rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642147050

Computer Network Security : 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings

by ;
  • ISBN13:

    9783642147050

  • ISBN10:

    3642147054

  • Format: Paperback
  • Copyright: 2010-10-11
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

This book constitutes the refereed proceedings of the 5th InternationalConference on Mathematical Methods, Models, and Architectures forComputer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russiain September 2010.The 16 revised full papers and 6 revised short papers presented togetherwith 5 invited papers were carefully reviewed and selected from a totalof 54 submissions. The papers are organized in topical sections onsecurity modeling and covert channels, security policies and formalanalysis of security properties, authentication, authorization, accesscontrol and public key cryptography, intrusion and malware detection,security of multi-agent systems and software protection, as well as.adaptive security, security analysis and virtualization.

Table of Contents

Invited Papers
Service Dependencies in Information Systems Securityp. 1
Secure Applications without Secure Infrastructuresp. 21
Integrating Types and Specifications for Secure Software Developmentp. 32
Cryptography for Network Security: Failures, Successes and Challengesp. 36
Group-Centric Models for Secure and Agile Information Sharingp. 55
Security Modeling and Covert Channels
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessorsp. 70
Attack and Defense Modeling with BDMPp. 86
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systemsp. 102
Problems of Modeling in the Analysis of Covert Channelsp. 118
Security Policies and Formal Analysis of Security Properties
Policy-Based Design and Verification for Mission Assurancep. 125
Using Equivalence Relations for Corrective Enforcement of Security Policiesp. 139
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculusp. 155
Authentication, Authorization, Access Control and Public Key Cryptography
Gredentials Management for High-Value Transactionsp. 169
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocolsp. 183
Credential Chain Discovery in RTT Trust Management Languagep. 195
Genetic Optimization of Access Control Schemes in Virtual Local Area Networksp. 209
Intrusion and Malware Detection
Intellectual Intrusion Detection with Sequences Alignment Methodsp. 217
Symptoms-Based Detection of Bot Processesp. 229
A Comparison of Feature-Selection Methods for Intrusion Detectionp. 242
From NLP (Natural Language Processing) to MLP (Machine Language Processing)p. 256
Security of Multi-agent Systems and Software Protection
Secure Multi-Agent System for Multi-Hop Environmentsp. 270
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardwarep. 284
Security and Scalability of Remote Entrusting Protectionp. 298
Adaptive Security, Security Analysis and Virtualization
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networksp. 307
Predictive Security Analysis for Event-Driven Processesp. 321
Virtual Environment Security Modelingp. 329
Clarifying Integrity Control at the Trusted Information Environmentp. 337
Author Indexp. 345
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program