Computer Network Security
Springer Berlin (Verlag)
978-3-540-73985-2 (ISBN)
Invited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication-A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.
Erscheint lt. Verlag | 28.8.2007 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | XIV, 418 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 664 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Schlagworte | Access Control • adaptive security • algorithms • Architecture • authentication • authorizati • authorization • covert channels • Data Mining • Data Security • deception systems • Digital rights management • Dom • DoS attacks • eCommerce • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Warfare • language-based security • machine learning • Networks • Network Security • network survivability • organization • pervasive and ubiquitous computing • risk analysis and risk management • security • Smart card • software protection • trust management • Viruses • vulnerability assessment |
ISBN-10 | 3-540-73985-8 / 3540739858 |
ISBN-13 | 978-3-540-73985-2 / 9783540739852 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich