𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

✍ Scribed by Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2012
Tongue
English
Leaves
330
Series
Lecture Notes in Computer Science 7531 Computer Communication Networks and Telecommunications
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

✦ Table of Contents


Front Matter....Pages -
Finding Malware on a Web Scale....Pages 1-2
Exposing Security Risks for Commercial Mobile Devices....Pages 3-21
From Qualitative to Quantitative Enforcement of Security Policy....Pages 22-35
Design and Implementation of a Cloud-Based Assured Information Sharing System....Pages 36-50
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries....Pages 51-64
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols....Pages 65-76
Blind 384-bit Digital Signature Scheme....Pages 77-83
RABAC: Role-Centric Attribute-Based Access Control....Pages 84-96
Trust-Aware RBAC....Pages 97-107
Alternative Mechanisms for Information Security....Pages 108-113
Enforcing Information Flow Policies by a Three-Valued Analysis....Pages 114-129
Towards the Orchestration of Secured Services under Non-disclosure Policies....Pages 130-145
An Approach for Network Information Flow Analysis for Systems of Embedded Components....Pages 146-155
Individual Countermeasure Selection Based on the Return On Response Investment Index....Pages 156-170
Security and Reliability Requirements for Advanced Security Event Management....Pages 171-180
Model-Based Security Event Management....Pages 181-190
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks....Pages 191-202
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation....Pages 203-217
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems....Pages 218-225
Malware Characterization Using Behavioral Components....Pages 226-239
MADAM: A Multi-level Anomaly Detector for Android Malware....Pages 240-253
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods....Pages 254-269
Configuration-Based Approach to Embedded Device Security....Pages 270-285
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts....Pages 286-298
Security Modeling of Grid Systems Using Petri Nets....Pages 299-308
Using Graph Theory for Cloud System Security Modeling....Pages 309-318
Back Matter....Pages -

✦ Subjects


Systems and Data Security; Computer Communication Networks; Computers and Society; Data Encryption; Operating Systems; Computer System Implementation


πŸ“œ SIMILAR VOLUMES


Computer Network Security: 5th Internati
✍ HervΓ© Debar, Nizar Kheir, Nora Cuppens-Boulahia, FrΓ©dΓ©ric Cuppens (auth.), Igor πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca

Computer Network Security: 5th Internati
✍ HervΓ© Debar, Nizar Kheir, Nora Cuppens-Boulahia, FrΓ©dΓ©ric Cuppens (auth.), Igor πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca

Computer Network Security: Fourth Intern
✍ Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igo πŸ“‚ Library πŸ“… 2007 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for I

Computer Network Security: 5th Internati
✍ Igor Kotenko, Victor Skormin πŸ“‚ Library πŸ“… 2010 🌐 English

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented

Computer Network Security: Second Intern
✍ Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese