


default search action
MMM-ACNS 2010: St. Petersburg, Russia
- Igor V. Kotenko, Victor A. Skormin:

Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings. Lecture Notes in Computer Science 6258, Springer 2010, ISBN 978-3-642-14705-0
Invited Papers
- Hervé Debar

, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens:
Service Dependencies in Information Systems Security. 1-20 - Dieter Gollmann:

Secure Applications without Secure Infrastructures. 21-31 - Greg Morrisett:

Integrating Types and Specifications for Secure Software Development. 32-35 - Bart Preneel

:
Cryptography for Network Security: Failures, Successes and Challenges. 36-54 - Ravi S. Sandhu, Ram Krishnan

, Jianwei Niu, William H. Winsborough:
Group-Centric Models for Secure and Agile Information Sharing. 55-69
Security Modeling and Covert Channels
- Leonid Domnitser, Nael B. Abu-Ghazaleh

, Dmitry Ponomarev:
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors. 70-85 - Ludovic Piètre-Cambacédès, Marc Bouissou

:
Attack and Defense Modeling with BDMP. 86-101 - Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:

QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. 102-117 - Alexander A. Grusho

, Nikolai A. Grusho
, Elena E. Timonina
:
Problems of Modeling in the Analysis of Covert Channels. 118-124
Security Policies and Formal Analysis of Security Properties
- Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal:

Policy-Based Design and Verification for Mission Assurance. 125-138 - Raphaël Khoury, Nadia Tawbi

:
Using Equivalence Relations for Corrective Enforcement of Security Policies. 139-154 - Devrim Unal

, Ozan Akar, M. Ufuk Çaglayan:
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. 155-168
Authentication, Authorization, Access Control and Public Key Cryptography
- Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older:

Credentials Management for High-Value Transactions. 169-182 - Dmitriy N. Moldovyan, Nikolay A. Moldovyan:

A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols. 183-194 - Krzysztof Sacha

:
Credential Chain Discovery in RTT Trust Management Language. 195-208 - Igor Saenko

, Igor V. Kotenko
:
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. 209-216
Intrusion and Malware Detection
- Yaroslav A. Markov, Maxim O. Kalinin

:
Intellectual Intrusion Detection with Sequences Alignment Methods. 217-228 - Jose Andre Morales

, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu:
Symptoms-Based Detection of Bot Processes. 229-241 - Hai Thanh Nguyen, Slobodan Petrovic, Katrin Franke:

A Comparison of Feature-Selection Methods for Intrusion Detection. 242-255 - Peter Teufl, Udo Payer, Guenther Lackner:

From NLP (Natural Language Processing) to MLP (Machine Language Processing). 256-269
Security of Multi-agent Systems and Software Protection
- Stefan Kraxberger, Peter Danner, Daniel M. Hein:

Secure Multi-Agent System for Multi-Hop Environments. 270-283 - Antonio Muñoz, Antonio Maña

, Pablo Antón:
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. 284-297 - Vasily Desnitsky

, Igor V. Kotenko
:
Security and Scalability of Remote Entrusting Protection. 298-306
Adaptive Security, Security Analysis and Virtualization
- Wojciech Molisz, Jacek Rak

:
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks. 307-320 - Roland Rieke

, Zaharina Stoynova:
Predictive Security Analysis for Event-Driven Processes. 321-328 - Dmitry P. Zegzhda, Ekaterina Rudina:

Virtual Environment Security Modeling. 329-336 - Dmitry P. Zegzhda, Peter D. Zegzhda

, Maxim O. Kalinin
:
Clarifying Integrity Control at the Trusted Information Environment. 337-344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














