HOME > 상세정보

상세정보

Information assurance in computer networks : methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001

Information assurance in computer networks : methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001

자료유형
단행본
개인저자
Gorodetski, Vladimir I., 1937-. Skormin, Victor A., 1946-. Popyack, Leonard J., 1963-.
서명 / 저자사항
Information assurance in computer networks : methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001 / Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.).
발행사항
Berlin ;   New York :   Springer,   c2001.  
형태사항
xiii, 311 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science ;2052
ISBN
3540421033 (pbk. : alk. paper)
일반주기
Also available via the World Wide Web.
서지주기
Includes bibliographical references.
이용가능한 다른형태자료
Also available via the World Wide Web.  
일반주제명
Computer security -- Congresses. Computer networks -- Security measures.
바로가기
URL Restricted to Springer LINK subscribers  
000 01484camuu2200349 a 4500
001 000000763698
005 20020410103147
007 cruun
008 010423s2001 gw a b 101 0 eng
010 ▼a ?01032220
020 ▼a 3540421033 (pbk. : alk. paper)
040 ▼a DLC ▼c DLC ▼d CUS ▼d C#P ▼d C$Q ▼d 211009
042 ▼a pcc
049 1 ▼l 111197895
050 0 0 ▼a QA76.9.A25 ▼b M65 2001
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b M685i
111 2 ▼a MMM-ACNS 2001 ▼d (2001 : ▼c Saint Petersburg, Russia)
245 1 0 ▼a Information assurance in computer networks : ▼b methods, models, and architectures for network security : international workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001 / ▼c Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.).
246 3 0 ▼a MMM-ACNS 2001
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2001.
300 ▼a xiii, 311 p. : ▼b ill. ; ▼c 24 cm.
440 0 ▼a Lecture notes in computer science ; ▼v 2052
504 ▼a Includes bibliographical references.
530 ▼a Also available via the World Wide Web.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Gorodetski, Vladimir I., ▼d 1937-.
700 1 ▼a Skormin, Victor A., ▼d 1946-.
700 1 ▼a Popyack, Leonard J., ▼d 1963-.
856 4 1 ▼u http://link.springer-ny.com/link/service/series/0558/tocs/t2052.htm ▼z Restricted to Springer LINK subscribers

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 M685i 등록번호 111197895 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.
The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography: mathematical basis, protocols, and applied methods.


정보제공 : Aladin

목차

Invited Talks.- An Intelligent Decision Support System for Intrusion Detection and Response.- Mathematical Models of the Covert Channels.- Open Issues in Formal Methods for Cryptographic Protocol Analysis.- Future Directions in Role-Based Access Control Models.- Secure Networked Computing.- Network Security Systems: Foundations, Models, and Architectures.- Composability of Secrecy.- Agent-Based Model of Computer Network Security System: A Case Study.- Security Considerations and Models for Service Creation in Premium IP Networks.- Secure Systems Design Technology.- A Privacy-Enhancing e-Business Model Based on Infomediaries.- Applying Practical Formal Methods to the Specification and Analysis of Security Properties.- Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ).- Analyzing Separation of Duties in Petri Net Workflows.- Intrusion Detection: Foundations and Models.- Information Security with Formal Immune Networks.- BASIS: A Biological Approach to System Information Security.- Learning Temporal Regularities of User Behavior for Anomaly Detection.- Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.- Access Control, Authentication, and Authorization.- Typed MSR: Syntax and Examples.- TRBACN: A Temporal Authorization Model.- The Set and Function Approach to Modeling Authorization in Distributed Systems.- Fenix Secure Operating System: Principles, Models, and Architecture.- Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods.- Generalized Oblivious Transfer Protocols Based on Noisy Channels.- Controlled Operations as a Cryptographic Primitive.- Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes.- Dynamic Group Key Management Protocol.- SVD-Based Approach to Transparent Embedding Data into Digital Images.- Fast Encryption Algorithm Spectr-H64.- CVS at Work: A Report on New Failures upon Some Cryptographic Protocols.- On Some Cryptographic Properties of Rijndael.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)