Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings /

This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001. The 24 revised full papers presented together with five invited contributions were carefully r...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Gorodetski, Vladimir I. (Editor, http://id.loc.gov/vocabulary/relators/edt), Skormin, Victor A. (Editor, http://id.loc.gov/vocabulary/relators/edt), Popyack, Leonard J. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
Edition:1st ed. 2001.
Series:Lecture Notes in Computer Science, 2052
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Invited Talks
  • An Intelligent Decision Support System for Intrusion Detection and Response
  • Mathematical Models of the Covert Channels
  • Open Issues in Formal Methods for Cryptographic Protocol Analysis
  • Future Directions in Role-Based Access Control Models
  • Secure Networked Computing
  • Network Security Systems: Foundations, Models, and Architectures
  • Composability of Secrecy
  • Agent-Based Model of Computer Network Security System: A Case Study
  • Security Considerations and Models for Service Creation in Premium IP Networks
  • Secure Systems Design Technology
  • A Privacy-Enhancing e-Business Model Based on Infomediaries
  • Applying Practical Formal Methods to the Specification and Analysis of Security Properties
  • Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ)
  • Analyzing Separation of Duties in Petri Net Workflows
  • Intrusion Detection: Foundations and Models
  • Information Security with Formal Immune Networks
  • BASIS: A Biological Approach to System Information Security
  • Learning Temporal Regularities of User Behavior for Anomaly Detection
  • Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
  • Access Control, Authentication, and Authorization
  • Typed MSR: Syntax and Examples
  • TRBACN: A Temporal Authorization Model
  • The Set and Function Approach to Modeling Authorization in Distributed Systems
  • Fenix Secure Operating System: Principles, Models, and Architecture
  • Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
  • Generalized Oblivious Transfer Protocols Based on Noisy Channels
  • Controlled Operations as a Cryptographic Primitive
  • Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes
  • Dynamic Group Key Management Protocol
  • SVD-Based Approach to Transparent Embedding Data into Digital Images
  • Fast Encryption Algorithm Spectr-H64
  • CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
  • On Some Cryptographic Properties of Rijndael.