Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /
Saved in:
Meeting name: | International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia) |
---|---|
Imprint: | Berlin : Springer, 2010. |
Description: | 1 online resource (xiii, 344 pages) : illustrations. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 6258 LNCS sublibrary. SL 5, Computer communication networks and telecommunications Lecture notes in computer science ; 6258. LNCS sublibrary. SL 5, Computer communication networks and telecommunications. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11074704 |
MARC
LEADER | 00000cam a2200000Ka 4500 | ||
---|---|---|---|
001 | 11074704 | ||
005 | 20170630044557.7 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 101004s2010 gw a ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d CEF |d OCLCQ |d OCLCF |d BEDGE |d OCLCO |d CUS |d E7B |d COO |d OL$ |d OHS |d YDXCP |d OCLCO |d OCL |d OCLCO |d EBLCP |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d SOI |d OCLCO |d OCLCA |d DGU |d OCLCO | ||
019 | |a 656285585 | ||
020 | |a 9783642147067 | ||
020 | |a 3642147062 | ||
020 | |z 9783642147050 | ||
020 | |z 3642147054 | ||
035 | |a (OCoLC)668095885 |z (OCoLC)656285585 | ||
037 | |a 978-3-642-14705-0 |b Springer |n http://www.springerlink.com | ||
050 | 4 | |a QA76.9.A25 |b I58 2010 | |
060 | 4 | |a QA 76.9.A25 | |
049 | |a MAIN | ||
111 | 2 | |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security |n (5th : |d 2010 : |c Saint Petersburg, Russia) | |
245 | 1 | 0 | |a Computer network security : |b 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings / |c Igor Kotenko, Victor Skormin (eds.). |
246 | 3 | 0 | |a MMM-ACNS 2010 |
260 | |a Berlin : |b Springer, |c 2010. | ||
300 | |a 1 online resource (xiii, 344 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 6258 | |
490 | 1 | |a LNCS sublibrary. SL 5, Computer communication networks and telecommunications | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | 8 | |a Annotation |b This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010. The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 0 | |a Computer networks |x Access control |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007008426 | |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Access control. |2 fast |0 (OCoLC)fst00872298 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 2 | |a Computer Communication Networks. | |
650 | 2 | |a Computer Security. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
655 | 2 | |a Congresses. | |
700 | 1 | |a Kotenko, Igor. |0 http://id.loc.gov/authorities/names/nb2005015070 |1 http://viaf.org/viaf/36437410 | |
700 | 1 | |a Skormin, Victor A., |d 1946- |0 http://id.loc.gov/authorities/names/n2001005341 |1 http://viaf.org/viaf/28015273 | |
776 | 0 | 8 | |i Print version: |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia). |t Computer network security. |d Berlin : Springer, 2010 |z 9783642147067 |z 3642147062 |
830 | 0 | |a Lecture notes in computer science ; |v 6258. |x 0302-9743 | |
830 | 0 | |a LNCS sublibrary. |n SL 5, |p Computer communication networks and telecommunications. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-14706-7 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i 5b6cb5e6-528b-5559-99d5-c2559b52d062 |s 6cf9ebd2-6d22-5b84-9324-612937a96d29 |
928 | |t Library of Congress classification |a QA76.9.A25 I58 2010 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-14706-7 |z SpringerLink |g ebooks |i 9884153 |