Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings /
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for Info...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Communications in Computer and Information Science,
1 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Papers
- Surreptitious Software: Models from Biology and History
- Characterizing Software Self-healing Systems
- Assumptions: The Trojan Horses of Secure Protocols
- Smart Cards and Digital Security
- Virus Throttle as Basis for ProActive Defense
- Technologies for Protection Against Insider Attacks on Computer Systems
- Authentication, Authorization and Access Control
- Access Control and Declassification
- Reasoning About Delegation and Account Access in Retail Payment Systems
- Performance Evaluation of Keyless Authentication Based on Noisy Channel
- Avoiding Key Redistribution in Key Assignment Schemes
- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching
- Class of Provably Secure Information Authentication Systems
- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems
- Language-Based Security, Trust Management and Covert Channels
- Synthesis of Non-interferent Distributed Systems
- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
- Covert Channel Invisibility Theorem
- Security Verification and Evaluation
- Policy-Based Proactive Monitoring of Security Policy Performance
- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric
- Abstraction Based Verification of a Parameterised Policy Controlled System
- Algebraic Models to Detect and Solve Policy Conflicts
- Event Calcululus Based Checking of Filtering Policies
- A New Approach to Security Evaluation of Operating Systems
- Intrusion Detection and Prevention
- Multi-agent Peer-to-Peer Intrusion Detection
- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures
- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response
- Mathematical Models of Intrusion Detection by an Intelligent Immunochip
- A Novel Intrusion Detection System for a Local Computer Network
- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework
- Host-Based Intrusion Detection System: Model and Design Features
- Network Survivability and Privacy
- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics
- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks
- Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks
- Privacy Preserving Context Transfer in All-IP Networks
- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols
- Watermarking
- A Spatial Watermarking Algorithm for Video Images
- Watermarking Software to Signal Copy Protection.