2008
DOI: 10.1007/978-3-540-85571-2_1
|View full text |Cite
|
Sign up to set email alerts
|

The CRUTIAL Architecture for Critical Information Infrastructures

Abstract: Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 20 publications
0
10
0
1
Order By: Relevance
“…Research within the DIRC project and its successor InDeED (Sommerville et al, 2007) raised the need to tackle dependability throughout the lifecycle of a system, including its interactions with humans. CRUTIAL (Verissimo et al, 2008) used a Petri net and state modelling to understand the operation, behaviour and failure modes of the CI in systems of systems arrangements. The IRRIIS project (Balducelli et al, 2008) is also improving CI dependability through middleware improved technology and simulation in synthetic environments.…”
Section: Related Workmentioning
confidence: 99%
“…Research within the DIRC project and its successor InDeED (Sommerville et al, 2007) raised the need to tackle dependability throughout the lifecycle of a system, including its interactions with humans. CRUTIAL (Verissimo et al, 2008) used a Petri net and state modelling to understand the operation, behaviour and failure modes of the CI in systems of systems arrangements. The IRRIIS project (Balducelli et al, 2008) is also improving CI dependability through middleware improved technology and simulation in synthetic environments.…”
Section: Related Workmentioning
confidence: 99%
“…There exists a limit in the number of processes created by the firewall. Currently, the kind of critical information systems exposed to attacks are of much interest in literature (e.g., MAFTIA [1], CRUTIAL [23] or SITAR [24]). However, consider that we do not pretend to model intricacies of these kind of systems but only to exemplify the use of the Resilience package.…”
Section: Examplementioning
confidence: 99%
“…For example, fault-tolerance techniques aim to maintain system availability even in the presence of faults. Lately such techniques are being investigated [23] to maintain availability also in the presence of malicious attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Research in project DIRC and its successor InDeED [1] raised the need to tackle dependability throughout the lifecycle of a system, including its interactions with humans. CRUTIAL [2] used Petri net and state modelling to understand the operation, behaviour and failure modes of CI in systems of systems arrangements. The IRRIIS project [3] is also improving CI dependability through Middleware Improved Technology and simulation in synthetic environments.…”
Section: Related Workmentioning
confidence: 99%