Computer Network Security - Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications - Igor Kotenko - Livros - Springer-Verlag Berlin and Heidelberg Gm - 9783642147050 - 11 de agosto de 2010
Caso a capa e o título não sejam correspondentes, considere o título como correto

Computer Network Security - Lecture Notes in Computer Science / Computer Communication Networks and Telecommunications


Receba um e-mail quando o item estiver disponível
Você tem um perfil? Entrar
Adicione à sua lista de desejos do iMusic

Constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St Petersburg, Russia in September 2010.


Marc Notes: Title from PDF t.p. (SpringerLink, viewed Aug. 16, 2010).; Includes bibliographical references and index. Table of Contents: Invited Papers -- Service Dependencies in Information Systems Security / HervE Debar, Nizar Kheir, Nora Cuppens-Boulahia, FrEdEric Cuppens -- Secure Applications without Secure Infrastructures / Dieter Gollmann -- Integrating Types and Specifications for Secure Software Development / Greg Morrisett -- Cryptography for Network Security: Failures, Successes and Challenges / Bart Preneel -- Group-Centric Models for Secure and Agile Information Sharing / Ravi Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough -- Security Modeling and Covert Channels -- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors / Leonid Domnitser, Nael Abu-Ghazaleh, Dmitry Ponomarev -- Attack and Defense Modeling with BDMP / Ludovic PiEtre-CambacEdEs, Marc Bouissou -- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems / Vidyaraman Sankaranarayanan, Shambhu Upadhyaya, Kevin Kwiat -- Problems of Modeling in the Analysis of Covert Channels / Alexander Grusho, Nikolai Grusho, Elena Timonina -- Security Policies and Formal Analysis of Security Properties -- Policy-Based Design and Verification for Mission Assurance / Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal -- Using Equivalence Relations for Corrective Enforcement of Security Policies / RaphaEl Khoury, Nadia Tawbi -- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus / Devrim Unal, Ozan Akar, M. Ufuk Caglayan -- Authentication, Authorization, Access Control and Public Key Cryptography -- Gredentials Management for High-Value Transactions / Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older -- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols / Dmitriy N. Moldovyan, Nikolay A. Moldovyan -- Credential Chain Discovery in RTT Trust Management Language / Krzysztof Sacha -- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks / Igor Saenko, Igor Kotenko -- Intrusion and Malware Detection -- Intellectual Intrusion Detection with Sequences Alignment Methods / Yaroslav A. Markov, Maxim O. Kalinin -- Symptoms-Based Detection of Bot Processes / Jose Andre Morales, Erhan Kartaltepe, Shouhuai Xu, Ravi Sandhu -- A Comparison of Feature-Selection Methods for Intrusion Detection / Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke -- From NLP (Natural Language Processing) to MLP (Machine Language Processing) / Peter Teuft, Udo Payer, Guenter Lackner -- Security of Multi-agent Systems and Software Protection -- Secure Multi-Agent System for Multi-Hop Environments / Stefan Kraxberger, Peter Danner, Daniel Hein -- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware / Antonio MuNoz, Antonio MaNa, Pablo AntOn -- Security and Scalability of Remote Entrusting Protection / Vasily Desnitsky, Igor Kotenko -- Adaptive Security, Security Analysis and Virtualization -- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks / Wojciech Molisz, Jacek Rak -- Predictive Security Analysis for Event-Driven Processes / Roland Rieke, Zaharina Stoynova -- Virtual Environment Security Modeling / Dmitry Zegzhda, Ekaterina Rudina -- Clarifying Integrity Control at the Trusted Information Environment / Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin -- Author Index. Publisher Marketing: This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original - search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers).

Mídia Livros     Paperback Book   (Livro de capa flexível e brochura)
Lançado 11 de agosto de 2010
ISBN13 9783642147050
Editoras Springer-Verlag Berlin and Heidelberg Gm
Páginas 345
Dimensões 155 × 231 × 20 mm   ·   544 g
Idioma Francês  
Editor Kotenko, Igor
Editor Skormin, Victor A. (University of Birmingham)

Mais por Igor Kotenko

Mostrar tudo

Mere med samme udgiver

Ver tudo de Igor Kotenko ( por exemplo Paperback Book )