Abstract
In the past, users from High-vulnerability Information Handling Organisations (HIHO) used exclusively HIHO private communication networks and own satellite resources in order to share and transport sensitive information. The very last years, the ability for the HIHO network users to exploit the advantages of the Low-vulnerability Information Handling Organisations (LIHO) — value added networks, led to the need for augmentation of the HIHO networks. This is a very common practice to most of shipping companies. This paper outlines the security profile for the interconnected HIHO and LIHO open distributed systems and networks. It also examines the basic system aspects and suggests a preliminary strategy for achieving a system oriented risk assessment framework.
Similar content being viewed by others
References
Adleman, L. (1990) Abstract Theory of Computer Viruses, in Hoffman L. (Ed.), Rogue Programmes: Viruses Worms Trojan Horses, Van Nostrand Rhienholt, 307–323.
Feige, U. and Fiat, A. and Shamir, A. (1988) Zero-Knowledge Proofs of Identity, Journal of Cryptology, 1(2), 77–94.
Goscinski, A. (1992) Distributed Operating Systems: The Logical Design, Addison-Wesley Publishing Company.
Gritzalis, D. and Katsikas, S. and Gritzalis, S. (1992) A zero knowledge probabilistic login protocol, Computers & Security, Vol. 11(2), 149–161.
Gritzalis, D. and Katsikas, S. (1995) Towards a formal system-to-system authentication protocol, Computer Communications
Doumas, A. and Mavroudakis, K. and Gritzalis, D. and Katsikas, S. (1995) Design of a neural network for computer viruses recognition and classification, Computers & Security, Vol. 14(5), 435–448.
Kephart, J. and White, S. (1991) Directed-graph epidemiological models of computer viruses, in Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, 343–359.
McDonald, J. (1994) Public Network Integrity — Avoiding a Crisis in Trust, IEEE Journal on Selected Areas in Communication.
Muftic, S. and Patel, A. and Sanders, P. and Colon, R. and Heijnsdijk, J. and Pulkkinen, U. (1993) Security Architecture for Open Distributed Systems, Wiley Series in Communication and Distributed Systems.
Zied, A.M. and Farserotu, J. and Kern, P. (1994) Augmented Military network with Public ISDN and SATCOM services, AFCEA 1994 European Conference.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Nikitakos, N., Gritzalis, S. Risk management for new information technology insertion in a shipping company. Oper Res Int J 1, 7–16 (2001). https://doi.org/10.1007/BF02936396
Issue Date:
DOI: https://doi.org/10.1007/BF02936396