Risk management standards australia, Strathfield, vol.4360, 1999. ,
International CIIP Handbook, An Inventory of 25 National and 7 International Critical Infrastructure Protection Policies. Center for Security Studies, 2008. ,
An innovative platform architecture for complex secure e/m-governmental services, International Journal of Electronic Security and Digital Forensics, vol.2, issue.4, pp.338-354, 2009. ,
DOI : 10.1504/IJESDF.2009.027667
Risk management guide for information technology systems. NIST Special Publication 800-30, available at: http://csrc, North American Reliability Corporation (NERC, vol.9, 2011. ,
A Collaborative System Offering Security Management Services for SMEs/mEs, 7th IEEE International Conference in Global Security, Safety and Sustainability, pp.3-2011 ,
DOI : 10.1007/978-3-642-33448-1_30
Trusted collaborative services for the IT security management of SMEs/mEs, International Journal of Electronic Security and Digital Forensics, vol.4, issue.2/3 ,
DOI : 10.1504/IJESDF.2012.048413
STORM - Collaborative Security Management Environment, LNCS, vol.6633, pp.320-335, 2011. ,
DOI : 10.1007/978-3-642-21040-2_23
Impact Assessment Through Collaborative Asset Modeling: The STORM-RM Approach, 1st International Symposium & 10th Balkan Conference on Operational Research ,
DOI : 10.1007/978-1-4614-5134-1_21
S-PORT: "A Secure, Collaborative Environment for the Security Management of Port Information Systems", 2010 Fifth International Conference on Internet and Web Applications and Services, pp.374-379, 2010. ,
DOI : 10.1109/ICIW.2010.62
Collaborative security management services for port information systems, International Conference on e-Business, ICE-B 2012 ,
STORM-RM: a collaborative and multicriteria risk management methodology, International Journal of Multicriteria Decision Making, vol.2, issue.2 ,
DOI : 10.1504/IJMCDM.2012.046941
ODYSSEUS: An Advanced, Collaborative and Trusted Framework for the Provision of Migration Services, 2010 Fifth International Conference on Internet and Web Applications and Services, pp.531-537, 2010. ,
DOI : 10.1109/ICIW.2010.85
Security management of the ports' information systems, ENISA Personal study ,
State of the art and user requirements in the Port Information and Telecommunication (PIT) Systems Security ,
4: Port Information and Telecommunication (PIT) Systems Security requirements-A targeted PIT-risk assessment methodology ,
A secure, collaborative environment for the security management of Port Information Systems ,
Decision making with the analytic hierarchy process, International Journal of Services Sciences, vol.1, issue.1, pp.83-98, 2008. ,
DOI : 10.1504/IJSSCI.2008.017590
Securing Transportation-Critical Infrastructures: Trends and Perspectives, 7th IEEE International Conference in Global Security, Safety and Sustainability, pp.3-2011, 2011. ,
DOI : 10.1007/978-3-642-33448-1_24
of Homeland Security: National Infrastructure Protection Plan, 2009. ,