{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:22Z","timestamp":1725687142357},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_50","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"567-572","source":"Crossref","is-referenced-by-count":6,"title":["Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case"],"prefix":"10.1007","author":[{"given":"Nineta","family":"Polemi","sequence":"first","affiliation":[]},{"given":"Theodoros","family":"Ntouskas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"AS\/NZS 4360: Risk management standards australia. Strathfield (1999)"},{"key":"50_CR2","unstructured":"Brunner, E., Suter, M.: International CIIP Handbook 2008\/2009: An Inventory of 25 National and 7 International Critical Infrastructure Protection Policies. Center for Security Studies, ETH Zurich, Switzerland (2008)"},{"key":"50_CR3","unstructured":"ENISA: workshop on cyber security aspects in the maritime sector (2011), \n \n http:\/\/www.enisa.europa.eu\/act\/res\/workshops-1\/2011\/cyber-security-aspects-in-the-maritime-sector"},{"key":"50_CR4","unstructured":"ISO\/IEC 27001: Information technology - security techniques - information security management system - requirements (2005), \n \n http:\/\/www.iso.org"},{"key":"50_CR5","unstructured":"ISO\/IEC 27002: Information technology - security techniques - code of practice for information security management (2005), \n \n http:\/\/www.iso.org"},{"key":"50_CR6","unstructured":"ISO\/IEC 27005: Information technology - security techniques - information security risk management (2008), \n \n http:\/\/www.iso.org"},{"key":"50_CR7","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1504\/IJESDF.2009.027667","volume":"2","author":"A. Karantjias","year":"2009","unstructured":"Karantjias, A., Polemi, N.: An innovative platform architecture for complex secure e\/m government services. Int. J. Electronic Security and Digital Forensics (IJESDF)\u00a02, 338\u2013354 (2009)","journal-title":"Int. J. Electronic Security and Digital Forensics (IJESDF)"},{"key":"50_CR8","unstructured":"National Institute for Standards and Technology: Risk management guide for information technology systems. NIST Special Publication 800-30, \n \n http:\/\/csrc.nist.gov\/publications\/PubsSPs.html\n \n \n (accessed October 15, 2011)"},{"key":"50_CR9","unstructured":"North American Reliability Corporation (NERC), \n \n http:\/\/www.nerc.com\n \n \n (accessed December 7, 2011)"},{"key":"50_CR10","volume-title":"7th IEEE International Conference in Global Security, Safety and Sustainability (ICGS3 2011)","author":"T. Ntouskas","year":"2011","unstructured":"Ntouskas, T., Papanikas, D., Polemi, N.: A collaborative system offering security management services for SMEs\/mEs. In: Bashroush, R., et al. (eds.) 7th IEEE International Conference in Global Security, Safety and Sustainability (ICGS3 2011). Springer, Thessaloniki (August 2011) (to appear)"},{"key":"50_CR11","unstructured":"Ntouskas, T., Papanikas, D., Polemi, N.: Trusted collaborative services for the IT security management of SMEs\/mEs. Int. J. Electronic Security and Digital Forensics (IJESDF) (to appear)"},{"key":"50_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-21040-2_23","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"T. Ntouskas","year":"2011","unstructured":"Ntouskas, T., Pentafronimos, G., Papastergiou, S.: STORM - Collaborative Security Management Environment. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 320\u2013335. Springer, Heidelberg (2011)"},{"key":"50_CR13","unstructured":"Ntouskas, T., Kotzanikolaou, P., Polemi, N.: Impact Assessment through Collaborative Asset Modeling: The STORM-RM approach. In: 1st International Symposium & 10th Balkan Conference on Operational Research, Thessaloniki, Greece (to appear)"},{"key":"50_CR14","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/ICIW.2010.62","volume-title":"Proceedings of the Fifth International Conference on the Internet and Web Applications and Services, ICIW 2010","author":"T. Ntouskas","year":"2010","unstructured":"Ntouskas, T., Polemi, N.: A secure, collaborative environment for the security management of port information systems. In: Proceedings of the Fifth International Conference on the Internet and Web Applications and Services, ICIW 2010, pp. 374\u2013379. IEEE Computer Society Digital Library, Barcelona (2010)"},{"key":"50_CR15","unstructured":"Ntouskas, T., Polemi, N.: Collaborative security management services for port information systems. In: International Conference on e-Business, ICE-B 2012, Rome, Italy (submitted, 2012)"},{"key":"50_CR16","unstructured":"Ntouskas, T., Polemi, N.: STORM-RM: A collaborative and multicriteria risk management methodology. Int. J. Multicriteria Decision Making (IJMCDM) (to appear)"},{"key":"50_CR17","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/ICIW.2010.85","volume-title":"Proceedings of the Fifth International Conference on the Internet and Web Applications and Services, ICIW 2010","author":"G. Pentafronimos","year":"2010","unstructured":"Pentafronimos, G., Karantjias, A., Polemi, N.: Odysseus: An advanced, colla-borative and trusted framework for the provision of migration services. In: Proceedings of the Fifth International Conference on the Internet and Web Applications and Services, ICIW 2010, pp. 531\u2013537. IEEE Computer Society Digital Library, Barcelona (2010)"},{"key":"50_CR18","unstructured":"Polemi, N.: Security management of the ports\u2019 information systems. ENISA Personal study (to appear)"},{"key":"50_CR19","unstructured":"S-PORT Deliverable 1.2: State of the art and user requirements in the Port Information and Telecommunication (PIT) Systems Security, \n \n http:\/\/s-port.unipi.gr\/"},{"key":"50_CR20","unstructured":"S-PORT Deliverable 1.4: Port Information and Telecommunication (PIT) Systems Security requirements-A targeted PIT-risk assessment methodology, \n \n http:\/\/s-port.unipi.gr\/"},{"key":"50_CR21","unstructured":"S-PORT Project: A secure, collaborative environment for the security management of Port Information Systems, \n \n http:\/\/s-port.unipi.gr\/"},{"key":"50_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJSSCI.2008.017590","volume":"1","author":"T.L. Saaty","year":"2008","unstructured":"Saaty, T.L.: Decision making with the analytic hierarchy process. Int. J. Service Sciences\u00a01, 83\u201398 (2008)","journal-title":"Int. J. Service Sciences"},{"key":"50_CR23","volume-title":"7th IEEE International Conference in Global Security, Safety and Sustainability (ICGS3 2011)","author":"M. Theoharidou","year":"2011","unstructured":"Theoharidou, M., Kandias, M., Gritzalis, D.: Securing transportation-critical infrastructures: Trends and perspectives. In: Bashroush, R., et al. (eds.) 7th IEEE International Conference in Global Security, Safety and Sustainability (ICGS3 2011). Springer, Thessaloniki (August 2011) (to appear)"},{"key":"50_CR24","unstructured":"Transportation Security Administration: Critical infrastructure and key resources sector-specifc plan as input to the national infrastructure protection plan. Dept. of Homeland Security, USA (2007)"},{"key":"50_CR25","unstructured":"US Dept. of Homeland Security: National Infrastructure Protection Plan (2009), \n \n http:\/\/www.dhs.gov\/\n \n \n (accessed December 2010)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:48Z","timestamp":1620128388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_50","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}