Computer Network Security

Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

  • Vladimir Gorodetsky
  • Leonard Popyack
  • Victor Skormin
Conference proceedings MMM-ACNS 2003

DOI: 10.1007/b12005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)

Table of contents (47 papers)

  1. Front Matter
  2. Invited Papers

    1. ForNet: A Distributed Forensics Network
      Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann
      Pages 1-16
    2. Usage Control: A Vision for Next Generation Access Control
      Ravi Sandhu, Jaehong Park
      Pages 17-31
    3. Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL
      Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin
      Pages 32-46
    4. A Behavior-Based Approach to Securing Email Systems
      Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
      Pages 57-81
  3. Mathematical Models and Architectures for Computer Network Security

    1. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
      Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
      Pages 86-99
    2. GRID Security Review
      Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
      Pages 100-111
    3. A Knowledge-Based Repository Model for Security Policies Management
      Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
      Pages 112-121
    4. Rule-Based Systems Security Model
      Michael Smirnov
      Pages 135-146
    5. Logical Resolving for Security Evaluation
      Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
      Pages 147-156
  4. Intrusion Detection

    1. Enhanced Correlation in an Intrusion Detection Process
      Salem Benferhat, Fabien Autrel, Frédéric Cuppens
      Pages 157-170
    2. Safeguarding SCADA Systems with Anomaly Detection
      John Bigham, David Gamez, Ning Lu
      Pages 171-182
    3. Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”
      Victor A. Skormin, Douglas H. Summerville, James S. Moronski
      Pages 195-205
  5. Public Key Distribution, Authentication, Access Control

    1. Advanced Certificate Status Protocol
      Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
      Pages 229-240

About these proceedings


access control authentication computer network security computer security cryptography data security information security intrusion detection network security privacy secure communications secure networking security systems security

Editors and affiliations

  • Vladimir Gorodetsky
    • 1
  • Leonard Popyack
    • 2
  • Victor Skormin
    • 3
  1. 1.St. Petersburg Intitute for Informaticsand AutomationSt. PetersburgRussia
  2. 2.AFRL/IFRomeUSA
  3. 3.US Air Force, Binghamton University (SUNYI)BinghamtonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-40797-3
  • Online ISBN 978-3-540-45215-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349