rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540769279

Advances in Computer Science: Asian Computer and Network Security: Proceedings 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings

by
  • ISBN13:

    9783540769279

  • ISBN10:

    3540769277

  • Format: Paperback
  • Copyright: 2007-12-20
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. Covering all current aspects of computer and network security, the papers are organized in topical sections on program security, computer security, access control, protocols, intrusion detection, network security, and safe execution.

Table of Contents

Invited Speaker: Andrei Sabelfeld
Dimensions of Declassification in Theory and Practice (Invited Talk)p. 1
Program Security
A Static Birthmark of Binary Executables Based on API Call Structurep. 2
Compiling C Programs into a Strongly Typed Assembly Languagep. 17
Information Flow Testing: The Third Path Towards Confidentiality Guaranteep. 33
Short Papers on Computer Security
Large Scale Simulation of Tor: Modelling a Global Passive Adversaryp. 48
Privacy Enhancing Credentialsp. 55
Browser Based Agile E-Voting Systemp. 62
Risk Balance in Exchange Protocolsp. 70
Scalable DRM System for Media Portabilityp. 78
Computational Semantics for Basic Protocol Logic - A Stochastic Approachp. 86
Access Control
Management Advantages of Object Classification in Role-Based Access Control (RBAC)p. 95
An Integrated Model for Access Control and Information Flow Requirementsp. 111
Digital Rights Management Using a Master Control Devicep. 126
Invited Speaker: Joshua Guttman
How to do Things with Cryptographic Protocols (Invited Talk)p. 142
Protocols
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocolsp. 150
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programmingp. 166
Secure Verification of Location Claims with Simultaneous Distance Modificationp. 181
Invited Speaker: Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments (Invited Talk)p. 196
Intrusion Detection
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Tracesp. 198
A Logical Framework for Evaluating Network Resilience Against Faults and Attacksp. 212
Masquerade Detection Based Upon GUI User Profiling in Linux Systemsp. 228
Short Papers on Network Security
One-Time Receiver Address in IPv6 for Protecting Unlinkabilityp. 240
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alertsp. 247
Combining Heterogeneous Classifiers for Network Intrusion Detectionp. 254
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environmentsp. 261
Safe Execution
On Run-Time Enforcement of Policiesp. 268
Static vs Dynamic Typing for Access Control in Pi-Calculusp. 282
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applicationsp. 297
Author Indexp. 313
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program