CIPRNet CIP glossary

ABCDEFGHIJKLMNOPQRSTUVWXY Z ?

A

  • ACE
    Adaptive Communication Environment ...
  • AFAP
    As Fast As Possible ...
  • Agent-based simulation
    Simulation that uses software agent technology. ...
  • ALM
    Application-Layer Multicast ...
  • ALMI
    Application-Layer Multicast Infrastructure ...
  • ALSP
    Aggregate Level Simulation Protocol ...
  • API
    Application Programming Interface ...
  • Attack tool
    Tool to design attack trees ...
  • Attack tree
    “Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that.. ...
  • Attribute
    Each component can have at least one attribute. Attributes have a name, a data type and a certain value. ...
  • Attribute value plot
    Attribute value plots are used in online mode and analysis to show the evolution of attribute values over time or to show the relation between different attribute. During analysis the attribute may be from the same or from different simulation runs. ...

B

  • Batch mode
    The batch mode of the simulator is used to run many simulations automat-ically without having to interact with the simulation environment. ...
  • Behaviour
    See User-specified behaviour, System-specified behaviour ...
  • BTP
    Banana Tree Protocol ...

C

  • Cascading effect
    See cascading failure ...
  • Cascading failure
    “A cascading failure occurs when a disruption in one infrastructure causes the failure of a component in a second infrastructure, which subsequently causes a disruption in the second infrastructure.” (source: [Rinaldi2001]) ...
  • CBR
    Constant Bit-Rate ...
  • CC
    Communication Controller ...
  • CE
    Communication Element ...
  • CI
    See critical infrastructure ...
  • CI model
    A CI model is a particular conceptual model for representing and simulating the behaviour of a critical infrastructure. ...
  • CIP
    See critical infrastructure protection ...
  • CIWIN
    Critical Infrastructure Warning and Information Network ...
  • CL
    Communication Layer ...
  • Component
    A (network) component is an object in a ŽCI model e.g. a generator, a pump, a transmission line, a physical transport, a node, a substation. Components have Žattributes and Žuser-specified behaviour. ...
  • Computational model
    See computer simulation ...
  • Computer model
    See computer simulation ...
  • Computer simulation
    A computer simulation, a computer model or a computational model is a computer program, or network of computers, that attempts to simulate an abstract model of a particular system. ...
  • Conceptual model
    A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. ...
  • Connection
    Connections describe links between different components in a CI model. ...
  • consequence
    outcome of an event affecting objectives ...
  • Continuous simulation
    In a continuous Ž(computer) simulation, the system behaviour is repre­sented by differential equations and the simulation consists in solving the equation. ...
  • control
    measure that is modifying risk ...
  • COTS
    Commercial off-the-shelf ...
  • CPN
    Cognitive Packet Network ...
  • Critical Infrastructure
    The European Council Directive 2008/114/EC defines: ‘Critical infrastructure’ (CI) means an asset, system or part thereof located in Member States which is essential for the maintenance of vital societal functions, health, safety, security, economic.. ...
  • Critical Infrastructure Protection
    Critical infrastructure protection (CIP) is the study, design and implemen-tation of measures (pro-action, prevention, preparation, incident response, recovery) aimed to reduce the risk that critical infrastructure fails with serious consequences and.. ...
  • CRM
    Customer Relationship Management ...
  • Cyber dependency
    A cyber dependency exists if its state of an infrastructure depends on information transmitted through the information infrastructure.” (after: Rinaldi, 2001) ...

D

  • DDoS
    Distributed Denial of Service ...
  • Dependency
    Dependency is the relationship between two (critical infrastructure) products or services in which one product or service is required for the generation of the other product or service. ...
  • DES
    Discrete Event Simulation ...
  • DFS
    Depth-First Search ...
  • DIESIS
    Design of an Interoperable European federated Simulation Network for critical Infrastructures ...
  • DIS
    Distributed Interactive Simulation ...
  • Discrete event simulation
    In discrete event simulation, the system-specified behaviour is described as a series of events that must be processed at a discrete point of the simu-lated time and that take a certain amount of real time. ...
  • DOC
    Direct Operating Cost ...
  • DoS
    Denial of Service ...
  • DSS
    Decision Support System ...
  • DVE
    Distributed Virtual Environment ...
  • DVMRP
    Distance Vector Multicast Routing Protocol ...

E

  • e-Infrastructure
    The Research Infrastructures part of the FP7 Capacities Programme supports an innovative way of conducting scientific research (referred to as e-Science) by the creation of a new environment for academic and industrial research in which virtual.. ...
  • e-IRG
    e-Infrastructure Reflection Group http://www.e-irg.org/ The main objective of the eInfrastructure initiative is to support the creation of a framework (political, technological and administrative) for the easy and cost-effective shared use.. ...
  • ECI
    The Council Directive [EU2008a] defines: ‘European critical infrastructure’ or ‘ECI’ means critical infrastructure located in Member States the disruption or destruction of which would have a significant impact on at least two Member.. ...
  • EII
    EISAC Interoperability Infrastructure ...
  • EIII
    EII Interface ...
  • EIIM
    EISAC Interoperability Infrastructure Middleware ...
  • EISAC
    European Infrastructures Simulation and Analysis Centre ...
  • ENISA
    European Network and Information Security Agency ...
  • ERA
    European Research Area http://ec.europa.eu/research/era/index_en.html A political concept and objective of the European Research Framework Programmes (FPs), introduced in the year 2000. A unified area all across Europe shall be.. ...
  • ERI
    European Research Infrastructure [EU2008b]. ...
  • ERNCIP
    European Reference Network for Critical Infrastructure Protection ...
  • ESFRI
    European Strategy Forum on Research Infrastructures A policy making body for Research Infrastructures on a European Level. National Representatives. The role of ESFRI is to support a coherent approach to policy-making on research infrastructures.. ...
  • event
    occurrence or change of a particular set of circumstances ...
  • Event
    An event describes what happens to a component in the CI model if a condition is fulfilled, e.g. the tripping of a transmission line at a certain time. ...
  • Event log
    The event log contains all events which occurred during a simulation run and are considered “important”, e.g. the trip of a line. System-specified behaviour or user-specified behaviour may write to the event log. ...
  • external context
    external environment in which the organization seeks to achieve its objectives ...

F

  • Fault behaviour
    The fault behaviour describes negative effects to an infrastructure, like attacks or faults. ...
  • Fault tree
    Fault trees represent fault sequences of components in which each component is logically decomposed into sub-components (CXX). In a Fault Tree, leaves represent failures of sub-components (fault causes), and the logical.. ...
  • FC
    Federation Controller ...
  • FCM
    Federation Control Module ...
  • Federate
    a) A single simulation model that interoperates with other simulations in a federation. (source: [Rathnam2004]) b) In the DIESIS context, a federate also refers to the aggregate of a simulator and its specific.. ...
  • Federate simulation bridge
    The coupling between the different CI simulators has to be “intelligent” in some way to provide a “bridge” between the different, very heterogeneous simulators. ...
  • Federate(d) simulation
    The parallel execution of a group of simulations wherein information is exchanged between individual simulations at run-time. (source: Rathnam, 2004) ...
  • Federation
    A collection of interoperating federated simulations. (source: Rathnam, 2004). The federation may include additional components like logging tools, a graphical user interface for controlling the federation, visualisa-tion tools and more. ...
  • Federation adapter
    Synonymously used for gateway (reference) and federation simula-tion controller ...
  • Federation control module
    In the DIESIS context, the term “Federation Control Module” refers to the graphical user interface with which the user invokes certain functions, in the federated simulation. Its abbreviation is FCM. ...
  • Federation controller
    In the DIESIS context, the term “Federation Controller,” abbreviated FC, refers to the element described in the communication middleware deliverables D3.2a and D3.2b. ...
  • Federation manager
    In the DIESIS context, the entity that binds several wrappers and exerts some control on the federation is called the “Federation Manager”, abbreviated FM. ...
  • Federation simulation controller
    Synonymously used for gateway (reference) and federation adapter ...
  • FOM
    Federation Object Model ...
  • FONT
    Federation Ontology ...
  • frequency
    number of events or outcomes per defined unit of time ...
  • FTP
    File Transfer Protocol ...
  • Functional dependency
    Two infrastructures are functional dependent when objects in one infrastructure can only function when the objects in the other infrastructure operate properly. Functional dependencies can be uni- or bi-directional (interdependency). ...

G

  • Gateway
    A gateway is a technical interface component that makes a proprietary simulator compatible with the DIESIS schemes for dependency modelling, time synchronisation and simulation.. ...
  • Geographical dependency
    Infrastructures are geographically dependent if a local environmental event can create state changes in all of them. (after: [Rinaldi2001]) E.g. if telecommunication and electrical distribution lines use the same bridge, the destruction.. ...
  • GIS
    Geographical Information System ...
  • GPS
    Global Positioning System ...
  • GUI
    A GUI is a graphical user interface that allows the user to interact with the simulation in an intuitive way. ...

H

  • hazard
    source of potential harm ...
  • HLA
    HLA (High Level Architecture) is an IEEE standard developed by the United States department of defence [HLA00a, HLA00b, HLA00c, HLA03, Kuh99]. It allows the exchange of information among several and heterogeneous simulators during simulation running. ...
  • HMTP
    Host Multicast Tree Protocol ...

I

J

K

L

  • LAMPS
    LAMPS (Language for Agent-based Modelling of Processes and Scenarios) is a general language to describe processes and scenarios. ...
  • LAN
    Local Area Network ...
  • likelihood
    chance of something happening ...
  • Log
    See Event log and simulation log. ...
  • Logical dependency
    Two infrastructures are logically dependent if the state of each depends on the state of the other via a mechanism that is not a physical, cyber, or geographic connection. (after: [Rinaldi2001]) ...

M

  • M&S Interoperability
    Ability of a model or simulation to provide services to and accept services from other models and simulations, and to use the services so exchanged to enable them to operate effectively together. (after: [MSMP; DoDD 5000.59; DSMC 1]) ...
  • MANET
    Military Ad-hoc Networks ...
  • Model
    See conceptual model ...
  • Modelling
    Modelling denotes the action of designing and creating a conceptual model or a computational model or a CI model or a computer simulation. Other synonyms may apply as well. ...
  • MST
    Minimum Spanning Tree ...
  • MTBF
    Mean Time Between Failures ...

N

O

  • OGSA
    Open Grid Services Architecture ...
  • Online mode
    If a simulation is running in online mode, the user can monitor and influence the running simulation, e.g. by changing the values of attributes. ...
  • Ontology
    In both computer science and information science, an ontology is a representation of a set of concepts within a domain and the relationships between those concepts. It is used to reason about the properties.. ...
  • OpenMI
    Open Modelling Interface (OpenMI) is a modelling standard emerged from the domain of water system simulation. ...
  • OS
    Operating System ...
  • OWL
    Web Ontology Language ...

P

Q

R

S

  • Scenario
    A scenario consists of a CI model, the initial states of all components and the scenario behaviour that describes the events that happen within the scenario. ...
  • Scenario behaviour
    The scenario behaviour describes the “normal” events that happen within a scenario (e.g. a consumer changes the amount of electric power that is consumed). The events may be triggered by time or by other conditions defined in the scenario behaviour. ...
  • Simulation
    See computer simulation. ...
  • Simulation log
    The simulation log contains the evolution of the values of all attributes over time. It builds the basis for the analysis of simulation runs. ...
  • Simulation run
    A simulation run is a single execution of a scenario and optional fault behaviour. ...
  • SLA
    Service Level Agreement ...
  • SOA
    Service-Oriented Architecture ...
  • SOAP
    Simple Object Access Protocol ...
  • SOAP-RPC
    SOAP Remote Procedure Call ...
  • Software agent
    A software agent (or autonomous agent or intelligent agent) is a computer program which works toward goals (as opposed to discrete tasks) in a dynamic environment (where change is the norm) on behalf of another.. ...
  • Software agent technology
    The software techniques, frameworks, and tools that are used to design, develop, implement, deploy, and support software agents. (source: http://www.agtivity.com/) ...
  • SONT
    Simulator Ontology ...
  • SPT
    Shortest Path Tree ...
  • SQL
    Structured Query Language ...
  • SSL
    Secure Sockets Layer ...
  • stakeholder
    person or organization that can affect, be affected by, or perceive themselves to be affected by a decision or activity ...
  • SWRL
    Semantic Web Rule Language ...
  • System-specified behaviour
    System-specified behaviour is behaviour of components or scenarios that is either too basic or too complicated to be described as user-specified behaviour and therefore has to be implemented in a programming language by a developer. ...

T

  • TBCP
    Tree Building Control Protocol ...
  • TCM
    TCP Communication Module ...
  • TCP
    Transmission Control Protocol ...
  • TCP/IP
    Transmission Control Protocol/Internet Protocol ...
  • Threat
    Any indication, circumstance, or event with the potential to disrupt or destroy critical infrastructure, or any element thereof (EU, 2006) ...
  • TLS
    Transport Layer Security ...
  • TMM
    Time Management Module ...
  • Topology
    A topology is given by connections between components of a CI model. ...
  • TPoC
    Technical Proof-of-Concept ...
  • TSO
    Timestamp Order ...

U

  • UDM
    UDP Communication Module ...
  • UDP
    User Datagram Protocol ...
  • UML
    Unified Modeling Language ...
  • User-specified behaviour
    User-specified behaviour is behaviour that can be designed and modified by the user using a special language for behaviour definition (LAMPS). User-specified behaviour can invoke other user-specified behaviour or system-specified behaviour. ...

V

  • VN
    Virtual Node ...
  • VNet
    Virtual Network ...
  • vulnerability
    intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence ...

W

  • WAN
    Wide Area Network ...
  • WP
    Work Package ...
  • Wrapper
    In the context of DIESIS, a wrapper refers to a DIESIS interoperability middleware software construct that binds certain links (data, time, control, function links) between federates, as defined in the draft architecture description deliverable D4.1a. ...
  • WSDL
    Web Services Description Language ...

X

Y