Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings /
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13-15, 2007. The workshop was organized by the St. Petersburg Institute for Info...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Communications in Computer and Information Science,
1 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Papers
- Surreptitious Software: Models from Biology and History
- Characterizing Software Self-healing Systems
- Assumptions: The Trojan Horses of Secure Protocols
- Smart Cards and Digital Security
- Virus Throttle as Basis for ProActive Defense
- Technologies for Protection Against Insider Attacks on Computer Systems
- Authentication, Authorization and Access Control
- Access Control and Declassification
- Reasoning About Delegation and Account Access in Retail Payment Systems
- Performance Evaluation of Keyless Authentication Based on Noisy Channel
- Avoiding Key Redistribution in Key Assignment Schemes
- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching
- Class of Provably Secure Information Authentication Systems
- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems
- Language-Based Security, Trust Management and Covert Channels
- Synthesis of Non-interferent Distributed Systems
- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
- Covert Channel Invisibility Theorem
- Security Verification and Evaluation
- Policy-Based Proactive Monitoring of Security Policy Performance
- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric
- Abstraction Based Verification of a Parameterised Policy Controlled System
- Algebraic Models to Detect and Solve Policy Conflicts
- Event Calcululus Based Checking of Filtering Policies
- A New Approach to Security Evaluation of Operating Systems
- Intrusion Detection and Prevention
- Multi-agent Peer-to-Peer Intrusion Detection
- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures
- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response
- Mathematical Models of Intrusion Detection by an Intelligent Immunochip
- A Novel Intrusion Detection System for a Local Computer Network
- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework
- Host-Based Intrusion Detection System: Model and Design Features
- Network Survivability and Privacy
- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics
- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks
- Anycast Communication-A New Approach to Survivability of Connection-Oriented Networks
- Privacy Preserving Context Transfer in All-IP Networks
- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols
- Watermarking
- A Spatial Watermarking Algorithm for Video Images
- Watermarking Software to Signal Copy Protection.