Skip to main content

Trust and Reputation Management for Critical Infrastructure Protection

  • Conference paper
Global Security, Safety, and Sustainability (ICGS3 2010)

Abstract

Today’s Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clinton, W.J.: Executive order 13010 -critical infrastructure protection. Federal Register 6I(138), 37347 (1996)

    Google Scholar 

  2. Commission, E.: Communication from the commission on a european programme for critical infrastructure protection. COM/2006/0786 final (December 2006)

    Google Scholar 

  3. Simões, P., et al.: An alerting system for interdependent critical infrastructures. In: ECIW 2010 -9th European Conference on Information Warfare and Security (2010)

    Google Scholar 

  4. Micie: Micie -tool for systemic risk analysis and secure mediation of data exchanged across linked ci information infrastructures. FP7-ICT-SEC-2007.1.7 – 225353 – Annex I – “Descrition of Work” (2008)

    Google Scholar 

  5. Irriis project web site (2009), http://www.irriis.org/

  6. Crutial project web site (2008)

    Google Scholar 

  7. Veríssimo, P., et al.: The crutial architecture for critical information infrastructures. In: de Lemos, R., Di Giandomenico, F., Gacek, C., Muccini, H., Vieira, M. (eds.) Architecting Dependable Systems V. LNCS, vol. 5135, pp. 1–27. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Dondossola, G., Garrone, F., Szanto, J., Gennaro, F.: A laboratory testbed for the evaluation of cyber attacks to interacting ict infrastructures of power grid operators. In: SmartGrids for Distribution 2008, IET-CIRED (2008)

    Google Scholar 

  9. Balducelli, C., Pietro, A.D., Lavalle, L., Vicoli, G.: A middleware improved technology (MIT) to mitigate interdependencies between Critical Infrastructures. Springer, Heidelberg (January 2008)

    Google Scholar 

  10. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science (January 2007)

    Google Scholar 

  11. Chen, S., Zhang, Y., Yang, G.: Trust and reputation algorithms for unstructured p2p networks. In: International Symposium on Computer Network and Multimedia Technology, CNMT 2009, pp. 1–4 (2009)

    Google Scholar 

  12. Zahariadis, T., Ladis, E., Leligou, H., Trakadas, P., Tselikis, C., Papadopoulos, K.: Trust models for sensor networks. In: 50th International Symposium on ELMAR 2008, vol. 2, pp. 511–514 (September 2008)

    Google Scholar 

  13. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  14. Capodieci, P., et al.: Improving resilience of interdependent critical infrastructures via an on-line alerting system. In: COMPENG 2010 -Complexity in Engineering (2010)

    Google Scholar 

  15. Caldeira, F., et al.: Secure mediation gateway architecture enabling the communication among critical infrastructures. In: Future Network and Mobile Summit 2010 Conference (2010)

    Google Scholar 

  16. Twidle, K., Dulay, N., Lupu, E., Sloman, M.: Ponder2: A policy system for autonomous pervasive environments. In: Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009, pp. 330–335 (April 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caldeira, F., Monteiro, E., Simões, P. (2010). Trust and Reputation Management for Critical Infrastructure Protection . In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics