Preface |
|
xiii | |
1 The New Vision of the Homeland Security Scenario |
|
1 | (42) |
|
1.1 Unveiling the New Scenario |
|
|
1 | (5) |
|
1.1.1 Tokyo Chemical Sarin Attack |
|
|
2 | (1) |
|
1.1.2 Murrach Federal Building Attack |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
1.1.5 Penetration of the U.S. Electric Grid |
|
|
4 | (1) |
|
1.1.6 Vandals Cut Phones and Internet Cables |
|
|
5 | (1) |
|
1.1.7 Stuxnet Computer Worm |
|
|
5 | (1) |
|
1.2 The New Rules and Operational Avenues |
|
|
6 | (3) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Appendix 1A Team for Research in Ubiquitous Secure Technologies (TRUST) |
|
|
11 | (24) |
|
|
11 | (1) |
|
|
12 | (5) |
|
1A.3 TRUST Research in Secure Financial Infrastructures |
|
|
17 | (4) |
|
1A.4 TRUST Research in Secure Health Infrastructures |
|
|
21 | (4) |
|
1A.5 TRUST Research in Secure Physical Infrastructures |
|
|
25 | (3) |
|
1A.6 Shared Experimental Facilities |
|
|
28 | (6) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (8) |
2 Homeland Security and National Defense in the Twenty-First Century |
|
43 | (14) |
|
2.1 The New World Scenario |
|
|
43 | (2) |
|
2.2 National Defense-Homeland Protection |
|
|
45 | (1) |
|
2.3 Network-Enabled Capability |
|
|
45 | (3) |
|
2.4 Net-Centric Warfare Doctrine and Technological Challenges |
|
|
48 | (3) |
|
2.5 The NEC Implementation in an Archetypal Nation: Italy |
|
|
51 | (3) |
|
|
54 | (1) |
|
|
55 | (2) |
3 Homeland Security and Challenges in Information Systems |
|
57 | (28) |
|
3.1 ICT and Society, ICT and Control Systems, and the Blurring from Both |
|
|
57 | (10) |
|
|
58 | (1) |
|
3.1.2 Critical Infrastructure and ICT |
|
|
58 | (3) |
|
3.1.3 Critical Infrastructure and Control Systems |
|
|
61 | (2) |
|
|
63 | (1) |
|
3.1.5 Blurring Borders of ICT, General, and Mobile Infrastructure |
|
|
64 | (1) |
|
3.1.6 Globalization and Virtualization |
|
|
65 | (1) |
|
3.1.7 Need for Actions on the Policy Side: C(I)IP on the International and European Level |
|
|
65 | (2) |
|
3.2 The Information Security Challenge: E-Banking as an Example |
|
|
67 | (4) |
|
3.2.1 The Challenge to Secure General-Purpose Computers for E-Banking |
|
|
67 | (2) |
|
3.2.2 Countermeasures Against E-Banking Fraud |
|
|
69 | (2) |
|
3.3 Analysis of Research Needs in Critical Financial Infrastructure: Parsifal |
|
|
71 | (5) |
|
|
72 | (4) |
|
3.4 Introducing Information Sharing: Key Challenges |
|
|
76 | (3) |
|
3.5 The Dilemma of Security-Privacy |
|
|
79 | (3) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (2) |
4 Analysis of Emerging Phenomena in Large Complex Systems |
|
85 | (34) |
|
|
85 | (1) |
|
4.2 The Challenge of Complex Systems |
|
|
86 | (1) |
|
4.3 The New Approach of System Engineering |
|
|
87 | (3) |
|
|
90 | (24) |
|
4.4.1 The Traffic Congestion Phenomenon in Internet-Like Networks |
|
|
91 | (9) |
|
4.4.2 Domino Effect in a Large High-Voltage Electric Distribution Grid |
|
|
100 | (5) |
|
4.4.3 Interdependence Analysis in Large Critical Infrastructures |
|
|
105 | (9) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (4) |
5 Model-Based Design of Trustworthy Health Information Systems |
|
119 | (16) |
|
|
119 | (3) |
|
5.2 Patient-Centered Clinical Information Management Processes |
|
|
122 | (3) |
|
|
123 | (1) |
|
5.2.2 Patient Management Systems |
|
|
124 | (1) |
|
5.3 Policy Languages and Policy Composition |
|
|
125 | (1) |
|
5.4 Ethical and Legal Analysis |
|
|
126 | (2) |
|
|
128 | (2) |
|
5.6 Model-Based Experiment Integration |
|
|
130 | (1) |
|
5.7 Closing the Loop: Patient-Centered Health Information Management Evaluation |
|
|
130 | (1) |
|
|
131 | (4) |
6 Urban Defense Using Mobile Sensor Platforms: Surveillance, Protection, and Privacy |
|
135 | (38) |
|
|
135 | (7) |
|
|
135 | (1) |
|
6.1.2 Video Camera Surveillance |
|
|
136 | (4) |
|
6.1.3 Fixed Video Camera Limitations and Emergence of Mobile Sensing |
|
|
140 | (2) |
|
6.2 MobEyes: Video Surveillance from Vehicular Platforms |
|
|
142 | (6) |
|
6.2.1 Vehicular Sensor Networks |
|
|
142 | (2) |
|
|
144 | (2) |
|
6.2.3 MobEyes Architecture |
|
|
146 | (2) |
|
6.3 MobEyes Urban Surveillance Examples |
|
|
148 | (6) |
|
6.3.1 The Westwood Scenario |
|
|
148 | (1) |
|
|
149 | (3) |
|
6.3.3 Tracking Suspects Using MobEyes |
|
|
152 | (2) |
|
6.4 Secure, Selective Surveillance in Vehicular Networks |
|
|
154 | (9) |
|
|
154 | (1) |
|
6.4.2 New Security Requirements for Urban Surveillance |
|
|
155 | (1) |
|
6.4.3 Attribute-Based Encryption: A Primer |
|
|
156 | (2) |
|
6.4.4 DABE: The Better Choice in Dynamic Environments |
|
|
158 | (2) |
|
6.4.5 Benefits of Dynamic Attribute-Based Encryption |
|
|
160 | (2) |
|
6.4.6 DABE in Homeland Defense Applications |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (3) |
|
Appendix 6A The C-VeT Testbed |
|
|
167 | (6) |
|
6A.1 The C-VeT Architecture |
|
|
167 | (3) |
|
|
170 | (3) |
7 Detection and identification of Dangerous Materials for Airport Security |
|
173 | (28) |
|
7.1 The Airport Transport Security Problem |
|
|
173 | (3) |
|
7.2 Standard Security Solutions and Issues |
|
|
176 | (4) |
|
7.3 Innovative Approach to Security |
|
|
180 | (4) |
|
7.4 Sensors for a Distributed Dangerous Object Detection/Classification System |
|
|
184 | (4) |
|
7.5 Indoor/Outdoor Noncooperative People Tracking |
|
|
188 | (5) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (3) |
|
Appendix 7A List of Airport Security Measure Failures with Worst Consequences |
|
|
197 | (4) |
8 Privacy Versus Security: A Fight That May Turn into an Alliance |
|
201 | (16) |
|
|
201 | (2) |
|
8.2 Privacy and Security and Safety: Their Definition and Correlation |
|
|
203 | (2) |
|
8.3 The Paradigm of Integrated Security and Safety Management |
|
|
205 | (2) |
|
8.4 The New Interpretation on the Security Role |
|
|
207 | (2) |
|
8.5 The Regulatory Framework and the Open Model of Assurance |
|
|
209 | (2) |
|
8.6 The New Model: The Archetypal Approach |
|
|
211 | (4) |
|
|
215 | (1) |
|
|
215 | (2) |
9 Privacy-Aware Design for the Monitoring, Control, and Protection of Critical Infrastructure |
|
217 | (20) |
|
|
217 | (1) |
|
9.2 Sensor Networking Technologies for Infrastructure Protection |
|
|
218 | (2) |
|
9.3 Example Application Development: SCADA |
|
|
220 | (4) |
|
9.4 Privacy: Definitions and the Law |
|
|
224 | (3) |
|
9.5 Privacy Issue: The Market for Information |
|
|
227 | (1) |
|
9.6 Protecting Privacy: Privacy-Aware Design |
|
|
228 | (3) |
|
9.6.1 Provide Full Disclosure of Data Collection |
|
|
228 | (1) |
|
9.6.2 Require Consent to Data Collection |
|
|
229 | (1) |
|
9.6.3 Minimize the Collection of Personal Data |
|
|
230 | (1) |
|
9.6.4 Minimize the Identification of Data with Individuals |
|
|
230 | (1) |
|
9.6.5 Minimize and Secure Data Retention |
|
|
230 | (1) |
|
9.7 Privacy Problems and Advanced Sensing System: Demand Response Case Study |
|
|
231 | (4) |
|
9.7.1 Power Consumption Data Creates a Privacy Issue |
|
|
231 | (2) |
|
9.7.2 A Privacy-Aware Demand Response System |
|
|
233 | (2) |
|
|
235 | (1) |
|
|
235 | (2) |
10 Military Defense, Civil Defense, and Civil Protection Integration in a Multiscenario Crisis Event |
|
237 | (20) |
|
|
237 | (3) |
|
|
238 | (1) |
|
10.1.2 Prospects and Problems |
|
|
239 | (1) |
|
10.2 Italian National Protection System |
|
|
240 | (4) |
|
|
240 | (1) |
|
10.2.2 Planning Scenarios |
|
|
240 | (1) |
|
|
240 | (1) |
|
10.2.4 National Emergency Management System |
|
|
241 | (3) |
|
10.2.5 Recovery and Consequence Management |
|
|
244 | (1) |
|
|
244 | (2) |
|
10.4 Summit G8 Security Planning |
|
|
246 | (8) |
|
|
248 | (1) |
|
10.4.2 Planning and Organization |
|
|
249 | (3) |
|
10.4.3 Command and Control Security System |
|
|
252 | (1) |
|
10.4.4 Coordination Table |
|
|
252 | (1) |
|
10.4.5 Joint Operation Room |
|
|
252 | (1) |
|
10.4.6 Technical Management Center |
|
|
253 | (1) |
|
10.4.7 The Armed Forces Operation Room |
|
|
254 | (1) |
|
10.4.8 The International Operation Room |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (2) |
11 Repel Boarders! |
|
257 | (16) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
11.4 Prepare to Repel Boarders! |
|
|
261 | (1) |
|
11.5 Modern Solutions for the Antipiracy Issue |
|
|
262 | (2) |
|
|
262 | (1) |
|
|
262 | (2) |
|
11.6 A Recently Implemented Antipiracy System |
|
|
264 | (6) |
|
11.6.1 The Medusa EO System |
|
|
264 | (3) |
|
11.6.2 The Video Surveillance Unit |
|
|
267 | (1) |
|
11.6.3 The LYRA Surveillance Radar |
|
|
268 | (1) |
|
11.6.4 The Multifunctional Console |
|
|
269 | (1) |
|
11.7 The Validating Experiment |
|
|
270 | (1) |
|
|
271 | (2) |
About the Authors |
|
273 | (8) |
Index |
|
281 | |