Abstract
In order to face risk in critical infrastructures, coordination and communication are fundamental factors. The fragmentation of the management of infrastructures and the delegation of part of the management of risk to private bodies asks for effective electronic communications. These communications should integrate or substitute traditional face to face communications and protocols and should involve all relevant European actors and regulatory bodies. The technology on which these communications are exchanged should contribute to the creation of mutual trust among the involved actors. The design of an effective information exchange system on critical infrastructures is a huge enterprise since the electronic communication technology is apparently still immature in this respect. Consequently, some theoretical work has still to be done and accurate design is needed before proceeding with the engineering phase.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Directive 96/92/EC of the European Parliament and of the Council of 19 December 1996 concerning common rules for the internal market of electricity. Official Journal of the European Union, L 027 (1997)
Gheorghe, A.V., Masera, M., Weijnen, M.P.C., De Vries, L.J.: Critical Infrastructures at Risk. Springer, Dordrecht (2006)
Bazermann, C., Paradis, J. (eds.): Textual Dynamics of the Professions. The University of Wisconsin Press, Madison (1991)
NISCC’s Information Exchanges Example Membership Guidelines (March 16, 2007), http://www.uniras.gov.uk/niscc/docs/re-20040601-00395.pdf
Green Paper on a European Programme for Critical Infrastructure Protection. Official Journal of the European Union, C 576 (2005)
NISCC, Information Exchanges (March 16, 2006), http://www.niscc.gov.uk/niscc/infoEx-en.pdf
Robert III, H.M., Evans, W.J., Honemann, D.H., Balch, T.J.: Robert’s Rules of Order. Perseus Publishing, Cambridge (2000); Original (1915) (November 17, 2006), http://www.robertsrules.org/rror-00.htm
Chatham House Rule, lemma in: Wikipedia, the Free Encyclopedia (June 29, 2007); http://en.wikipedia.org/wiki/Chatham_House_Rule
Centre for the Protection of National Infrastructure (June 29, 2007), http://www.cpni.gov.uk
SEMA home page (June 29, 2007), http://www.krisberedskapsmyndigheten.se/defaultEN____224.aspx
BSI - Bundesamt für Sicherheit in der Informationstechnik (June 29, 2007), http://www.bsi.bund.de/english/index.htm
Skågeby, J., Pargman, D.: File-Sharing Relationships - conflicts of interest in online gift-giving. In: Van Den Besselaar, P., De Michelis, G., Preece, J., Simone, C. (eds.) Communities and Technologies 2005. Springer, Dordrecht (2005)
Meridian Conference Agreement and the Traffic Light Protocol. The Quarterly, NISCC (April 2005) (March 22, 2007), http://www.niscc.gov.uk/niscc/docs/re-20051205-01068.pdf?lang=en
Petri, C.A.: Communication Disciplines. In: Proceedings of the Joint IBM University of Newcastle upon Tyne seminar, pp. 171–183 (1977)
Levinson, S.C.: Pragmatics. Cambridge University Press, Cambridge (1983)
Bradshaw, J.M.: KAoS: An Open Agent Architecture Supporting Reuse, Interoperability and Extensibility (August 24, 2007), ksi.cpsc.ucalgary.ca/KAW/KAW96/bradshaw/KAW.html
Winograd, T., Flores, F.: Understanding Computers and Cognition. Ablex, Norwood (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ferigato, C., Masera, M. (2008). Design of a Platform for Information Exchange on Protection of Critical Infrastructures. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-89173-4_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89095-9
Online ISBN: 978-3-540-89173-4
eBook Packages: Computer ScienceComputer Science (R0)