Author of the publication

Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.

, , , , , and . CRITIS, volume 6983 of Lecture Notes in Computer Science, page 30-41. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504, , , and . RCIS, page 35-44. IEEE, (2008)Who Govern my Responsibilities? SIM: a Methodology to Align Business and IT Policies in the Industrial Field, , , and . Proceedings of the 13 IFAC Symposium on Information Control Problems in Manufacturing, (June 2009)Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics., , , and . ANT/SEIT, volume 109 of Procedia Computer Science, page 943-948. Elsevier, (2017)A Security Decision-Reaction Architecture for Heterogeneous Distributed Network., , and . ARES, page 1-8. IEEE Computer Society, (2010)If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network, , , , and . International Conference on Risks and Security of Internet and Systems (CRiSIS), Tozeur - Tunisia, 28/10/08-31/10/08, http://www.ieee.org/, IEEE, (October 2008)Design and implementation of a mediation system enabling secure communication among Critical Infrastructures., , , , , , , , , and . Int. J. Crit. Infrastructure Prot., 5 (2): 86-97 (2012)Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation., , , and . EuroSPI, volume 364 of Communications in Computer and Information Science, page 13-24. Springer, (2013)IT Security: Risk-Based Prediction Tool and Method for Critical Infrastructures., , and . ERCIM News, (2010)Methodology to Align Business and IT Policies: Use Case from an IT Company, , , , , and . ARES, page 762-767. IEEE Computer Society, (2009)Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures., , , , , and . CRiSIS, page 40-46. IEEE Computer Society, (2011)