Cargando…

Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings /

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Kotenko, Igor (Editor ), Skormin, Victor (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Computer Communication Networks and Telecommunications, 7531
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Finding Malware on a Web Scale.
  • Exposing Security Risks for Commercial Mobile Devices
  • From Qualitative to Quantitative Enforcement of Security Policy
  • Design and Implementation of a Cloud-Based Assured Information Sharing System
  • Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries
  • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
  • Blind 384-bit Digital Signature Scheme
  • RABAC: Role-Centric Attribute-Based Access Control
  • Trust-Aware RBAC
  • Alternative Mechanisms for Information Security
  • Flow Policies by a Three-Valued Analysis
  • Towards the Orchestration of Secured Services under Non-disclosure Policies
  • An Approach for Network Information Flow Analysis for Systems of Embedded Components
  • Individual Countermeasure Selection Based on the Return On Response Investment Index
  • Security and Reliability Requirements for Advanced Security Event Management
  • Model-Based Security Event Management
  • Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks
  • Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation
  • Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems
  • Malware Characterization Using Behavioral Components
  • MADAM: A Multi-level Anomaly Detector for Android Malware
  • Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods
  • Configuration-Based Approach to Embedded Device Security
  • A Study of Entropy Sources in Cloud Computers: Random Number
  • Generation on Cloud Hosts
  • Security Modeling of Grid Systems Using Petri Nets
  • Using Graph Theory for Cloud System Security Modeling.