Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings /
This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academ...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
6258 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Papers
- Service Dependencies in Information Systems Security
- Secure Applications without Secure Infrastructures
- Integrating Types and Specifications for Secure Software Development
- Cryptography for Network Security: Failures, Successes and Challenges
- Group-Centric Models for Secure and Agile Information Sharing
- Security Modeling and Covert Channels
- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors
- Attack and Defense Modeling with BDMP
- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems
- Problems of Modeling in the Analysis of Covert Channels
- Security Policies and Formal Analysis of Security Properties
- Policy-Based Design and Verification for Mission Assurance
- Using Equivalence Relations for Corrective Enforcement of Security Policies
- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus
- Authentication, Authorization, Access Control and Public Key Cryptography
- Credentials Management for High-Value Transactions
- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols
- Credential Chain Discovery in RTT Trust Management Language
- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks
- Intrusion and Malware Detection
- Intellectual Intrusion Detection with Sequences Alignment Methods
- Symptoms-Based Detection of Bot Processes
- A Comparison of Feature-Selection Methods for Intrusion Detection
- From NLP (Natural Language Processing) to MLP (Machine Language Processing)
- Security of Multi-agent Systems and Software Protection
- Secure Multi-Agent System for Multi-Hop Environments
- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware
- Security and Scalability of Remote Entrusting Protection
- Adaptive Security, Security Analysis and Virtualization
- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
- Predictive Security Analysis for Event-Driven Processes
- Virtual Environment Security Modeling
- Clarifying Integrity Control at the Trusted Information Environment.