Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, Mmm-Acns 2

個数:
  • ポイントキャンペーン

Computer Network Security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, Mmm-Acns 2

  • ウェブストア価格 ¥10,594(本体¥9,631)
  • Springer Verlag(2003/08発売)
  • 外貨定価 US$ 54.99
  • ゴールデンウィーク ポイント2倍キャンペーン対象商品(5/6まで)
  • ポイント 192pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 470 p.
  • 言語 ENG
  • 商品コード 9783540407973
  • DDC分類 005.8

Full Description

This volume contains the papers presented at the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Se- rity(MMM-ACNS2003)heldinSt.Petersburg,Russia,duringSeptember21-23, 2003.TheworkshopwasorganizedbytheSt.PetersburgInstituteforInformatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with the Russian Foundation for Basic Research (RFBR), the US Air Force - search Laboratory/Information Directorate (AFRL/IF) and the Air Force O?ce of Scienti?c Research (AFOSR), the O?ce of Naval Research International Field O?ce (USA), and Binghamton University (SUNY, USA). The ?rst international workshop of this series, MMM-ACNS2001, May 21- 23, 2001, St. Petersburg, Russia, hosted by the St. Petersburg Institute for - formatics and Automation, demonstrated the keen interest of the international researchcommunityinthetheoreticalaspectsofcomputernetworkandinfor- tion security and encouraged the establishment of an on-going series of brennial workshops.
MMM-ACNS2003 provided an international forum for sharing original - search results and application experiences among specialists in fundamental and applied problems of computer network security. An important distinction of the workshop was its focus on mathematical aspects of information and computer networksecurityandtheroleofmathematicalissuesincontemporaryandfuture development of models of secure computing.

Contents

Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their "Gene of Self-replication".- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Protocol.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Protocol for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.-Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.