Computer Network Security

6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings

  • Igor Kotenko
  • Victor Skormin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7531)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Benjamin Livshits
      Pages 1-2
    2. Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou
      Pages 3-21
    3. Fabio Martinelli, Ilaria Matteucci, Charles Morisset
      Pages 22-35
    4. Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham
      Pages 36-50
  3. Applied Cryptography and Security Protocols

    1. Victor Yakovlev, Valery Korzhik, Mihail Bakaev, Guillermo Morales-Luna
      Pages 51-64
    2. Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova
      Pages 77-83
  4. Access Control and Information Protection

    1. Xin Jin, Ravi Sandhu, Ram Krishnan
      Pages 84-96
    2. Vladimir Oleshchuk
      Pages 97-107
    3. Alexander Grusho, Nick Grusho, Elena Timonina
      Pages 108-113
  5. Security Policies

    1. Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi
      Pages 114-129
    2. Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
      Pages 130-145
    3. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky
      Pages 146-155
  6. Security Event and Information Management

    1. Gustavo Gonzalez Granadillo, Hervé Débar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal
      Pages 156-170
    2. Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber
      Pages 171-180
    3. Julian Schütte, Roland Rieke, Timo Winkelvos
      Pages 181-190
  7. Intrusion Prevention, Detection, and Response

    1. Andrey Dolgikh, Tomas Nykodym, Victor Skormin, Zachary Birnbaum
      Pages 191-202
    2. Yosra Ben Mustapha, Hervé Débar, Grégoire Jacob
      Pages 203-217

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012.
The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Keywords

cloud computing computer networks information flow information security mobile devices

Editors and affiliations

  • Igor Kotenko
    • 1
  • Victor Skormin
    • 2
  1. 1.St. Petersburg Institute for Informatics and Automation, Russian Academy of ScienceSt.-PetersburgRussia
  2. 2.Binghamton University (SUNYI)BinghamtonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-33704-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33703-1
  • Online ISBN 978-3-642-33704-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book