<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese
Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13β15, 2007 Proceedings
β Scribed by Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2007
- Tongue
- English
- Leaves
- 429
- Series
- Communications in Computer and Information Science 1
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13β15, 2007. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The organizers are proud that the MMM-ACNS workshops hosted by the St. Petersburg Institute for Informatics and Automation in 2001, 2003 and 2005 evolved into a bi-annual series recognized in the professional community. These events not only demonstrated the keen interest of the participating researchers in the subject matter and the opportunity to present and disseminate individual achievements, but also promoted the spirit of cooperation, camaraderie, free exchange of ideas, and intellectually stimulating interaction between colleagues. Again, MMM-ACNS 2007 provided an international forum for sharing or- inal research results among specialists in fundamental and applied problems of computer network security. An important distinction of the conference was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly - pendable computer networks. A total of 56 papers from 18 countries related to signi?cant aspects of both theory and applications ofcomputer networkand informationsecurity weres- mitted to MMM-ACNS 2007. In total, 18 papers were selected for regular p- sentationsand 12 for short presentations(32 % of acceptance for full papers and 53 % for all papers).
β¦ Table of Contents
Front Matter....Pages I-XIV
Surreptitious Software: Models from Biology and History....Pages 1-21
Characterizing Software Self-healing Systems....Pages 22-33
Assumptions: The Trojan Horses of Secure Protocols....Pages 34-41
Smart Cards and Digital Security....Pages 42-56
Virus Throttle as Basis for ProActive Defense....Pages 57-74
Technologies for Protection Against Insider Attacks on Computer Systems....Pages 75-84
Access Control and Declassification....Pages 85-98
Reasoning About Delegation and Account Access in Retail Payment Systems....Pages 99-114
Performance Evaluation of Keyless Authentication Based on Noisy Channel....Pages 115-126
Avoiding Key Redistribution in Key Assignment Schemes....Pages 127-140
Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching....Pages 141-146
Class of Provably Secure Information Authentication Systems....Pages 147-152
A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems....Pages 153-158
Synthesis of Non-interferent Distributed Systems....Pages 159-170
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems....Pages 171-186
Covert Channel Invisibility Theorem....Pages 187-196
Policy-Based Proactive Monitoring of Security Policy Performance....Pages 197-212
Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric....Pages 213-227
Abstraction Based Verification of a Parameterised Policy Controlled System....Pages 228-241
Algebraic Models to Detect and Solve Policy Conflicts....Pages 242-247
Event Calcululus Based Checking of Filtering Policies....Pages 248-253
A New Approach to Security Evaluation of Operating Systems....Pages 254-259
Multi-agent Peer-to-Peer Intrusion Detection....Pages 260-271
An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures....Pages 272-285
Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response....Pages 286-307
Mathematical Models of Intrusion Detection by an Intelligent Immunochip....Pages 308-319
A Novel Intrusion Detection System for a Local Computer Network....Pages 320-333
Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework....Pages 334-339
Host-Based Intrusion Detection System: Model and Design Features....Pages 340-345
Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics....Pages 346-361
Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks....Pages 362-377
Anycast CommunicationβA New Approach to Survivability of Connection-Oriented Networks....Pages 378-389
Privacy Preserving Context Transfer in All-IP Networks....Pages 390-395
Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols....Pages 396-401
A Spatial Watermarking Algorithm for Video Images....Pages 402-407
Watermarking Software to Signal Copy Protection....Pages 408-413
Back Matter....Pages 415-416
β¦ Subjects
Systems and Data Security; Data Mining and Knowledge Discovery; Information Systems Applications (incl.Internet); Computer Systems Organization and Communication Networks
π SIMILAR VOLUMES
<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25β27, 2005. The workshop was organized by the St. Petersburg Institute for Info
<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25β27, 2005. The workshop was organized by the St. Petersburg Institute for Info
<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese
<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca
<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca