𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

✍ Scribed by Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2003
Tongue
English
Leaves
484
Series
Lecture Notes in Computer Science 2776
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.

The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography.

✦ Table of Contents


Front Matter....Pages -
ForNet: A Distributed Forensics Network....Pages 1-16
Usage Control: A Vision for Next Generation Access Control....Pages 17-31
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL....Pages 32-46
Complexity Problems in the Analysis of Information Systems Security....Pages 47-56
A Behavior-Based Approach to Securing Email Systems....Pages 57-81
Real-Time Intrusion Detection with Emphasis on Insider Attacks....Pages 82-85
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols....Pages 86-99
GRID Security Review....Pages 100-111
A Knowledge-Based Repository Model for Security Policies Management....Pages 112-121
Symbolic Partial Model Checking for Security Analysis....Pages 122-134
Rule-Based Systems Security Model....Pages 135-146
Logical Resolving for Security Evaluation....Pages 147-156
Enhanced Correlation in an Intrusion Detection Process....Pages 157-170
Safeguarding SCADA Systems with Anomaly Detection....Pages 171-182
Experiments with Simulation of Attacks against Computer Networks....Pages 183-194
Detecting Malicious Codes by the Presence of Their β€œGene of Self-replication”....Pages 195-205
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences....Pages 206-216
Distributed Access Control: A Logic-Based Approach....Pages 217-228
Advanced Certificate Status Protocol....Pages 229-240
Key History Tree: Efficient Group Key Management with Off-Line Members....Pages 241-254
A Certificate Status Checking Protocol for the Authenticated Dictionary....Pages 255-266
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach....Pages 267-278
A Signcryption Scheme Based on Secret Sharing Technique....Pages 279-288
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem....Pages 289-297
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property....Pages 298-307
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper....Pages 308-315
On Cipher Design Based on Switchable Controlled Operations....Pages 316-327
Elliptic Curve Point Multiplication....Pages 328-336
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation....Pages 337-348
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel....Pages 349-359
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation....Pages 360-370
Digital Watermarking under a Filtering and Additive Noise Attack Condition....Pages 371-382
Data Hiding in Digital Audio by Frequency Domain Dithering....Pages 383-394
Steganography with Least Histogram Abnormality....Pages 395-406
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences....Pages 407-418
Authentication of Anycast Communication....Pages 419-423
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy....Pages 424-427
Construction of the Covert Channels....Pages 428-431
Privacy and Data Protection in Electronic Communications....Pages 432-435
Multiplier for Public-Key Cryptosystem Based on Cellular Automata....Pages 436-439
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols....Pages 440-443
Alert Triage on the ROC....Pages 444-448
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64....Pages 449-452
Immunocomputing Model of Intrusion Detection....Pages 453-456
Agent Platform Security Architecture....Pages 457-460
Support Vector Machine Based ICMP Covert Channel Attack Detection....Pages 461-464
Computer Immunology System with Variable Configuration....Pages 465-468
Back Matter....Pages -

✦ Subjects


Computer Communication Networks; Operating Systems; Data Encryption; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems


πŸ“œ SIMILAR VOLUMES


Computer Network Security: Second Intern
✍ Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.</P><P>The 29 revised full papers and 12 revised short papers prese

Computer Network Security: Third Interna
✍ Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Info

Computer Network Security: Third Interna
✍ Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Info

Computer Network Security: Fourth Intern
✍ Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igo πŸ“‚ Library πŸ“… 2007 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for I

Information Assurance in Computer Networ
✍ Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. πŸ“‚ Library πŸ“… 2001 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.<BR>The 24 revised full papers presented together with five invited contributions were caref

Information Assurance in Computer Networ
✍ Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. πŸ“‚ Library πŸ“… 2001 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.<BR>The 24 revised full papers presented together with five invited contributions were caref