Computer Network Security

6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

Editors:

ISBN: 978-3-642-33703-1 (Print) 978-3-642-33704-8 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Papers

    1. No Access

      Book Chapter

      Pages 1-2

      Finding Malware on a Web Scale

    2. No Access

      Book Chapter

      Pages 3-21

      Exposing Security Risks for Commercial Mobile Devices

    3. No Access

      Book Chapter

      Pages 22-35

      From Qualitative to Quantitative Enforcement of Security Policy

    4. No Access

      Book Chapter

      Pages 36-50

      Design and Implementation of a Cloud-Based Assured Information Sharing System

  3. Applied Cryptography and Security Protocols

    1. No Access

      Book Chapter

      Pages 51-64

      Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries

    2. No Access

      Book Chapter

      Pages 65-76

      A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

    3. No Access

      Book Chapter

      Pages 77-83

      Blind 384-bit Digital Signature Scheme

  4. Access Control and Information Protection

    1. No Access

      Book Chapter

      Pages 84-96

      RABAC: Role-Centric Attribute-Based Access Control

    2. No Access

      Book Chapter

      Pages 97-107

      Trust-Aware RBAC

    3. No Access

      Book Chapter

      Pages 108-113

      Alternative Mechanisms for Information Security

  5. Security Policies

    1. No Access

      Book Chapter

      Pages 114-129

      Enforcing Information Flow Policies by a Three-Valued Analysis

    2. No Access

      Book Chapter

      Pages 130-145

      Towards the Orchestration of Secured Services under Non-disclosure Policies

    3. No Access

      Book Chapter

      Pages 146-155

      An Approach for Network Information Flow Analysis for Systems of Embedded Components

  6. Security Event and Information Management

    1. No Access

      Book Chapter

      Pages 156-170

      Individual Countermeasure Selection Based on the Return On Response Investment Index

    2. No Access

      Book Chapter

      Pages 171-180

      Security and Reliability Requirements for Advanced Security Event Management

    3. No Access

      Book Chapter

      Pages 181-190

      Model-Based Security Event Management

  7. Intrusion Prevention, Detection, and Response

    1. No Access

      Book Chapter

      Pages 191-202

      Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks

    2. No Access

      Book Chapter

      Pages 203-217

      Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation

    3. No Access

      Book Chapter

      Pages 218-225

      Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems

  8. Anti-malware Techniques

    1. No Access

      Book Chapter

      Pages 226-239

      Malware Characterization Using Behavioral Components

previous Page of 2