Nothing Special   »   [go: up one dir, main page]

Skip to main content

MASSIF: A Promising Solution to Enhance Olympic Games IT Security

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

Nowadays, Olympic Games have become one of the most profitable global media events, becoming at the same way more and more attractive target from the terrorist perspective due to their media diffusion and international dimension. Critical for the success of such a highly visible event is protecting and securing the business and the supporting cyber infrastructure enabling it. In this context, the MASSIF project aims to provide a new generation SIEM framework for service infrastructures supporting intelligent, scalable, and multi-level/multi-domain security event processing and predictive security monitoring.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. McRoskey, S.R.: Security and the Olympic Games Making Rio an Example. Yale Journal of International Affairs (2010)

    Google Scholar 

  2. Turmo, J., Ageno, A., Catala, N.: Adaptive Information Extraction. ACM Computing Surveys 38(2) (2006)

    Google Scholar 

  3. Campanile, F., Cilardo, A., Coppolino, L., Romano, L.: Adaptable Parsing of Real-Time Data Streams. In: Proc. of The Fifteen Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2007), Naples, Italy, February 7-9, pp. 412–418. IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  4. Gulisano, V., Jimenez-Peris, R., Patiño-Martínez, M., Valduriez, P.: A Large Scale Data Streaming System. In: 30th IEEE Int. Conf. on Distributed Systems (ICDCS), Genoa, Italy (2010)

    Google Scholar 

  5. Cynthia, A.P., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: NSPW 1998, Proceedings of the 1998 Workshop on New Security Paradigms, pp. 71–79. ACM Press (1998)

    Google Scholar 

  6. Rieke, R.: Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures. International Journal of System of Systems Engineering (IJSSE) 1, 59–77 (2008)

    Article  Google Scholar 

  7. Kotenko, I., Stepashkin, M., Doynikova, E.: Security Analysis of Computer-aided Systems taking into account Social Engineering Attacks. In: 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011), Ayia Napa, Cyprus (2011)

    Google Scholar 

  8. Fuchs, A., Rieke, R.: Identification of Security Requirements in Systems of Systems by Functional Security Analysis. In: Casimiro, A., de Lemos, R., Gacek, C. (eds.) Architecting Dependable Systems VII. LNCS, vol. 6420, pp. 74–96. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Rieke, R., Stoynova, Z.: Predictive Security Analysis for Event-Driven Processes. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 321–328. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Cuppens-Boulahia, N., Cuppens, F., Lopez, J., Vasquez, E., Guerra, J., Debar, H.: An ontology-based approach to react to network attacks. International Journal of Information and Computer Security 3, 280–305 (2009)

    Article  Google Scholar 

  11. Kuntze, N., Rudolph, C.: Secure digital chains of evidence. In: Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) 2011, Oakland, USA (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Prieto, E., Diaz, R., Romano, L., Rieke, R., Achemlal, M. (2012). MASSIF: A Promising Solution to Enhance Olympic Games IT Security. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics