|
|
|
|
LEADER |
06650nam a22005415i 4500 |
001 |
978-3-540-73986-9 |
003 |
DE-He213 |
005 |
20151204162630.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540739869
|9 978-3-540-73986-9
|
024 |
7 |
|
|a 10.1007/978-3-540-73986-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Computer Network Security
|h [electronic resource] :
|b Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings /
|c edited by Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2007.
|
300 |
|
|
|a XIV, 418 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1
|
505 |
0 |
|
|a Invited Papers -- Surreptitious Software: Models from Biology and History -- Characterizing Software Self-healing Systems -- Assumptions: The Trojan Horses of Secure Protocols -- Smart Cards and Digital Security -- Virus Throttle as Basis for ProActive Defense -- Technologies for Protection Against Insider Attacks on Computer Systems -- Authentication, Authorization and Access Control -- Access Control and Declassification -- Reasoning About Delegation and Account Access in Retail Payment Systems -- Performance Evaluation of Keyless Authentication Based on Noisy Channel -- Avoiding Key Redistribution in Key Assignment Schemes -- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching -- Class of Provably Secure Information Authentication Systems -- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems -- Language-Based Security, Trust Management and Covert Channels -- Synthesis of Non-interferent Distributed Systems -- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems -- Covert Channel Invisibility Theorem -- Security Verification and Evaluation -- Policy-Based Proactive Monitoring of Security Policy Performance -- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric -- Abstraction Based Verification of a Parameterised Policy Controlled System -- Algebraic Models to Detect and Solve Policy Conflicts -- Event Calcululus Based Checking of Filtering Policies -- A New Approach to Security Evaluation of Operating Systems -- Intrusion Detection and Prevention -- Multi-agent Peer-to-Peer Intrusion Detection -- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures -- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response -- Mathematical Models of Intrusion Detection by an Intelligent Immunochip -- A Novel Intrusion Detection System for a Local Computer Network -- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework -- Host-Based Intrusion Detection System: Model and Design Features -- Network Survivability and Privacy -- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics -- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks -- Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks -- Privacy Preserving Context Transfer in All-IP Networks -- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols -- Watermarking -- A Spatial Watermarking Algorithm for Video Images -- Watermarking Software to Signal Copy Protection.
|
520 |
|
|
|a This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The organizers are proud that the MMM-ACNS workshops hosted by the St. Petersburg Institute for Informatics and Automation in 2001, 2003 and 2005 evolved into a bi-annual series recognized in the professional community. These events not only demonstrated the keen interest of the participating researchers in the subject matter and the opportunity to present and disseminate individual achievements, but also promoted the spirit of cooperation, camaraderie, free exchange of ideas, and intellectually stimulating interaction between colleagues. Again, MMM-ACNS 2007 provided an international forum for sharing or- inal research results among specialists in fundamental and applied problems of computer network security. An important distinction of the conference was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly - pendable computer networks. A total of 56 papers from 18 countries related to signi?cant aspects of both theory and applications ofcomputer networkand informationsecurity weres- mitted to MMM-ACNS 2007. In total, 18 papers were selected for regular p- sentationsand 12 for short presentations(32 % of acceptance for full papers and 53 % for all papers).
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
|
|a Gorodetsky, Vladimir.
|e editor.
|
700 |
1 |
|
|a Kotenko, Igor.
|e editor.
|
700 |
1 |
|
|a Skormin, Victor A.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540739852
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-73986-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|