


default search action
MMM-ACNS 2005: St. Petersburg, Russia
- Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin:

Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings. Lecture Notes in Computer Science 3685, Springer 2005, ISBN 3-540-29113-X
Invited Papers
- Naranker Dulay, Emil C. Lupu, Morris Sloman

, Joe Sventek, Nagwa L. Badr, Steven Heeps:
Self-managed Cells for Ubiquitous Systems. 1-6 - Ming-Yuh Huang:

Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. 7-22 - Vipin Swarup, Sushil Jajodia, Joseph Pamula:

Rule-Based Topological Vulnerability Analysis. 23-37 - David M. Nicol, Michael Liljenstam:

Models and Analysis of Active Worm Defense. 38-53 - Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski:

Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes. 54-75
Mathematical Models, Architectures and Protocols for Computer Network Security
- Duncan A. Buell

:
Calibrating Entropy Functions Applied to Computer Networks. 76-87 - Constantine Daicos, Scott Knight:

A Passive External Web Surveillance Technique for Private Networks. 88-103 - Jacques Demerjian

, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz:
A Secure Way to Combine IPsec, NAT & DHCP. 104-118 - Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu:

A Generic Model for Analyzing Security Protocols. 119-128 - Joseph E. Johnson:

Networks, Markov Lie Monoids, and Generalized Entropy. 129-135 - Mikhail I. Smirnov:

Trust by Workflow in Autonomic Communication. 136-150 - Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:

An Ontology-Based Approach to Information Systems Security Management. 151-164
Authentication, Authorization and Access Control
- Philippe Balbiani

, Fahima Cheikh:
Safety Problems in Access Control with Temporal Constraints. 165-178 - Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin:

A Modal Logic for Role-Based Access Control. 179-193 - Peter Schartner, Martin Schaffer:

Unique User-Generated Digital Pseudonyms. 194-205
Information Flow Analysis, Covert Channels and Trust Management
- Danièle Beauquier, Marie Duflot

, Marius Minea
:
A Probabilistic Property-Specific Approach to Information Flow. 206-220 - Roberto Giacobazzi, Isabella Mastroeni

:
Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata. 221-234 - Alexander A. Grusho

, Alexander Kniazev, Elena E. Timonina
:
Detection of Illegal Information Flow. 235-244 - Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu:

Towards More Controllable and Practical Delegation. 245-258
Security Policy and Operating System Security
- Félix J. García Clemente

, Jesús D. Jiménez Re, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Policy-Driven Routing Management Using CIM. 259-271 - Dmitry P. Zegzhda, Alex M. Vovk:

Secure Hybrid Operating System "Linux over Fenix". 272-285 - Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He:

A Formal Description of SECIMOS Operating System. 286-297
Threat Modeling, Vulnerability Assessment and Network Forensics
- Fabrizio Baiardi

, Claudio Telmon:
A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures. 298-310 - Igor V. Kotenko

, Mikhail Stepashkin:
Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. 311-324 - Slim Rekhis

, Noureddine Boudriga:
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. 325-338 - Peter D. Zegzhda

, Dmitry P. Zegzhda, Maxim O. Kalinin
:
Vulnerabilities Detection in the Configurations of MS Windows Operating System. 339-351
Intrusion Detection
- Abdulrahman Alharby

, Hideki Imai:
Hybrid Intrusion Detection Model Based on Ordered Sequences. 352-365 - Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov:

Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems. 366-379 - Victor Serdiouk:

Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. 380-393 - Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov:

A Formal Immune Network and Its Implementation for On-line Intrusion Detection. 394-405
Short Papers
- Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:

Foundation for a Time Interval Access Control Model. 406-411 - Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:

Developing an Insider Threat Model Using Functional Decomposition. 412-417 - Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta

:
An XML-Seamless Policy Based Management Framework. 418-423 - Alexei Galatenko, Alexander A. Grusho

, Alexander Kniazev, Elena E. Timonina
:
Statistical Covert Channels Through PROXY Server. 424-429 - Ernö Jeges, Zoltán Hornák, Csaba Körmöczi:

Encoding Private Key in Fingerprint. 430-435 - Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim:

A New Scheme for the Location Information Protection in Mobile Communication Environments. 436-441 - Wojciech Molisz, Jacek Rak

:
Region Protection/Restoration Scheme in Survivable Networks. 442-447 - Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger:

Massive Data Mining for Polymorphic Code Detection. 448-453 - Martin Schaffer, Peter Schartner:

Key Escrow with Tree-Based Access Structure. 454-459 - Artem Tishkov

, Igor V. Kotenko
, Ekaterina Sidelnikova:
Security Checker Architecture for Policy-Based Security Management. 460-465 - Soomi Yang:

An Efficient Access Control Model Utilized the Attribute Certificate Structuring. 466-471 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

Secure Protected Password Change Scheme. 472-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














