


default search action
MMM-ACNS 2005: St. Petersburg, Russia
- Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin:
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings. Lecture Notes in Computer Science 3685, Springer 2005, ISBN 3-540-29113-X
Invited Papers
- Naranker Dulay, Emil C. Lupu, Morris Sloman
, Joe Sventek, Nagwa L. Badr, Steven Heeps:
Self-managed Cells for Ubiquitous Systems. 1-6 - Ming-Yuh Huang:
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. 7-22 - Vipin Swarup, Sushil Jajodia, Joseph Pamula:
Rule-Based Topological Vulnerability Analysis. 23-37 - David M. Nicol, Michael Liljenstam:
Models and Analysis of Active Worm Defense. 38-53 - Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski:
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. 54-75
Mathematical Models, Architectures and Protocols for Computer Network Security
- Duncan A. Buell
:
Calibrating Entropy Functions Applied to Computer Networks. 76-87 - Constantine Daicos, Scott Knight:
A Passive External Web Surveillance Technique for Private Networks. 88-103 - Jacques Demerjian
, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz:
A Secure Way to Combine IPsec, NAT & DHCP. 104-118 - Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu:
A Generic Model for Analyzing Security Protocols. 119-128 - Joseph E. Johnson:
Networks, Markov Lie Monoids, and Generalized Entropy. 129-135 - Mikhail I. Smirnov:
Trust by Workflow in Autonomic Communication. 136-150 - Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
An Ontology-Based Approach to Information Systems Security Management. 151-164
Authentication, Authorization and Access Control
- Philippe Balbiani
, Fahima Cheikh:
Safety Problems in Access Control with Temporal Constraints. 165-178 - Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin:
A Modal Logic for Role-Based Access Control. 179-193 - Peter Schartner, Martin Schaffer:
Unique User-Generated Digital Pseudonyms. 194-205
Information Flow Analysis, Covert Channels and Trust Management
- Danièle Beauquier, Marie Duflot
, Marius Minea
:
A Probabilistic Property-Specific Approach to Information Flow. 206-220 - Roberto Giacobazzi, Isabella Mastroeni
:
Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata. 221-234 - Alexander A. Grusho
, Alexander Kniazev, Elena E. Timonina
:
Detection of Illegal Information Flow. 235-244 - Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu:
Towards More Controllable and Practical Delegation. 245-258
Security Policy and Operating System Security
- Félix J. García Clemente
, Jesús D. Jiménez Re, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Policy-Driven Routing Management Using CIM. 259-271 - Dmitry P. Zegzhda, Alex M. Vovk:
Secure Hybrid Operating System "Linux over Fenix". 272-285 - Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He:
A Formal Description of SECIMOS Operating System. 286-297
Threat Modeling, Vulnerability Assessment and Network Forensics
- Fabrizio Baiardi
, Claudio Telmon:
A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures. 298-310 - Igor V. Kotenko
, Mikhail Stepashkin:
Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. 311-324 - Slim Rekhis
, Noureddine Boudriga:
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. 325-338 - Peter D. Zegzhda
, Dmitry P. Zegzhda, Maxim O. Kalinin
:
Vulnerabilities Detection in the Configurations of MS Windows Operating System. 339-351
Intrusion Detection
- Abdulrahman Alharby
, Hideki Imai:
Hybrid Intrusion Detection Model Based on Ordered Sequences. 352-365 - Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov:
Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. 366-379 - Victor Serdiouk:
Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. 380-393 - Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov:
A Formal Immune Network and Its Implementation for On-line Intrusion Detection. 394-405
Short Papers
- Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:
Foundation for a Time Interval Access Control Model. 406-411 - Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:
Developing an Insider Threat Model Using Functional Decomposition. 412-417 - Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta
:
An XML-Seamless Policy Based Management Framework. 418-423 - Alexei Galatenko, Alexander A. Grusho
, Alexander Kniazev, Elena E. Timonina
:
Statistical Covert Channels Through PROXY Server. 424-429 - Ernö Jeges, Zoltán Hornák, Csaba Körmöczi:
Encoding Private Key in Fingerprint. 430-435 - Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim:
A New Scheme for the Location Information Protection in Mobile Communication Environments. 436-441 - Wojciech Molisz, Jacek Rak
:
Region Protection/Restoration Scheme in Survivable Networks. 442-447 - Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger:
Massive Data Mining for Polymorphic Code Detection. 448-453 - Martin Schaffer, Peter Schartner:
Key Escrow with Tree-Based Access Structure. 454-459 - Artem Tishkov
, Igor V. Kotenko
, Ekaterina Sidelnikova:
Security Checker Architecture for Policy-Based Security Management. 460-465 - Soomi Yang:
An Efficient Access Control Model Utilized the Attribute Certificate Structuring. 466-471 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Secure Protected Password Change Scheme. 472-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.