Cargando…

Computer Network Security Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings /

This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13-15, 2007. The workshop was organized by the St. Petersburg Institute for Info...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gorodetsky, Vladimir (Editor ), Kotenko, Igor (Editor ), Skormin, Victor A. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Communications in Computer and Information Science, 1
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Papers
  • Surreptitious Software: Models from Biology and History
  • Characterizing Software Self-healing Systems
  • Assumptions: The Trojan Horses of Secure Protocols
  • Smart Cards and Digital Security
  • Virus Throttle as Basis for ProActive Defense
  • Technologies for Protection Against Insider Attacks on Computer Systems
  • Authentication, Authorization and Access Control
  • Access Control and Declassification
  • Reasoning About Delegation and Account Access in Retail Payment Systems
  • Performance Evaluation of Keyless Authentication Based on Noisy Channel
  • Avoiding Key Redistribution in Key Assignment Schemes
  • Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching
  • Class of Provably Secure Information Authentication Systems
  • A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems
  • Language-Based Security, Trust Management and Covert Channels
  • Synthesis of Non-interferent Distributed Systems
  • Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
  • Covert Channel Invisibility Theorem
  • Security Verification and Evaluation
  • Policy-Based Proactive Monitoring of Security Policy Performance
  • Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric
  • Abstraction Based Verification of a Parameterised Policy Controlled System
  • Algebraic Models to Detect and Solve Policy Conflicts
  • Event Calcululus Based Checking of Filtering Policies
  • A New Approach to Security Evaluation of Operating Systems
  • Intrusion Detection and Prevention
  • Multi-agent Peer-to-Peer Intrusion Detection
  • An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures
  • Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response
  • Mathematical Models of Intrusion Detection by an Intelligent Immunochip
  • A Novel Intrusion Detection System for a Local Computer Network
  • Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework
  • Host-Based Intrusion Detection System: Model and Design Features
  • Network Survivability and Privacy
  • Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics
  • Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks
  • Anycast Communication-A New Approach to Survivability of Connection-Oriented Networks
  • Privacy Preserving Context Transfer in All-IP Networks
  • Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols
  • Watermarking
  • A Spatial Watermarking Algorithm for Video Images
  • Watermarking Software to Signal Copy Protection.