E-Book, Englisch, Band 2052, 316 Seiten, eBook
Gorodetski / Skormin / Popyack Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security
Erscheinungsjahr 2003
ISBN: 978-3-540-45116-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
International Workshop MMM-ACNS 2001 St. Petersburg, Russia, May 21-23, 2001 Proceedings
E-Book, Englisch, Band 2052, 316 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-45116-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Invited Talks.- An Intelligent Decision Support System for Intrusion Detection and Response.- Mathematical Models of the Covert Channels.- Open Issues in Formal Methods for Cryptographic Protocol Analysis.- Future Directions in Role-Based Access Control Models.- Secure Networked Computing.- Network Security Systems: Foundations, Models, and Architectures.- Composability of Secrecy.- Agent-Based Model of Computer Network Security System: A Case Study.- Security Considerations and Models for Service Creation in Premium IP Networks.- Secure Systems Design Technology.- A Privacy-Enhancing e-Business Model Based on Infomediaries.- Applying Practical Formal Methods to the Specification and Analysis of Security Properties.- Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ).- Analyzing Separation of Duties in Petri Net Workflows.- Intrusion Detection: Foundations and Models.- Information Security with Formal Immune Networks.- BASIS: A Biological Approach to System Information Security.- Learning Temporal Regularities of User Behavior for Anomaly Detection.- Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.- Access Control, Authentication, and Authorization.- Typed MSR: Syntax and Examples.- TRBACN: A Temporal Authorization Model.- The Set and Function Approach to Modeling Authorization in Distributed Systems.- Fenix Secure Operating System: Principles, Models, and Architecture.- Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods.- Generalized Oblivious Transfer Protocols Based on Noisy Channels.- Controlled Operations as a Cryptographic Primitive.- Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes.- Dynamic Group Key Management Protocol.- SVD-Based Approach to Transparent Embedding Data into Digital Images.- Fast Encryption Algorithm Spectr-H64.- CVS at Work: A Report on New Failures upon Some Cryptographic Protocols.- On Some Cryptographic Properties of Rijndael.