𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Network Security: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings

✍ Scribed by Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igor Kotenko, Victor A. Skormin (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2007
Tongue
English
Leaves
429
Series
Communications in Computer and Information Science 1
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The organizers are proud that the MMM-ACNS workshops hosted by the St. Petersburg Institute for Informatics and Automation in 2001, 2003 and 2005 evolved into a bi-annual series recognized in the professional community. These events not only demonstrated the keen interest of the participating researchers in the subject matter and the opportunity to present and disseminate individual achievements, but also promoted the spirit of cooperation, camaraderie, free exchange of ideas, and intellectually stimulating interaction between colleagues. Again, MMM-ACNS 2007 provided an international forum for sharing or- inal research results among specialists in fundamental and applied problems of computer network security. An important distinction of the conference was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly - pendable computer networks. A total of 56 papers from 18 countries related to signi?cant aspects of both theory and applications ofcomputer networkand informationsecurity weres- mitted to MMM-ACNS 2007. In total, 18 papers were selected for regular p- sentationsand 12 for short presentations(32 % of acceptance for full papers and 53 % for all papers).

✦ Table of Contents


Front Matter....Pages I-XIV
Surreptitious Software: Models from Biology and History....Pages 1-21
Characterizing Software Self-healing Systems....Pages 22-33
Assumptions: The Trojan Horses of Secure Protocols....Pages 34-41
Smart Cards and Digital Security....Pages 42-56
Virus Throttle as Basis for ProActive Defense....Pages 57-74
Technologies for Protection Against Insider Attacks on Computer Systems....Pages 75-84
Access Control and Declassification....Pages 85-98
Reasoning About Delegation and Account Access in Retail Payment Systems....Pages 99-114
Performance Evaluation of Keyless Authentication Based on Noisy Channel....Pages 115-126
Avoiding Key Redistribution in Key Assignment Schemes....Pages 127-140
Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching....Pages 141-146
Class of Provably Secure Information Authentication Systems....Pages 147-152
A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems....Pages 153-158
Synthesis of Non-interferent Distributed Systems....Pages 159-170
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems....Pages 171-186
Covert Channel Invisibility Theorem....Pages 187-196
Policy-Based Proactive Monitoring of Security Policy Performance....Pages 197-212
Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric....Pages 213-227
Abstraction Based Verification of a Parameterised Policy Controlled System....Pages 228-241
Algebraic Models to Detect and Solve Policy Conflicts....Pages 242-247
Event Calcululus Based Checking of Filtering Policies....Pages 248-253
A New Approach to Security Evaluation of Operating Systems....Pages 254-259
Multi-agent Peer-to-Peer Intrusion Detection....Pages 260-271
An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures....Pages 272-285
Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response....Pages 286-307
Mathematical Models of Intrusion Detection by an Intelligent Immunochip....Pages 308-319
A Novel Intrusion Detection System for a Local Computer Network....Pages 320-333
Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework....Pages 334-339
Host-Based Intrusion Detection System: Model and Design Features....Pages 340-345
Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics....Pages 346-361
Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks....Pages 362-377
Anycast Communicationβ€”A New Approach to Survivability of Connection-Oriented Networks....Pages 378-389
Privacy Preserving Context Transfer in All-IP Networks....Pages 390-395
Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols....Pages 396-401
A Spatial Watermarking Algorithm for Video Images....Pages 402-407
Watermarking Software to Signal Copy Protection....Pages 408-413
Back Matter....Pages 415-416

✦ Subjects


Systems and Data Security; Data Mining and Knowledge Discovery; Information Systems Applications (incl.Internet); Computer Systems Organization and Communication Networks


πŸ“œ SIMILAR VOLUMES


Computer Network Security: Second Intern
✍ Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese

Computer Network Security: Third Interna
✍ Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Info

Computer Network Security: Third Interna
✍ Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Info

Computer Network Security: Second Intern
✍ Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese

Computer Network Security: 5th Internati
✍ HervΓ© Debar, Nizar Kheir, Nora Cuppens-Boulahia, FrΓ©dΓ©ric Cuppens (auth.), Igor πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca

Computer Network Security: 5th Internati
✍ HervΓ© Debar, Nizar Kheir, Nora Cuppens-Boulahia, FrΓ©dΓ©ric Cuppens (auth.), Igor πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca