HOME > 상세정보

상세정보

Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003

Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003

자료유형
단행본
개인저자
Gorodetski, Vladimir I., 1937-. Popyack, Leonard J., 1963-. Skormin, Victor A., 1946-.
서명 / 저자사항
Computer network security : Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : proceedings / Vladimir Gorodetsky, Leonard Popyack, Victor Skormin eds.
발행사항
Berlin ;   New York :   Springer,   c2003.  
형태사항
xiv, 470 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2776
ISBN
3540407979 (pbk. : alk. paper) 9783540407973 (pbk. : alk. paper)
일반주제명
Computer security -- Congresses. Computer networks -- Security measures -- Congresses.
000 02052camuu2200409 a 4500
001 000045562121
005 20091127142747
008 030804s2003 gw a b 101 0 eng
010 ▼a 2003058583
020 ▼a 3540407979 (pbk. : alk. paper)
020 ▼a 9783540407973 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm52858526
035 ▼a (OCoLC)52858526
035 ▼a (KERIS)REF000009604154
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I565 2003
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b I6192c ▼c 2
111 2 ▼a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security ▼n (2nd : ▼d 2003 : ▼c Saint Petersburg, Russia)
245 1 0 ▼a Computer network security : ▼b Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : proceedings / ▼c Vladimir Gorodetsky, Leonard Popyack, Victor Skormin eds.
246 3 ▼a 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a Mathematical Methods, Models, and Architectures for Computer Network Security
246 3 0 ▼a MMM-ACNS 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2003.
300 ▼a xiv, 470 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2776
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
700 1 ▼a Gorodetski, Vladimir I., ▼d 1937-.
700 1 ▼a Popyack, Leonard J., ▼d 1963-.
700 1 ▼a Skormin, Victor A., ▼d 1946-.
830 0 ▼a Lecture notes in computer science ; ▼v 2776.
945 ▼a KINS

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187016 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187017 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 3 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 I6192c 2 등록번호 151364998 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187016 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6192c 2 등록번호 121187017 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 I6192c 2 등록번호 151364998 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

This volume contains the papers presented at the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Se- rity(MMM-ACNS2003)heldinSt.Petersburg,Russia,duringSeptember21 23, 2003.TheworkshopwasorganizedbytheSt.PetersburgInstituteforInformatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with the Russian Foundation for Basic Research (RFBR), the US Air Force - search Laboratory/Information Directorate (AFRL/IF) and the Air Force O?ce of Scienti?c Research (AFOSR), the O?ce of Naval Research International Field O?ce (USA), and Binghamton University (SUNY, USA). The ?rst international workshop of this series, MMM-ACNS2001, May 21 23, 2001, St. Petersburg, Russia, hosted by the St. Petersburg Institute for - formatics and Automation, demonstrated the keen interest of the international researchcommunityinthetheoreticalaspectsofcomputernetworkandinfor- tion security and encouraged the establishment of an on-going series of brennial workshops. MMM-ACNS2003 provided an international forum for sharing original - search results and application experiences among specialists in fundamental and applied problems of computer network security. An important distinction of the workshop was its focus on mathematical aspects of information and computer networksecurityandtheroleofmathematicalissuesincontemporaryandfuture development of models of secure computing.


정보제공 : Aladin

목차

Invited Papers.- ForNet: A Distributed Forensics Network.- Usage Control: A Vision for Next Generation Access Control.- Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.- Complexity Problems in the Analysis of Information Systems Security.- A Behavior-Based Approach to Securing Email Systems.- Real-Time Intrusion Detection with Emphasis on Insider Attacks.- Mathematical Models and Architectures for Computer Network Security.- Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.- GRID Security Review.- A Knowledge-Based Repository Model for Security Policies Management.- Symbolic Partial Model Checking for Security Analysis.- Rule-Based Systems Security Model.- Logical Resolving for Security Evaluation.- Intrusion Detection.- Enhanced Correlation in an Intrusion Detection Process.- Safeguarding SCADA Systems with Anomaly Detection.- Experiments with Simulation of Attacks against Computer Networks.- Detecting Malicious Codes by the Presence of Their "Gene of Self-replication".- Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences.- Public Key Distribution, Authentication, Access Control.- Distributed Access Control: A Logic-Based Approach.- Advanced Certificate Status Protocol.- Key History Tree: Efficient Group Key Management with Off-Line Members.- A Certificate Status Checking Protocol for the Authenticated Dictionary.- Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach.- Cryptography.- A Signcryption Scheme Based on Secret Sharing Technique.- A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem.- Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property.- Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper.- On Cipher Design Based on Switchable Controlled Operations.- Elliptic Curve Point Multiplication.- Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation.- Steganography.- Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel.- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.- Digital Watermarking under a Filtering and Additive Noise Attack Condition.- Data Hiding in Digital Audio by Frequency Domain Dithering.- Steganography with Least Histogram Abnormality.- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.- Short Papers.- Authentication of Anycast Communication.- Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.- Construction of the Covert Channels.- Privacy and Data Protection in Electronic Communications.- Multiplier for Public-Key Cryptosystem Based on Cellular Automata.- A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols.- Alert Triage on the ROC.- Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64.- Immunocomputing Model of Intrusion Detection.- Agent Platform Security Architecture.- Support Vector Machine Based ICMP Covert Channel Attack Detection.- Computer Immunology System with Variable Configuration.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)