dc.contributor.author | Jaatun, Martin Gilje | |
dc.contributor.author | Sæle, Hanne | |
dc.date.accessioned | 2024-04-26T13:38:06Z | |
dc.date.available | 2024-04-26T13:38:06Z | |
dc.date.created | 2023-11-29T17:21:46Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark. 2024, 235-249. | en_US |
dc.identifier.isbn | 978-981-99-6974-6 | |
dc.identifier.issn | 2213-8684 | |
dc.identifier.uri | https://hdl.handle.net/11250/3128256 | |
dc.description.abstract | Critical infrastructure applications do not emerge fully formed, but generally rely on components and services from third-party vendors. This paper presents a brief survey on good practice for security requirements to be put on vendors delivering products and services to power distribution system operators and other critical infrastructure operators. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | Cyber Science 2023 - Proceedings of the International Conference on Cybersecurity, Cyber Situational Awareness and Social Media | |
dc.relation.uri | https://jaatun.no/papers/2023/A_Checklist_for_Supply_Chain_Security.pdf | |
dc.title | A Checklist for Supply Chain Security for Critical Infrastructure Operators | en_US |
dc.type | Chapter | en_US |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | © 2024 The authors/SINTEF | en_US |
dc.source.pagenumber | 235-249 | en_US |
dc.source.journal | Springer Proceedings in Complexity | en_US |
dc.source.issue | 1 | en_US |
dc.identifier.doi | 10.1007/978-981-99-6974-6_14 | |
dc.identifier.cristin | 2205612 | |
dc.relation.project | Norges forskningsråd: 257626 | en_US |
dc.relation.project | Norges forskningsråd: 310105 | en_US |
cristin.ispublished | false | |
cristin.fulltext | postprint | |