Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (3rd : 2005 : Saint Petersburg, Russia)
Imprint:Berlin ; New York : Springer, 2005.
Description:xiv, 480 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 3685
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5729059
Hidden Bibliographic Details
Varying Form of Title:Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
MMM-ACNS 2005
Other authors / contributors:Gorodetski, Vladimir I., 1937-
Kotenko, Igor.
Skormin, Victor A., 1946-
ISBN:354029113X (pbk.)
Notes:Includes bibliographical references and index.
Standard no.:9783540291138
Table of Contents:
  • Self-managed cells for ubiquitous systems / Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr and Stephen Heeps
  • Critical information assurance challenges for modern large-scale infrastructures / Ming-Yuh Huang
  • Rule-based topological vulnerability analysis / Vipin Swarup, Sushil Jajodia and Joseph Pamula
  • Models and analysis of active worm defense / David M. Nicol and Michael Liljenstam
  • Prevention of information attacks by run-time detection of self-replication in computer codes / Douglas Summerville, Victor Skormin, Alexander Volynkin and James Moronski
  • Calibrating entropy functions applied to computer networks / Duncan A. Buell
  • A passive external Web surveillance technique for private networks / Constantine Daicos and Scott Knight
  • A secure way to combine IPsec, NAT & DHCP / Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra and Salim Ferraz
  • A generic model for analyzing security protocols / Yonggen Gu, Yuxi Fu, Farong Zhong and Han Zhu
  • Networks, Markov Lie monoids, and generalized entropy / Joseph E. Johnson
  • Trust by workflow in autonomic communication / Mikhail I. Smirnov
  • An ontology-based approach to information systems security management / Bill Tsoumas, Stelios Dritsas and Dimitris Gritzalis
  • Safety problems in access control with temporal constraints / Philippe Balbiani and Fahima Cheikh
  • A modal logic for role-based access control / Thumrongsak Kosiyatrakul, Susan Older and Shiu-Kai Chin
  • Unique user-generated digital pseudonyms / Peter Schartner and Martin Schaffer
  • A probabilistic property-specific approach to information flow / Daniele Beauquier, Marie Duflot and Marius Minea
  • Generalized abstract non-interference : abstract secure information-flow analysis for automata / Roberto Giacobazzi and Isabella Mastroeni
  • Detection of illegal information flow / Alexander Grusho, Alexander Kniazev and Elena Timonina
  • Towards more controllable and practical delegation / Gang Yin, Huaimin Wang, Dianxi Shi and Haiya Gu
  • Policy-driven routing management using CIM / Felix J. Garcia Clemente, Jesus D. Jimenez Re, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta
  • Secure hybrid operating system "Linux over Fenix" / Dmitry P. Zegzhda and Alex M. Vovk
  • A formal description of SECIMOS operating system / Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi and Yeping He
  • A theoretical model for the average impact of attacks on billing infrastructures / Fabrizio Baiardi and Claudio Telmon
  • Analyzing vulnerabilities and measuring security level at design and exploitation stages of computer network life cycle / Igor Kotenko and Mihail Stepashkin
  • A temporal logic-based model for forensic investigation in networked system security / Slim Rekhis and Noureddine Boudriga
  • Vulnerabilities detection in the configurations of MS windows operating system / Peter D. Zegzhda, Dmitry P. Zegzhda and Maxim O. Kalinin
  • Hybrid intrusion detection model based on ordered sequences / Abdulrahman Alharby and Hideki Imai
  • Asynchronous alert correlation in multi-agent intrusion detection systems / Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov and Alexander Ulanov
  • Behavior-based model of detection and prevention of intrusions in computer networks / Victor Serdiouk
  • A formal immune network and its implementation for on-line intrusion detection / Alexander O. Tarakanov, Sergei V. Kvachev and Alexander V. Sukhorukov
  • Foundation for a time interval access control model / Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine and Thuy D. Nguyen
  • Developing an insider threat model using functional decomposition / Jonathan W. Butts, Robert F. Mills and Rusty O. Baldwin
  • An XML-seamless policy based management framework / Felix Y. Garcia Clemente, Gregorio Martinez Perez and Antonio F. Gomez Skarmeta
  • Statistical covert channels through PROXY server / Alexei Galatenko, Alexander Grusho, Alexander Kniazev and Elena Timonina
  • Encoding private key in fingerprint / Erno Jeges, Zoltan Hornak and Csaba Kormoczi
  • A new scheme for the location information protection in mobile communication environments / Soon Seok Kim, Sang Soo Yeo, Hong Jin Park and Sung Kwon Kim
  • Region protection/restoration scheme in survivable networks / Wojciech Molisz and Jacek Rak
  • Massive data mining for polymorphic code detection / Udo Payer, Peter Teufl, Stefan Kraxberger and Mario Lamberger
  • Key escrow with tree-based access structure / Martin Schaffer and Peter Schartner
  • Security checker architecture for policy-based security management / Artem Tishkov, Igor Kotenko and Ekaterina Sidelnikova
  • An efficient access control model utilized the attribute certificate structuring / Soomi Yang
  • Secure protected password change scheme / Eun-Jun Yoon, Eun-Kyung Ryu and Kee-Young Yoo.