Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (3rd : 2005 : Saint Petersburg, Russia)
Imprint:Berlin ; New York : Springer, 2005.
Description:xiv, 480 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 3685
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5729059
Hidden Bibliographic Details
Varying Form of Title:Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
MMM-ACNS 2005
Other authors / contributors:Gorodetski, Vladimir I., 1937-
Kotenko, Igor.
Skormin, Victor A., 1946-
ISBN:354029113X (pbk.)
Notes:Includes bibliographical references and index.
Standard no.:9783540291138

MARC

LEADER 00000cam a2200000 a 4500
001 5729059
003 ICU
005 20060808165400.0
008 050923s2005 gw 101 0 eng d
010 |a  2005932314 
020 |a 354029113X (pbk.) 
024 3 |a 9783540291138 
040 |a OHX  |c OHX  |d CUS  |d UtOrBLW  |d OrLoB-B 
049 |a CGUA 
072 7 |a QA  |2 lcco 
090 |a QA76.9.A25  |b I565 2005 
111 2 |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security  |n (3rd :  |d 2005 :  |c Saint Petersburg, Russia) 
245 1 0 |a Computer network security :  |b Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings /  |c Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.). 
246 3 0 |a Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security 
246 3 0 |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security 
246 3 0 |a MMM-ACNS 2005 
260 |a Berlin ;  |a New York :  |b Springer,  |c 2005. 
300 |a xiv, 480 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 3685 
504 |a Includes bibliographical references and index. 
505 0 0 |t Self-managed cells for ubiquitous systems /  |r Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr and Stephen Heeps --  |t Critical information assurance challenges for modern large-scale infrastructures /  |r Ming-Yuh Huang --  |t Rule-based topological vulnerability analysis /  |r Vipin Swarup, Sushil Jajodia and Joseph Pamula --  |t Models and analysis of active worm defense /  |r David M. Nicol and Michael Liljenstam --  |t Prevention of information attacks by run-time detection of self-replication in computer codes /  |r Douglas Summerville, Victor Skormin, Alexander Volynkin and James Moronski --  |t Calibrating entropy functions applied to computer networks /  |r Duncan A. Buell --  |t A passive external Web surveillance technique for private networks /  |r Constantine Daicos and Scott Knight --  |t A secure way to combine IPsec, NAT & DHCP /  |r Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra and Salim Ferraz --  |t A generic model for analyzing security protocols /  |r Yonggen Gu, Yuxi Fu, Farong Zhong and Han Zhu --  |t Networks, Markov Lie monoids, and generalized entropy /  |r Joseph E. Johnson --  |t Trust by workflow in autonomic communication /  |r Mikhail I. Smirnov --  |t An ontology-based approach to information systems security management /  |r Bill Tsoumas, Stelios Dritsas and Dimitris Gritzalis --  |t Safety problems in access control with temporal constraints /  |r Philippe Balbiani and Fahima Cheikh --  |t A modal logic for role-based access control /  |r Thumrongsak Kosiyatrakul, Susan Older and Shiu-Kai Chin --  |t Unique user-generated digital pseudonyms /  |r Peter Schartner and Martin Schaffer --  |t A probabilistic property-specific approach to information flow /  |r Daniele Beauquier, Marie Duflot and Marius Minea --  |t Generalized abstract non-interference : abstract secure information-flow analysis for automata /  |r Roberto Giacobazzi and Isabella Mastroeni --  |t Detection of illegal information flow /  |r Alexander Grusho, Alexander Kniazev and Elena Timonina --  |t Towards more controllable and practical delegation /  |r Gang Yin, Huaimin Wang, Dianxi Shi and Haiya Gu --  |t Policy-driven routing management using CIM /  |r Felix J. Garcia Clemente, Jesus D. Jimenez Re, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta --  |t Secure hybrid operating system "Linux over Fenix" /  |r Dmitry P. Zegzhda and Alex M. Vovk --  |t A formal description of SECIMOS operating system /  |r Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi and Yeping He --  |t A theoretical model for the average impact of attacks on billing infrastructures /  |r Fabrizio Baiardi and Claudio Telmon --  |t Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle /  |r Igor Kotenko and Mihail Stepashkin --  |t A temporal logic-based model for forensic investigation in networked system security /  |r Slim Rekhis and Noureddine Boudriga --  |t Vulnerabilities detection in the configurations of MS windows operating system /  |r Peter D. Zegzhda, Dmitry P. Zegzhda and Maxim O. Kalinin --  |t Hybrid intrusion detection model based on ordered sequences /  |r Abdulrahman Alharby and Hideki Imai --  |t Asynchronous alert correlation in multi-agent intrusion detection systems /  |r Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov and Alexander Ulanov --  |t Behavior-based model of detection and prevention of intrusions in computer networks /  |r Victor Serdiouk --  |t A formal immune network and its implementation for on-line intrusion detection /  |r Alexander O. Tarakanov, Sergei V. Kvachev and Alexander V. Sukhorukov --  |t Foundation for a time interval access control model /  |r Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine and Thuy D. Nguyen --  |t Developing an insider threat model using functional decomposition /  |r Jonathan W. Butts, Robert F. Mills and Rusty O. Baldwin --  |t An XML-seamless policy based management framework /  |r Felix Y. Garcia Clemente, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta --  |t Statistical covert channels through PROXY server /  |r Alexei Galatenko, Alexander Grusho, Alexander Kniazev and Elena Timonina --  |t Encoding private key in fingerprint /  |r Erno Jeges, Zoltan Hornak and Csaba Kormoczi --  |t A new scheme for the location information protection in mobile communication environments /  |r Soon Seok Kim, Sang Soo Yeo, Hong Jin Park and Sung Kwon Kim --  |t Region protection/restoration scheme in survivable networks /  |r Wojciech Molisz and Jacek Rak --  |t Massive data mining for polymorphic code detection /  |r Udo Payer, Peter Teufl, Stefan Kraxberger and Mario Lamberger --  |t Key escrow with tree-based access structure /  |r Martin Schaffer and Peter Schartner --  |t Security checker architecture for policy-based security management /  |r Artem Tishkov, Igor Kotenko and Ekaterina Sidelnikova --  |t An efficient access control model utilized the attribute certificate structuring /  |r Soomi Yang --  |t Secure protected password change scheme /  |r Eun-Jun Yoon, Eun-Kyung Ryu and Kee-Young Yoo. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 0 |a Computer networks  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008426 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00872341 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Gorodetski, Vladimir I.,  |d 1937-  |0 http://id.loc.gov/authorities/names/n2001007486  |1 http://viaf.org/viaf/32888823 
700 1 |a Kotenko, Igor.  |0 http://id.loc.gov/authorities/names/nb2005015070  |1 http://viaf.org/viaf/36437410 
700 1 |a Skormin, Victor A.,  |d 1946-  |0 http://id.loc.gov/authorities/names/n2001005341  |1 http://viaf.org/viaf/28015273 
901 |a ToCBNA 
903 |a HeVa 
035 |a (OCoLC)61715018 
929 |a cat 
999 f f |i d67775d6-5027-5880-b92b-1b8c02be4fa9  |s 3c3bdeaf-e93a-53e5-8f14-435d348c6e50 
928 |t Library of Congress classification  |a QA76.9.A25 I565 2005  |l ASR  |c ASR-SciASR  |i 6517612 
927 |t Library of Congress classification  |a QA76.9.A25 I565 2005  |l ASR  |c ASR-SciASR  |e CRERAR  |b 70598344  |i 7910727