Invited Papers | |
Academia Track | |
Surreptitious Software: Models from Biology and History | p. 1 |
Characterizing Software Self-healing Systems | p. 22 |
Assumptions: The Trojan Horses of Secure Protocols | p. 34 |
Industry Track | |
Smart Cards and Digital Security | p. 42 |
Virus Throttle as Basis for ProActive Defense | p. 57 |
Technologies for Protection Against Insider Attacks on Computer Systems | p. 75 |
Authentication, Authorization and Access Control | |
Full Papers | |
Access Control and Declassification | p. 85 |
Reasoning About Delegation and Account Access in Retail Payment Systems | p. 99 |
Performance Evaluation of Keyless Authentication Based on Noisy Channel | p. 115 |
Avoiding Key Redistribution in Key Assignment Schemes | p. 127 |
Short Papers | |
Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching | p. 141 |
Class of Provably Secure Information Authentication Systems | p. 147 |
A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems | p. 153 |
Language-Based Security, Trust Management and Covert Channels | |
Full Papers | |
Synthesis of Non-Interferent Distributed Systems | p. 159 |
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems | p. 171 |
Covert Channel Invisibility Theorem | p. 187 |
Security Verification and Evaluation | |
Full Papers | |
Policy-Based Proactive Monitoring of Security Policy Performance | p. 197 |
Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric | p. 213 |
Abstraction Based Verification of a Parameterised Policy Controlled System | p. 228 |
Short Papers | |
Algebraic Models to Detect and Solve Policy Conflicts | p. 242 |
Event Calculus Based Checking of Filtering Policies | p. 248 |
A New Approach to Security Evaluation of Operating Systems | p. 254 |
Intrusion Detection and Prevention | |
Full Papers | |
Multi-agent Peer-to-Peer Intrusion Detection | p. 260 |
An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures | p. 272 |
Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response | p. 286 |
Mathematical Models of Intrusion Detection by an Intelligent Immunochip | p. 308 |
A Novel Intrusion Detection System for a Local Computer Network | p. 320 |
Short Papers | |
Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework | p. 334 |
Host-Based Intrusion Detection System: Model and Design Features | p. 340 |
Network Survivability and Privacy | |
Full Papers | |
Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics | p. 346 |
Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks | p. 362 |
Anycast Communication - A New Approach to Survivability of Connection-Oriented Networks | p. 378 |
Short Papers | |
Privacy Preserving Context Transfer in All-IP Networks | p. 390 |
Environment-Aware Trusted Data Delivery in Multipath Wireless Protocols | p. 396 |
Watermarking | |
Short Papers | |
A Spatial Watermarking Algorithm for Video Images | p. 402 |
Watermarking Software to Signal Copy Protection | p. 408 |
Author Index | p. 415 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.