did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540421030

Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security : International Workshop Mmm-Acns 2001, St. Petersburg, Russia, May 21-23, 2001 : Proceedings

by ; ;
  • ISBN13:

    9783540421030

  • ISBN10:

    3540421033

  • Format: Paperback
  • Copyright: 2001-05-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $70.31
  • Digital
    $62.16
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography: mathematical basis, protocols, and applied methods.

Table of Contents

Invited Talks
An Intelligent Decision Support System for Intrusion Detection and Response
1(14)
Dipankar Dasgupta
Fabio A. Gonzalez
Mathematical Models of the Covert Channels
15(6)
Alexander Grusho
Open Issues in Formal Methods for Cryptographic Protocol Analysis
21(1)
Catherine Meadows
Future Directions in Role-Based Access Control Models
22(5)
Ravi Sandhu
Secure Networked Computing
27(1)
Vijay Varadharajan
Network Security Systems: Foundations, Models, and Architectures
Composability of Secrecy
28(11)
Jan Jurjens
Agent-Based Model of Computer Network Security System: A Case Study
39(12)
Vladimier I. Gorodetski
O. Karsayev
A. Khabalov
I. Kotenko
Leonard J. Popyack
Victor A. Skormin
Security Considerations and Models for Service Creation in Premium IP Networks
51(12)
Michael Smirnov
Secure Systems Design Technology
63(9)
Peter D. Zegzhda
Dmitry P. Zegzhda
A Privacy-Enhancing e-Business Model Based on Infomediaries
72(12)
Dimitris Gritzalis
Konstantinos Moulinos
Konstantinos Kostis
Applying Practical Formal Methods to the Specification and Analysis of Security Properties
84(6)
Constance Heitmeyer
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ)
90(12)
Andrey Kostogryzov
Analyzing Separation of Duties in Petri Net Workflows
102(13)
Konstantin Knorr
Harald Weidner
Intrusion Detection: Foundations and Models
Information Security with Formal Immune Networks
115(12)
Alexander O. Tarakanov
BASIS: A Biological Approach to System Information Security
127(16)
Victor A. Skormin
Jose G. Delgado-Frias
Dennis L. McGee
Joseph V. Giordano
Leonard J. Popyack
Vladimer I. Gorodetski
Alexander O. Tarakanov
Learning Temporal Regularities of User Behavior for Anomaly Detection
143(10)
Alexandr Seleznyou
Oleksiy Mazhelis
Seppo Puuronen
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
153(6)
Harjit Singh
Steven Furnell
Benn Lines
Paul Dowland
Access Control, Authentication, and Authorization
Typed MSR: Syntax and Examples
159(19)
Iliano Cervesato
TRBACN: A Temporal Authorization Model
178(11)
Steve Barker
The Set and Function Approach to Modeling Authorization in Distributed Systems
189(18)
Tatyana Ryutov
Chlifford Neuman
Fenix Secure Operating System: Principles, Models, and Architecture
207(12)
Dmitry P. Zegzhda
Pavel G. Stepanov
Alexey D. Otavin
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
Generalized Oblivious Transfer Protocols Based on Noisy Channels
219(11)
Valeri Korjik
Kirill Morozov
Controlled Operations as a Cryptographic Primitive
230(12)
Boris V. Izotov
Alexander A. Moldovyan
Nick A. Moldovyan
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes
242(9)
Viktor Yakovlev
Valery Korjik
Alexander Sinuk
Dynamic Group Key Management Protocol
251(12)
Ghassan Chaddoud
Isabelle Chrisment
Andre Schaff
SVD-Based Approach to Transparent Embedding Data into Digital Images
263(12)
Vladimir I. Gorodetski
Leonard J. Popyack
Vladimir Samoilov
Victor A. Skormin
Fast Encryption Algorithm Spectr-H64
275(12)
Nick D. Goots
Alexander A. Moldovyan
Nick A. Moldovyan
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
287(13)
Antonio Durante
Riccardo Focardi
Roberto Gorrieri
On Some Cryptographic Properties of Rijndael
300(13)
Selcuk Kavut
Melek D. Yucel
Author Index 313

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program