Computer Network Security

Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings


ISBN: 978-3-540-40797-3 (Print) 978-3-540-45215-7 (Online)
Download Book (5,424 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (47 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Invited Papers

    1. Book Chapter

      Pages 1-16

      ForNet: A Distributed Forensics Network

    2. Book Chapter

      Pages 17-31

      Usage Control: A Vision for Next Generation Access Control

    3. Book Chapter

      Pages 32-46

      Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL

    4. Book Chapter

      Pages 47-56

      Complexity Problems in the Analysis of Information Systems Security

    5. Book Chapter

      Pages 57-81

      A Behavior-Based Approach to Securing Email Systems

    6. Book Chapter

      Pages 82-85

      Real-Time Intrusion Detection with Emphasis on Insider Attacks

  3. Mathematical Models and Architectures for Computer Network Security

    1. Book Chapter

      Pages 86-99

      Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols

    2. Book Chapter

      Pages 100-111

      GRID Security Review

    3. Book Chapter

      Pages 112-121

      A Knowledge-Based Repository Model for Security Policies Management

    4. Book Chapter

      Pages 122-134

      Symbolic Partial Model Checking for Security Analysis

    5. Book Chapter

      Pages 135-146

      Rule-Based Systems Security Model

    6. Book Chapter

      Pages 147-156

      Logical Resolving for Security Evaluation

  4. Intrusion Detection

    1. Book Chapter

      Pages 157-170

      Enhanced Correlation in an Intrusion Detection Process

    2. Book Chapter

      Pages 171-182

      Safeguarding SCADA Systems with Anomaly Detection

    3. Book Chapter

      Pages 183-194

      Experiments with Simulation of Attacks against Computer Networks

    4. Book Chapter

      Pages 195-205

      Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”

    5. Book Chapter

      Pages 206-216

      Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences

  5. Public Key Distribution, Authentication, Access Control

    1. Book Chapter

      Pages 217-228

      Distributed Access Control: A Logic-Based Approach

    2. Book Chapter

      Pages 229-240

      Advanced Certificate Status Protocol

    3. Book Chapter

      Pages 241-254

      Key History Tree: Efficient Group Key Management with Off-Line Members

previous Page of 3