Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia)
Imprint:Berlin : Springer, 2010.
Description:1 online resource (xiii, 344 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 6258
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science ; 6258.
LNCS sublibrary. SL 5, Computer communication networks and telecommunications.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11074704
Hidden Bibliographic Details
Varying Form of Title:MMM-ACNS 2010
Other authors / contributors:Kotenko, Igor.
Skormin, Victor A., 1946-
ISBN:9783642147067
3642147062
9783642147050
3642147054
Notes:Includes bibliographical references and index.
Print version record.
Summary:Annotation This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010. The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization.
Other form:Print version: International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia). Computer network security. Berlin : Springer, 2010 9783642147067 3642147062

MARC

LEADER 00000cam a2200000Ka 4500
001 11074704
005 20170630044557.7
006 m o d
007 cr cn|||||||||
008 101004s2010 gw a ob 101 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d CEF  |d OCLCQ  |d OCLCF  |d BEDGE  |d OCLCO  |d CUS  |d E7B  |d COO  |d OL$  |d OHS  |d YDXCP  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d SOI  |d OCLCO  |d OCLCA  |d DGU  |d OCLCO 
019 |a 656285585 
020 |a 9783642147067 
020 |a 3642147062 
020 |z 9783642147050 
020 |z 3642147054 
035 |a (OCoLC)668095885  |z (OCoLC)656285585 
037 |a 978-3-642-14705-0  |b Springer  |n http://www.springerlink.com 
050 4 |a QA76.9.A25  |b I58 2010 
060 4 |a QA 76.9.A25 
049 |a MAIN 
111 2 |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security  |n (5th :  |d 2010 :  |c Saint Petersburg, Russia) 
245 1 0 |a Computer network security :  |b 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /  |c Igor Kotenko, Victor Skormin (eds.). 
246 3 0 |a MMM-ACNS 2010 
260 |a Berlin :  |b Springer,  |c 2010. 
300 |a 1 online resource (xiii, 344 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 6258 
490 1 |a LNCS sublibrary. SL 5, Computer communication networks and telecommunications 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 8 |a Annotation  |b This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010. The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 0 |a Computer networks  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008426 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 2 |a Computer Communication Networks. 
650 2 |a Computer Security. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
655 2 |a Congresses. 
700 1 |a Kotenko, Igor.  |0 http://id.loc.gov/authorities/names/nb2005015070  |1 http://viaf.org/viaf/36437410 
700 1 |a Skormin, Victor A.,  |d 1946-  |0 http://id.loc.gov/authorities/names/n2001005341  |1 http://viaf.org/viaf/28015273 
776 0 8 |i Print version:  |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia).  |t Computer network security.  |d Berlin : Springer, 2010  |z 9783642147067  |z 3642147062 
830 0 |a Lecture notes in computer science ;  |v 6258.  |x 0302-9743 
830 0 |a LNCS sublibrary.  |n SL 5,  |p Computer communication networks and telecommunications. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-14706-7  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 5b6cb5e6-528b-5559-99d5-c2559b52d062  |s 6cf9ebd2-6d22-5b84-9324-612937a96d29 
928 |t Library of Congress classification  |a QA76.9.A25 I58 2010  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-14706-7  |z SpringerLink  |g ebooks  |i 9884153