Skip to main content
Log in

Risk management for new information technology insertion in a shipping company

  • Published:
Operational Research Aims and scope Submit manuscript

Abstract

In the past, users from High-vulnerability Information Handling Organisations (HIHO) used exclusively HIHO private communication networks and own satellite resources in order to share and transport sensitive information. The very last years, the ability for the HIHO network users to exploit the advantages of the Low-vulnerability Information Handling Organisations (LIHO) — value added networks, led to the need for augmentation of the HIHO networks. This is a very common practice to most of shipping companies. This paper outlines the security profile for the interconnected HIHO and LIHO open distributed systems and networks. It also examines the basic system aspects and suggests a preliminary strategy for achieving a system oriented risk assessment framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Adleman, L. (1990) Abstract Theory of Computer Viruses, in Hoffman L. (Ed.), Rogue Programmes: Viruses Worms Trojan Horses, Van Nostrand Rhienholt, 307–323.

  • Feige, U. and Fiat, A. and Shamir, A. (1988) Zero-Knowledge Proofs of Identity, Journal of Cryptology, 1(2), 77–94.

    Article  Google Scholar 

  • Goscinski, A. (1992) Distributed Operating Systems: The Logical Design, Addison-Wesley Publishing Company.

  • Gritzalis, D. and Katsikas, S. and Gritzalis, S. (1992) A zero knowledge probabilistic login protocol, Computers & Security, Vol. 11(2), 149–161.

    Article  Google Scholar 

  • Gritzalis, D. and Katsikas, S. (1995) Towards a formal system-to-system authentication protocol, Computer Communications

  • Doumas, A. and Mavroudakis, K. and Gritzalis, D. and Katsikas, S. (1995) Design of a neural network for computer viruses recognition and classification, Computers & Security, Vol. 14(5), 435–448.

    Article  Google Scholar 

  • Kephart, J. and White, S. (1991) Directed-graph epidemiological models of computer viruses, in Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, 343–359.

  • McDonald, J. (1994) Public Network Integrity — Avoiding a Crisis in Trust, IEEE Journal on Selected Areas in Communication.

  • Muftic, S. and Patel, A. and Sanders, P. and Colon, R. and Heijnsdijk, J. and Pulkkinen, U. (1993) Security Architecture for Open Distributed Systems, Wiley Series in Communication and Distributed Systems.

  • Zied, A.M. and Farserotu, J. and Kern, P. (1994) Augmented Military network with Public ISDN and SATCOM services, AFCEA 1994 European Conference.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nikitakos, N., Gritzalis, S. Risk management for new information technology insertion in a shipping company. Oper Res Int J 1, 7–16 (2001). https://doi.org/10.1007/BF02936396

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02936396

Keywords

Navigation