Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings / Edition 1

Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings / Edition 1

by Vladimir Gorodetsky
     
 

This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.

The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected

See more details below

Overview

This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.

The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography.

Product Details

ISBN-13:
9783540407973
Publisher:
Springer Berlin Heidelberg
Publication date:
11/05/2003
Series:
Lecture Notes in Computer Science Series, #2776
Edition description:
2003
Pages:
478
Product dimensions:
0.99(w) x 6.14(h) x 9.21(d)

Meet the Author

Table of Contents

Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Prools.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”.- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Prool.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Prool for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.- Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Prools.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >