Information Assurance in Computer Networks: Methods, Models and Architectures for Network Security
Springer Berlin (Verlag)
978-3-540-42103-0 (ISBN)
The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography: mathematical basis, protocols, and applied methods.
Invited Talks.- An Intelligent Decision Support System for Intrusion Detection and Response.- Mathematical Models of the Covert Channels.- Open Issues in Formal Methods for Cryptographic Protocol Analysis.- Future Directions in Role-Based Access Control Models.- Secure Networked Computing.- Network Security Systems: Foundations, Models, and Architectures.- Composability of Secrecy.- Agent-Based Model of Computer Network Security System: A Case Study.- Security Considerations and Models for Service Creation in Premium IP Networks.- Secure Systems Design Technology.- A Privacy-Enhancing e-Business Model Based on Infomediaries.- Applying Practical Formal Methods to the Specification and Analysis of Security Properties.- Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ).- Analyzing Separation of Duties in Petri Net Workflows.- Intrusion Detection: Foundations and Models.- Information Security with Formal Immune Networks.- BASIS: A Biological Approach to System Information Security.- Learning Temporal Regularities of User Behavior for Anomaly Detection.- Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.- Access Control, Authentication, and Authorization.- Typed MSR: Syntax and Examples.- TRBACN: A Temporal Authorization Model.- The Set and Function Approach to Modeling Authorization in Distributed Systems.- Fenix Secure Operating System: Principles, Models, and Architecture.- Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods.- Generalized Oblivious Transfer Protocols Based on Noisy Channels.- Controlled Operations as a Cryptographic Primitive.- Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes.- Dynamic Group Key Management Protocol.- SVD-Based Approach to Transparent Embedding Data into Digital Images.- Fast Encryption Algorithm Spectr-H64.- CVS at Work: A Report on New Failures upon Some Cryptographic Protocols.- On Some Cryptographic Properties of Rijndael.
Erscheint lt. Verlag | 9.5.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 316 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 472 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • authentication • computer network • cryptography • Crytpography • Data Security • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • HC/Informatik, EDV/Datenkommunikation, Netzwerke • HC/Informatik, EDV/Informatik • Information • Information Security • Network Security • privacy • Secure Communications • Secure Networking • security • Security Systems • Steganography • Systems Security |
ISBN-10 | 3-540-42103-3 / 3540421033 |
ISBN-13 | 978-3-540-42103-0 / 9783540421030 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich