Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings /

This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for Info...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gorodetsky, Vladimir (Επιμελητής έκδοσης), Kotenko, Igor (Επιμελητής έκδοσης), Skormin, Victor A. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Communications in Computer and Information Science, 1
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Papers
  • Surreptitious Software: Models from Biology and History
  • Characterizing Software Self-healing Systems
  • Assumptions: The Trojan Horses of Secure Protocols
  • Smart Cards and Digital Security
  • Virus Throttle as Basis for ProActive Defense
  • Technologies for Protection Against Insider Attacks on Computer Systems
  • Authentication, Authorization and Access Control
  • Access Control and Declassification
  • Reasoning About Delegation and Account Access in Retail Payment Systems
  • Performance Evaluation of Keyless Authentication Based on Noisy Channel
  • Avoiding Key Redistribution in Key Assignment Schemes
  • Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching
  • Class of Provably Secure Information Authentication Systems
  • A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems
  • Language-Based Security, Trust Management and Covert Channels
  • Synthesis of Non-interferent Distributed Systems
  • Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
  • Covert Channel Invisibility Theorem
  • Security Verification and Evaluation
  • Policy-Based Proactive Monitoring of Security Policy Performance
  • Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric
  • Abstraction Based Verification of a Parameterised Policy Controlled System
  • Algebraic Models to Detect and Solve Policy Conflicts
  • Event Calcululus Based Checking of Filtering Policies
  • A New Approach to Security Evaluation of Operating Systems
  • Intrusion Detection and Prevention
  • Multi-agent Peer-to-Peer Intrusion Detection
  • An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures
  • Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response
  • Mathematical Models of Intrusion Detection by an Intelligent Immunochip
  • A Novel Intrusion Detection System for a Local Computer Network
  • Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework
  • Host-Based Intrusion Detection System: Model and Design Features
  • Network Survivability and Privacy
  • Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics
  • Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks
  • Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks
  • Privacy Preserving Context Transfer in All-IP Networks
  • Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols
  • Watermarking
  • A Spatial Watermarking Algorithm for Video Images
  • Watermarking Software to Signal Copy Protection.