|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
5729059 |
003 |
ICU |
005 |
20060808165400.0 |
008 |
050923s2005 gw 101 0 eng d |
010 |
|
|
|a 2005932314
|
020 |
|
|
|a 354029113X (pbk.)
|
024 |
3 |
|
|a 9783540291138
|
040 |
|
|
|a OHX
|c OHX
|d CUS
|d UtOrBLW
|d OrLoB-B
|
049 |
|
|
|a CGUA
|
072 |
|
7 |
|a QA
|2 lcco
|
090 |
|
|
|a QA76.9.A25
|b I565 2005
|
111 |
2 |
|
|a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
|n (3rd :
|d 2005 :
|c Saint Petersburg, Russia)
|
245 |
1 |
0 |
|a Computer network security :
|b Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings /
|c Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (eds.).
|
246 |
3 |
0 |
|a Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
|
246 |
3 |
0 |
|a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
|
246 |
3 |
0 |
|a MMM-ACNS 2005
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c 2005.
|
300 |
|
|
|a xiv, 480 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 3685
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Self-managed cells for ubiquitous systems /
|r Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr and Stephen Heeps --
|t Critical information assurance challenges for modern large-scale infrastructures /
|r Ming-Yuh Huang --
|t Rule-based topological vulnerability analysis /
|r Vipin Swarup, Sushil Jajodia and Joseph Pamula --
|t Models and analysis of active worm defense /
|r David M. Nicol and Michael Liljenstam --
|t Prevention of information attacks by run-time detection of self-replication in computer codes /
|r Douglas Summerville, Victor Skormin, Alexander Volynkin and James Moronski --
|t Calibrating entropy functions applied to computer networks /
|r Duncan A. Buell --
|t A passive external Web surveillance technique for private networks /
|r Constantine Daicos and Scott Knight --
|t A secure way to combine IPsec, NAT & DHCP /
|r Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra and Salim Ferraz --
|t A generic model for analyzing security protocols /
|r Yonggen Gu, Yuxi Fu, Farong Zhong and Han Zhu --
|t Networks, Markov Lie monoids, and generalized entropy /
|r Joseph E. Johnson --
|t Trust by workflow in autonomic communication /
|r Mikhail I. Smirnov --
|t An ontology-based approach to information systems security management /
|r Bill Tsoumas, Stelios Dritsas and Dimitris Gritzalis --
|t Safety problems in access control with temporal constraints /
|r Philippe Balbiani and Fahima Cheikh --
|t A modal logic for role-based access control /
|r Thumrongsak Kosiyatrakul, Susan Older and Shiu-Kai Chin --
|t Unique user-generated digital pseudonyms /
|r Peter Schartner and Martin Schaffer --
|t A probabilistic property-specific approach to information flow /
|r Daniele Beauquier, Marie Duflot and Marius Minea --
|t Generalized abstract non-interference : abstract secure information-flow analysis for automata /
|r Roberto Giacobazzi and Isabella Mastroeni --
|t Detection of illegal information flow /
|r Alexander Grusho, Alexander Kniazev and Elena Timonina --
|t Towards more controllable and practical delegation /
|r Gang Yin, Huaimin Wang, Dianxi Shi and Haiya Gu --
|t Policy-driven routing management using CIM /
|r Felix J. Garcia Clemente, Jesus D. Jimenez Re, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta --
|t Secure hybrid operating system "Linux over Fenix" /
|r Dmitry P. Zegzhda and Alex M. Vovk --
|t A formal description of SECIMOS operating system /
|r Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi and Yeping He --
|t A theoretical model for the average impact of attacks on billing infrastructures /
|r Fabrizio Baiardi and Claudio Telmon --
|t Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle /
|r Igor Kotenko and Mihail Stepashkin --
|t A temporal logic-based model for forensic investigation in networked system security /
|r Slim Rekhis and Noureddine Boudriga --
|t Vulnerabilities detection in the configurations of MS windows operating system /
|r Peter D. Zegzhda, Dmitry P. Zegzhda and Maxim O. Kalinin --
|t Hybrid intrusion detection model based on ordered sequences /
|r Abdulrahman Alharby and Hideki Imai --
|t Asynchronous alert correlation in multi-agent intrusion detection systems /
|r Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov and Alexander Ulanov --
|t Behavior-based model of detection and prevention of intrusions in computer networks /
|r Victor Serdiouk --
|t A formal immune network and its implementation for on-line intrusion detection /
|r Alexander O. Tarakanov, Sergei V. Kvachev and Alexander V. Sukhorukov --
|t Foundation for a time interval access control model /
|r Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine and Thuy D. Nguyen --
|t Developing an insider threat model using functional decomposition /
|r Jonathan W. Butts, Robert F. Mills and Rusty O. Baldwin --
|t An XML-seamless policy based management framework /
|r Felix Y. Garcia Clemente, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta --
|t Statistical covert channels through PROXY server /
|r Alexei Galatenko, Alexander Grusho, Alexander Kniazev and Elena Timonina --
|t Encoding private key in fingerprint /
|r Erno Jeges, Zoltan Hornak and Csaba Kormoczi --
|t A new scheme for the location information protection in mobile communication environments /
|r Soon Seok Kim, Sang Soo Yeo, Hong Jin Park and Sung Kwon Kim --
|t Region protection/restoration scheme in survivable networks /
|r Wojciech Molisz and Jacek Rak --
|t Massive data mining for polymorphic code detection /
|r Udo Payer, Peter Teufl, Stefan Kraxberger and Mario Lamberger --
|t Key escrow with tree-based access structure /
|r Martin Schaffer and Peter Schartner --
|t Security checker architecture for policy-based security management /
|r Artem Tishkov, Igor Kotenko and Ekaterina Sidelnikova --
|t An efficient access control model utilized the attribute certificate structuring /
|r Soomi Yang --
|t Secure protected password change scheme /
|r Eun-Jun Yoon, Eun-Kyung Ryu and Kee-Young Yoo.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008101490
|
650 |
|
0 |
|a Computer networks
|x Access control
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008426
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 http://id.worldcat.org/fast/fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 http://id.worldcat.org/fast/fst00872341
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Gorodetski, Vladimir I.,
|d 1937-
|0 http://id.loc.gov/authorities/names/n2001007486
|1 http://viaf.org/viaf/32888823
|
700 |
1 |
|
|a Kotenko, Igor.
|0 http://id.loc.gov/authorities/names/nb2005015070
|1 http://viaf.org/viaf/36437410
|
700 |
1 |
|
|a Skormin, Victor A.,
|d 1946-
|0 http://id.loc.gov/authorities/names/n2001005341
|1 http://viaf.org/viaf/28015273
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)61715018
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i d67775d6-5027-5880-b92b-1b8c02be4fa9
|s 3c3bdeaf-e93a-53e5-8f14-435d348c6e50
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25 I565 2005
|l ASR
|c ASR-SciASR
|i 6517612
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25 I565 2005
|l ASR
|c ASR-SciASR
|e CRERAR
|b 70598344
|i 7910727
|