Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings /
Saved in:
Meeting name: | International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (3rd : 2005 : Saint Petersburg, Russia) |
---|---|
Imprint: | Berlin ; New York : Springer, 2005. |
Description: | xiv, 480 p. : ill. ; 24 cm. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 3685 |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/5729059 |
Table of Contents:
- Self-managed cells for ubiquitous systems / Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr and Stephen Heeps
- Critical information assurance challenges for modern large-scale infrastructures / Ming-Yuh Huang
- Rule-based topological vulnerability analysis / Vipin Swarup, Sushil Jajodia and Joseph Pamula
- Models and analysis of active worm defense / David M. Nicol and Michael Liljenstam
- Prevention of information attacks by run-time detection of self-replication in computer codes / Douglas Summerville, Victor Skormin, Alexander Volynkin and James Moronski
- Calibrating entropy functions applied to computer networks / Duncan A. Buell
- A passive external Web surveillance technique for private networks / Constantine Daicos and Scott Knight
- A secure way to combine IPsec, NAT & DHCP / Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra and Salim Ferraz
- A generic model for analyzing security protocols / Yonggen Gu, Yuxi Fu, Farong Zhong and Han Zhu
- Networks, Markov Lie monoids, and generalized entropy / Joseph E. Johnson
- Trust by workflow in autonomic communication / Mikhail I. Smirnov
- An ontology-based approach to information systems security management / Bill Tsoumas, Stelios Dritsas and Dimitris Gritzalis
- Safety problems in access control with temporal constraints / Philippe Balbiani and Fahima Cheikh
- A modal logic for role-based access control / Thumrongsak Kosiyatrakul, Susan Older and Shiu-Kai Chin
- Unique user-generated digital pseudonyms / Peter Schartner and Martin Schaffer
- A probabilistic property-specific approach to information flow / Daniele Beauquier, Marie Duflot and Marius Minea
- Generalized abstract non-interference : abstract secure information-flow analysis for automata / Roberto Giacobazzi and Isabella Mastroeni
- Detection of illegal information flow / Alexander Grusho, Alexander Kniazev and Elena Timonina
- Towards more controllable and practical delegation / Gang Yin, Huaimin Wang, Dianxi Shi and Haiya Gu
- Policy-driven routing management using CIM / Felix J. Garcia Clemente, Jesus D. Jimenez Re, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta
- Secure hybrid operating system "Linux over Fenix" / Dmitry P. Zegzhda and Alex M. Vovk
- A formal description of SECIMOS operating system / Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi and Yeping He
- A theoretical model for the average impact of attacks on billing infrastructures / Fabrizio Baiardi and Claudio Telmon
- Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle / Igor Kotenko and Mihail Stepashkin
- A temporal logic-based model for forensic investigation in networked system security / Slim Rekhis and Noureddine Boudriga
- Vulnerabilities detection in the configurations of MS windows operating system / Peter D. Zegzhda, Dmitry P. Zegzhda and Maxim O. Kalinin
- Hybrid intrusion detection model based on ordered sequences / Abdulrahman Alharby and Hideki Imai
- Asynchronous alert correlation in multi-agent intrusion detection systems / Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov and Alexander Ulanov
- Behavior-based model of detection and prevention of intrusions in computer networks / Victor Serdiouk
- A formal immune network and its implementation for on-line intrusion detection / Alexander O. Tarakanov, Sergei V. Kvachev and Alexander V. Sukhorukov
- Foundation for a time interval access control model / Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine and Thuy D. Nguyen
- Developing an insider threat model using functional decomposition / Jonathan W. Butts, Robert F. Mills and Rusty O. Baldwin
- An XML-seamless policy based management framework / Felix Y. Garcia Clemente, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta
- Statistical covert channels through PROXY server / Alexei Galatenko, Alexander Grusho, Alexander Kniazev and Elena Timonina
- Encoding private key in fingerprint / Erno Jeges, Zoltan Hornak and Csaba Kormoczi
- A new scheme for the location information protection in mobile communication environments / Soon Seok Kim, Sang Soo Yeo, Hong Jin Park and Sung Kwon Kim
- Region protection/restoration scheme in survivable networks / Wojciech Molisz and Jacek Rak
- Massive data mining for polymorphic code detection / Udo Payer, Peter Teufl, Stefan Kraxberger and Mario Lamberger
- Key escrow with tree-based access structure / Martin Schaffer and Peter Schartner
- Security checker architecture for policy-based security management / Artem Tishkov, Igor Kotenko and Ekaterina Sidelnikova
- An efficient access control model utilized the attribute certificate structuring / Soomi Yang
- Secure protected password change scheme / Eun-Jun Yoon, Eun-Kyung Ryu and Kee-Young Yoo.