Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings /
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefu...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
Σειρά: | Lecture Notes in Computer Science,
7531 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Finding Malware on a Web Scale.
- Exposing Security Risks for Commercial Mobile Devices
- From Qualitative to Quantitative Enforcement of Security Policy
- Design and Implementation of a Cloud-Based Assured Information Sharing System
- Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries
- A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
- Blind 384-bit Digital Signature Scheme
- RABAC: Role-Centric Attribute-Based Access Control
- Trust-Aware RBAC
- Alternative Mechanisms for Information Security
- Flow Policies by a Three-Valued Analysis
- Towards the Orchestration of Secured Services under Non-disclosure Policies
- An Approach for Network Information Flow Analysis for Systems of Embedded Components
- Individual Countermeasure Selection Based on the Return On Response Investment Index
- Security and Reliability Requirements for Advanced Security Event Management
- Model-Based Security Event Management
- Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks
- Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation
- Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems
- Malware Characterization Using Behavioral Components
- MADAM: A Multi-level Anomaly Detector for Android Malware
- Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods
- Configuration-Based Approach to Embedded Device Security
- A Study of Entropy Sources in Cloud Computers: Random Number
- Generation on Cloud Hosts
- Security Modeling of Grid Systems Using Petri Nets
- Using Graph Theory for Cloud System Security Modeling.