Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings /
Computer Network Security Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings / [electronic resource] :
edited by Vladimir Gorodetsky, Leonard Popyack, Victor Skormin.
- 1st ed. 2003.
- XIV, 478 p. online resource.
- Lecture Notes in Computer Science, 2776 1611-3349 ; .
- Lecture Notes in Computer Science, 2776 .
Invited Papers -- ForNet: A Distributed Forensics Network -- Usage Control: A Vision for Next Generation Access Control -- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL -- Complexity Problems in the Analysis of Information Systems Security -- A Behavior-Based Approach to Securing Email Systems -- Real-Time Intrusion Detection with Emphasis on Insider Attacks -- Mathematical Models and Architectures for Computer Network Security -- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols -- GRID Security Review -- A Knowledge-Based Repository Model for Security Policies Management -- Symbolic Partial Model Checking for Security Analysis -- Rule-Based Systems Security Model -- Logical Resolving for Security Evaluation -- Intrusion Detection -- Enhanced Correlation in an Intrusion Detection Process -- Safeguarding SCADA Systems with Anomaly Detection -- Experiments with Simulation of Attacks against Computer Networks -- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication” -- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences -- Public Key Distribution, Authentication, Access Control -- Distributed Access Control: A Logic-Based Approach -- Advanced Certificate Status Protocol -- Key History Tree: Efficient Group Key Management with Off-Line Members -- A Certificate Status Checking Protocol for the Authenticated Dictionary -- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach -- Cryptography -- A Signcryption Scheme Based on Secret Sharing Technique -- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem -- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper -- On Cipher Design Based on Switchable Controlled Operations -- Elliptic Curve Point Multiplication -- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation -- Steganography -- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel -- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation -- Digital Watermarking under a Filtering and Additive Noise Attack Condition -- Data Hiding in Digital Audio by Frequency Domain Dithering -- Steganography with Least Histogram Abnormality -- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences -- Short Papers -- Authentication of Anycast Communication -- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy -- Construction of the Covert Channels -- Privacy and Data Protection in Electronic Communications -- Multiplier for Public-Key Cryptosystem Based on Cellular Automata -- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols -- Alert Triage on the ROC -- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 -- Immunocomputing Model of Intrusion Detection -- Agent Platform Security Architecture -- Support Vector Machine Based ICMP Covert Channel Attack Detection -- Computer Immunology System with Variable Configuration.
9783540452157
10.1007/b12005 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Operating systems (Computers).
Information technology--Management.
Computers and civilization.
Electronic data processing--Management.
Computer Communication Networks.
Cryptology.
Operating Systems.
Computer Application in Administrative Data Processing.
Computers and Society.
IT Operations.
TK5105.5-5105.9
004.6
Invited Papers -- ForNet: A Distributed Forensics Network -- Usage Control: A Vision for Next Generation Access Control -- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL -- Complexity Problems in the Analysis of Information Systems Security -- A Behavior-Based Approach to Securing Email Systems -- Real-Time Intrusion Detection with Emphasis on Insider Attacks -- Mathematical Models and Architectures for Computer Network Security -- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols -- GRID Security Review -- A Knowledge-Based Repository Model for Security Policies Management -- Symbolic Partial Model Checking for Security Analysis -- Rule-Based Systems Security Model -- Logical Resolving for Security Evaluation -- Intrusion Detection -- Enhanced Correlation in an Intrusion Detection Process -- Safeguarding SCADA Systems with Anomaly Detection -- Experiments with Simulation of Attacks against Computer Networks -- Detecting Malicious Codes by the Presence of Their “Gene of Self-replication” -- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences -- Public Key Distribution, Authentication, Access Control -- Distributed Access Control: A Logic-Based Approach -- Advanced Certificate Status Protocol -- Key History Tree: Efficient Group Key Management with Off-Line Members -- A Certificate Status Checking Protocol for the Authenticated Dictionary -- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach -- Cryptography -- A Signcryption Scheme Based on Secret Sharing Technique -- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem -- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper -- On Cipher Design Based on Switchable Controlled Operations -- Elliptic Curve Point Multiplication -- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation -- Steganography -- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel -- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation -- Digital Watermarking under a Filtering and Additive Noise Attack Condition -- Data Hiding in Digital Audio by Frequency Domain Dithering -- Steganography with Least Histogram Abnormality -- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences -- Short Papers -- Authentication of Anycast Communication -- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy -- Construction of the Covert Channels -- Privacy and Data Protection in Electronic Communications -- Multiplier for Public-Key Cryptosystem Based on Cellular Automata -- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols -- Alert Triage on the ROC -- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 -- Immunocomputing Model of Intrusion Detection -- Agent Platform Security Architecture -- Support Vector Machine Based ICMP Covert Channel Attack Detection -- Computer Immunology System with Variable Configuration.
9783540452157
10.1007/b12005 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Operating systems (Computers).
Information technology--Management.
Computers and civilization.
Electronic data processing--Management.
Computer Communication Networks.
Cryptology.
Operating Systems.
Computer Application in Administrative Data Processing.
Computers and Society.
IT Operations.
TK5105.5-5105.9
004.6