rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540739852

Computer Network Securty: Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, Mmm-acns 2007, St. Petersburg, Russia

by ; ;
  • ISBN13:

    9783540739852

  • ISBN10:

    3540739858

  • Format: Paperback
  • Copyright: 2007-06-30
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $119.00

Summary

This book constitutes the refereed proceedings of the FourthInternational Workshop on Mathematical Methods, Models, andArchitectures for Computer Network Security, MMM-ACNS 2007, held in St.Petersburg, Russia in September 2007. The First, Second and Third International Workshops "Mathematical Methods, Models and Architectures for Computer Networks Security" demonstrated the high interest of the international scientific community to the theoretical aspects of the computer network and information security and the need for conducting of such workshops as on-going series.The proposed MMM-ACNS 2007 workshop is intended as a next step in this series and will be focused on theoretical problems in the area under consideration.Its objectives are to bring together leading researchers from academia and governmental organizations as well as practitioners in the area of computer networks and information security, facilitating personal interactions and discussions on various aspects of information technologies in conjunction with computer network and information security problems arising in large-scale computer networks engaged in information storing, transmitting, and processing.

Table of Contents

Invited Papers
Academia Track
Surreptitious Software: Models from Biology and Historyp. 1
Characterizing Software Self-healing Systemsp. 22
Assumptions: The Trojan Horses of Secure Protocolsp. 34
Industry Track
Smart Cards and Digital Securityp. 42
Virus Throttle as Basis for ProActive Defensep. 57
Technologies for Protection Against Insider Attacks on Computer Systemsp. 75
Authentication, Authorization and Access Control
Full Papers
Access Control and Declassificationp. 85
Reasoning About Delegation and Account Access in Retail Payment Systemsp. 99
Performance Evaluation of Keyless Authentication Based on Noisy Channelp. 115
Avoiding Key Redistribution in Key Assignment Schemesp. 127
Short Papers
Fern: An Updatable Authenticated Dictionary Suitable for Distributed Cachingp. 141
Class of Provably Secure Information Authentication Systemsp. 147
A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systemsp. 153
Language-Based Security, Trust Management and Covert Channels
Full Papers
Synthesis of Non-Interferent Distributed Systemsp. 159
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systemsp. 171
Covert Channel Invisibility Theoremp. 187
Security Verification and Evaluation
Full Papers
Policy-Based Proactive Monitoring of Security Policy Performancep. 197
Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metricp. 213
Abstraction Based Verification of a Parameterised Policy Controlled Systemp. 228
Short Papers
Algebraic Models to Detect and Solve Policy Conflictsp. 242
Event Calculus Based Checking of Filtering Policiesp. 248
A New Approach to Security Evaluation of Operating Systemsp. 254
Intrusion Detection and Prevention
Full Papers
Multi-agent Peer-to-Peer Intrusion Detectionp. 260
An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signaturesp. 272
Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Responsep. 286
Mathematical Models of Intrusion Detection by an Intelligent Immunochipp. 308
A Novel Intrusion Detection System for a Local Computer Networkp. 320
Short Papers
Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Frameworkp. 334
Host-Based Intrusion Detection System: Model and Design Featuresp. 340
Network Survivability and Privacy
Full Papers
Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statisticsp. 346
Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networksp. 362
Anycast Communication - A New Approach to Survivability of Connection-Oriented Networksp. 378
Short Papers
Privacy Preserving Context Transfer in All-IP Networksp. 390
Environment-Aware Trusted Data Delivery in Multipath Wireless Protocolsp. 396
Watermarking
Short Papers
A Spatial Watermarking Algorithm for Video Imagesp. 402
Watermarking Software to Signal Copy Protectionp. 408
Author Indexp. 415
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program