Computer network security : 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (5th : 2010 : Saint Petersburg, Russia)
Imprint:Berlin : Springer, 2010.
Description:1 online resource (xiii, 344 p.) : ill.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 6258
LNCS sublibrary. SL 5, Computer communication networks and telecommunications
Lecture notes in computer science ; 6258.
LNCS sublibrary. SL 5, Computer communication networks and telecommunications.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8866076
Hidden Bibliographic Details
Varying Form of Title:MMM-ACNS 2010
Other authors / contributors:Kotenko, Igor.
Skormin, Victor A., 1946-
ISBN:9783642147067
3642147062
9783642147050
3642147054
Notes:Includes bibliographical references and index.
Summary:Annotation This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010. The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization.
Other form:Print version: Computer Network Security. Springer-Verlag New York Inc 2010 9783642147050

MARC

LEADER 00000cam a2200000Ia 4500
001 8866076
003 ICU
005 20120824125300.0
006 m d
007 cr |||
008 100816s2010 gw a ob 101 0 eng d
020 |a 9783642147067 
020 |a 3642147062 
020 |z 9783642147050 
020 |z 3642147054 
035 |a (OCoLC)656285585 
040 |a CUS  |b eng  |c CUS  |d E7B  |d OCLCQ  |d COO  |d OCLCQ 
049 |a CGUA 
090 |a QA76.9.A25 
111 2 |a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security  |n (5th :  |d 2010 :  |c Saint Petersburg, Russia) 
245 1 0 |a Computer network security :  |b 5th International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010 : proceedings /  |c Igor Kotenko, Victor Skormin (eds.). 
246 3 0 |a MMM-ACNS 2010 
260 |a Berlin :  |b Springer,  |c 2010. 
300 |a 1 online resource (xiii, 344 p.) :  |b ill. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 6258 
490 1 |a LNCS sublibrary. SL 5, Computer communication networks and telecommunications 
504 |a Includes bibliographical references and index. 
520 8 |a Annotation  |b This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010. The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection, security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 0 |a Computer networks  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008426 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00872341 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Kotenko, Igor.  |0 http://id.loc.gov/authorities/names/nb2005015070  |1 http://viaf.org/viaf/36437410 
700 1 |a Skormin, Victor A.,  |d 1946-  |0 http://id.loc.gov/authorities/names/n2001005341  |1 http://viaf.org/viaf/28015273 
776 0 8 |i Print version:  |t Computer Network Security.  |d Springer-Verlag New York Inc 2010  |z 9783642147050  |w (DLC) 2010931166  |w (OCoLC)648933492 
830 0 |a Lecture notes in computer science ;  |v 6258.  |x 0302-9743 
830 0 |a LNCS sublibrary.  |n SL 5,  |p Computer communication networks and telecommunications. 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14706-7  |y SpringerLink 
903 |a HeVa 
035 |a (ICU)8866076 
929 |a eresource 
999 f f |i 15c767ef-6c20-5f87-b2c3-78efaa9388c8  |s 2bbdfae9-a353-5932-86d7-9fba141e4885 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://dx.doi.org/10.1007/978-3-642-14706-7  |z SpringerLink  |g ebooks  |i 11473474