Buch, Englisch, 345 Seiten, Gewicht: 545 g
Reihe: Computer Communication Networks and Telecommunications
5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings
Buch, Englisch, 345 Seiten, Gewicht: 545 g
Reihe: Computer Communication Networks and Telecommunications
ISBN: 978-3-642-14705-0
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Invited Papers.- Service Dependencies in Information Systems Security.- Secure Applications without Secure Infrastructures.- Integrating Types and Specifications for Secure Software Development.- Cryptography for Network Security: Failures, Successes and Challenges.- Group-Centric Models for Secure and Agile Information Sharing.- Security Modeling and Covert Channels.- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors.- Attack and Defense Modeling with BDMP.- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems.- Problems of Modeling in the Analysis of Covert Channels.- Security Policies and Formal Analysis of Security Properties.- Policy-Based Design and Verification for Mission Assurance.- Using Equivalence Relations for Corrective Enforcement of Security Policies.- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus.- Authentication, Authorization, Access Control and Public Key Cryptography.- Credentials Management for High-Value Transactions.- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols.- Credential Chain Discovery in RTT Trust Management Language.- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks.- Intrusion and Malware Detection.- Intellectual Intrusion Detection with Sequences Alignment Methods.- Symptoms-Based Detection of Bot Processes.- A Comparison of Feature-Selection Methods for Intrusion Detection.- From NLP (Natural Language Processing) to MLP (Machine Language Processing).- Security of Multi-agent Systems and Software Protection.- Secure Multi-Agent System for Multi-Hop Environments.- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware.- Security and Scalability of Remote Entrusting Protection.- Adaptive Security, Security Analysis and Virtualization.- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks.- Predictive Security Analysis for Event-Driven Processes.- Virtual Environment Security Modeling.- Clarifying Integrity Control at the Trusted Information Environment.