Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings /

This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academ...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Kotenko, Igor (Επιμελητής έκδοσης), Skormin, Victor (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6258
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Papers
  • Service Dependencies in Information Systems Security
  • Secure Applications without Secure Infrastructures
  • Integrating Types and Specifications for Secure Software Development
  • Cryptography for Network Security: Failures, Successes and Challenges
  • Group-Centric Models for Secure and Agile Information Sharing
  • Security Modeling and Covert Channels
  • A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors
  • Attack and Defense Modeling with BDMP
  • QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems
  • Problems of Modeling in the Analysis of Covert Channels
  • Security Policies and Formal Analysis of Security Properties
  • Policy-Based Design and Verification for Mission Assurance
  • Using Equivalence Relations for Corrective Enforcement of Security Policies
  • Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus
  • Authentication, Authorization, Access Control and Public Key Cryptography
  • Credentials Management for High-Value Transactions
  • A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols
  • Credential Chain Discovery in RTT Trust Management Language
  • Genetic Optimization of Access Control Schemes in Virtual Local Area Networks
  • Intrusion and Malware Detection
  • Intellectual Intrusion Detection with Sequences Alignment Methods
  • Symptoms-Based Detection of Bot Processes
  • A Comparison of Feature-Selection Methods for Intrusion Detection
  • From NLP (Natural Language Processing) to MLP (Machine Language Processing)
  • Security of Multi-agent Systems and Software Protection
  • Secure Multi-Agent System for Multi-Hop Environments
  • In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware
  • Security and Scalability of Remote Entrusting Protection
  • Adaptive Security, Security Analysis and Virtualization
  • A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
  • Predictive Security Analysis for Event-Driven Processes
  • Virtual Environment Security Modeling
  • Clarifying Integrity Control at the Trusted Information Environment.