<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca
Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
β Scribed by Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2012
- Tongue
- English
- Leaves
- 330
- Series
- Lecture Notes in Computer Science 7531 Computer Communication Networks and Telecommunications
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.
β¦ Table of Contents
Front Matter....Pages -
Finding Malware on a Web Scale....Pages 1-2
Exposing Security Risks for Commercial Mobile Devices....Pages 3-21
From Qualitative to Quantitative Enforcement of Security Policy....Pages 22-35
Design and Implementation of a Cloud-Based Assured Information Sharing System....Pages 36-50
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries....Pages 51-64
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols....Pages 65-76
Blind 384-bit Digital Signature Scheme....Pages 77-83
RABAC: Role-Centric Attribute-Based Access Control....Pages 84-96
Trust-Aware RBAC....Pages 97-107
Alternative Mechanisms for Information Security....Pages 108-113
Enforcing Information Flow Policies by a Three-Valued Analysis....Pages 114-129
Towards the Orchestration of Secured Services under Non-disclosure Policies....Pages 130-145
An Approach for Network Information Flow Analysis for Systems of Embedded Components....Pages 146-155
Individual Countermeasure Selection Based on the Return On Response Investment Index....Pages 156-170
Security and Reliability Requirements for Advanced Security Event Management....Pages 171-180
Model-Based Security Event Management....Pages 181-190
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks....Pages 191-202
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation....Pages 203-217
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems....Pages 218-225
Malware Characterization Using Behavioral Components....Pages 226-239
MADAM: A Multi-level Anomaly Detector for Android Malware....Pages 240-253
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods....Pages 254-269
Configuration-Based Approach to Embedded Device Security....Pages 270-285
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts....Pages 286-298
Security Modeling of Grid Systems Using Petri Nets....Pages 299-308
Using Graph Theory for Cloud System Security Modeling....Pages 309-318
Back Matter....Pages -
β¦ Subjects
Systems and Data Security; Computer Communication Networks; Computers and Society; Data Encryption; Operating Systems; Computer System Implementation
π SIMILAR VOLUMES
<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca
<p>This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13β15, 2007. The workshop was organized by the St. Petersburg Institute for I
This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented
<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese