Infrastructures Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-05849-4_14
◽
2018
◽
pp. 179-190
Author(s):
Alain Mermoud
◽
Marcus Matthias Keupp
◽
Dimitri Percia David
Keyword(s):
Information Sharing
◽
Institutional Economics
◽
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Security Information
◽
Governance Models
Download Full-text
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
2020 12th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon49761.2020.9131721
◽
2020
◽
Author(s):
Livinus Obiora Nweke
◽
Stephen Wolthusen
Keyword(s):
Information Sharing
◽
Critical Infrastructure
◽
Legal Issues
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Cyber Threat
Download Full-text
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection
Critical Information Infrastructures Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-71368-7_13
◽
2017
◽
pp. 150-162
◽
Cited By ~ 1
Author(s):
Alain Mermoud
◽
Marcus Matthias Keupp
◽
Solange Ghernaouti
◽
Dimitri Percia David
Keyword(s):
General Theory
◽
Information Sharing
◽
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Security Information
Download Full-text
Cyber security training for critical infrastructure protection: A literature review
Computer Science Review
◽
10.1016/j.cosrev.2021.100361
◽
2021
◽
Vol 40
◽
pp. 100361
Author(s):
Nabin Chowdhury
◽
Vasileios Gkioulos
Keyword(s):
Literature Review
◽
Cyber Security
◽
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Security Training
Download Full-text
Passive and active training approaches for critical infrastructure protection
International Journal of Disaster Risk Reduction
◽
10.1016/j.ijdrr.2021.102461
◽
2021
◽
pp. 102461
Author(s):
Luisa Franchina
◽
Giulia Inzerilli
◽
Enrico Scatto
◽
Alessandro Calabrese
◽
Andrea Lucariello
◽
...
Keyword(s):
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Active Training
Download Full-text
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Peer-to-Peer Networking and Applications
◽
10.1007/s12083-021-01236-w
◽
2021
◽
Author(s):
Vidyotma Thakur
◽
Gaurav Indra
◽
Nitin Gupta
◽
Pushpita Chatterjee
◽
Omar Said
◽
...
Keyword(s):
Key Agreement
◽
Critical Infrastructure
◽
Privacy Preserving
◽
Critical Infrastructure Protection
◽
Authenticated Key Agreement
◽
Infrastructure Protection
◽
Key Agreement Protocol
Download Full-text
Introduction to the Safecomp 2014 Workshop: Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2014)
Lecture Notes in Computer Science - Computer Safety, Reliability, and Security
◽
10.1007/978-3-319-10557-4_33
◽
2014
◽
pp. 301-303
Author(s):
Silvia Bonomi
◽
Ilaria Matteucci
Keyword(s):
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
Download Full-text
Simulation-Based Analyses for Critical Infrastructure Protection: Identifying Risks by Using Data Farming
Operations Research Proceedings - Operations Research Proceedings 2015
◽
10.1007/978-3-319-42902-1_47
◽
2017
◽
pp. 349-354
Author(s):
Silja Meyer-Nieberg
◽
Martin Zsifkovits
◽
Dominik Hauschild
◽
Stefan Luther
Keyword(s):
Critical Infrastructure
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
◽
Simulation Based
◽
Using Data
Download Full-text
Realizing the promise of public-private partnerships in U.S. critical infrastructure protection
International Journal of Critical Infrastructure Protection
◽
10.1016/j.ijcip.2013.02.002
◽
2013
◽
Vol 6
(1)
◽
pp. 39-50
◽
Cited By ~ 10
Author(s):
Austen D. Givens
◽
Nathan E. Busch
Keyword(s):
Critical Infrastructure
◽
Public Private Partnerships
◽
Critical Infrastructure Protection
◽
Infrastructure Protection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close