Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

MITIGATE - Deliverable D2.2 - Evidence-driven maritime supply chain risk assessment approach

: Polemi, Nineta; Papastergiou, Spyridon; Karantzias, Athanassios; Georgiakodis, Fotios; Patsakis, Constantinos; Ntrigkogias, Christos; Schauer, Stefan; Latzenhofer, Martin; König, Sandra; Göllner, Johannes; Buhl, Reiner; Fiedler, Ralf; Bosse, Claudia; Mouratidis, Haris; Pavlidis, Michalis; Rekleitis, Evangelos

Fulltext urn:nbn:de:0011-n-4323995 (2.2 MByte PDF)
MD5 Fingerprint: a6d7546a4e22b992da0da0a057c063e9
Created on: 3.2.2017

Brussels: European Commission, 2016, 133 pp.
European Commission EC
H2020; 653212; MITIGATE
Multidimensional, integrated, risk assessment framework and dynamic, collaborative Risk Managemenet tools for critical information infrastructures
Report, Electronic Publication
Fraunhofer IML ()
MITIGATE; WP2; mathematical instruments; risk models; assurance models; Secure Tropos; AECID; MEDUSA; security management; risk management; Supply Chain; standards; cyber-security; port security; requirements; interdependency graphs; game theory; percolation theory

Deliverable 2.2 reports the outcomes of tasks T2.3 “Specifications of Mathematical Instruments, Risk and Assurance Models” and T2.4 “Evidence-Driven Maritime Supply Chain Risk Assessment (g-MSRA) Specifications” of work package WP2. The document identifies three methodologies and frameworks; viz. Secure Tropos, AECID and MEDUSA, that are deemed relevant to the project and provided input in the formulation of the MITIGATE methodology or can be exploited in the implementation phase of the MITIGATE platform. It also presents a set of standards and guidelines that were indicated as important during the requirements elicitation phase and that the MITIGATE platform will comply with. Furthermore, an overview on existing mathematical tools and frameworks that are relevant to the MITIGATE system is provided; consisting of a short introduction on interdependency graphs and game theory and percolation theory. Finally, the central part of the deliverable contains a detailed description of the MITIGATE methodology; presenting the whole process step by step, along with examples of usage. The methodology description explains the key concepts, notations and definitions and for each step defines the necessary activities and procedures, and the resulted outcome.