Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings /
This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001. The 24 revised full papers presented together with five invited contributions were carefully r...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2001.
|
Έκδοση: | 1st ed. 2001. |
Σειρά: | Lecture Notes in Computer Science,
2052 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks
- An Intelligent Decision Support System for Intrusion Detection and Response
- Mathematical Models of the Covert Channels
- Open Issues in Formal Methods for Cryptographic Protocol Analysis
- Future Directions in Role-Based Access Control Models
- Secure Networked Computing
- Network Security Systems: Foundations, Models, and Architectures
- Composability of Secrecy
- Agent-Based Model of Computer Network Security System: A Case Study
- Security Considerations and Models for Service Creation in Premium IP Networks
- Secure Systems Design Technology
- A Privacy-Enhancing e-Business Model Based on Infomediaries
- Applying Practical Formal Methods to the Specification and Analysis of Security Properties
- Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ)
- Analyzing Separation of Duties in Petri Net Workflows
- Intrusion Detection: Foundations and Models
- Information Security with Formal Immune Networks
- BASIS: A Biological Approach to System Information Security
- Learning Temporal Regularities of User Behavior for Anomaly Detection
- Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
- Access Control, Authentication, and Authorization
- Typed MSR: Syntax and Examples
- TRBACN: A Temporal Authorization Model
- The Set and Function Approach to Modeling Authorization in Distributed Systems
- Fenix Secure Operating System: Principles, Models, and Architecture
- Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
- Generalized Oblivious Transfer Protocols Based on Noisy Channels
- Controlled Operations as a Cryptographic Primitive
- Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes
- Dynamic Group Key Management Protocol
- SVD-Based Approach to Transparent Embedding Data into Digital Images
- Fast Encryption Algorithm Spectr-H64
- CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
- On Some Cryptographic Properties of Rijndael.