Catálogo de publicaciones - libros

Compartir en
redes sociales


Critical Information Infrastructured Security: First International Workshop, CRITIS 2006, Samos Island, Greece, August 31: September 1, 2006. Revised Papers

Javier Lopez (eds.)

En conferencia: 1º International Workshop on Critical Information Infrastructures Security (CRITIS) . Samos, Greece . August 31, 2006 - September 1, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Systems and Data Security; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Computers and Society

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-69083-2

ISBN electrónico

978-3-540-69084-9

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Vulnerabilities and Possible Attacks Against the GPRS Backbone Network

Christos Xenakis; Lazaros Merakos

This paper presents the security weaknesses and the possible attacks, which threaten the GPRS backbone network and the data that either reside at the network or are transferred through it. These attacks may be performed by malicious third parties, mobile users, network operators or network operator personnel, which exploit the weaknesses of the employed technology and the security measures applied to the GPRS backbone. The possible attacks against the GPRS backbone may result in the compromise of end-users security, the users over billing, the disclosure or alteration of critical information, the services unavailability, the network breakdown, etc. The analyzed attacks and their consequences increase the risks associated with the usage of GPRS, and, thus, influence its deployment that realizes the concept of the mobile Internet.

Pp. 262-272

A Framework for Secure and Verifiable Logging in Public Communication Networks

Vassilios Stathopoulos; Panayiotis Kotzanikolaou; Emmanouil Magkos

In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are more resilient to the identified security threats. A key role to the proposed framework is given to an independent Regulatory Authority, which is responsible to verify the integrity of the log files.

Pp. 273-284