Advertisement

Computer Network Security

Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings

  • Vladimir Gorodetsky
  • Igor Kotenko
  • Victor Skormin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3685)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps
      Pages 1-6
    2. Vipin Swarup, Sushil Jajodia, Joseph Pamula
      Pages 23-37
    3. David M. Nicol, Michael Liljenstam
      Pages 38-53
    4. Douglas Summerville, Victor Skormin, Alexander Volynkin, James Moronski
      Pages 54-75
  3. Mathematical Models, Architectures and Protocols for Computer Network Security

    1. Constantine Daicos, Scott Knight
      Pages 88-103
    2. Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz
      Pages 104-118
    3. Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu
      Pages 119-128
    4. Mikhail I. Smirnov
      Pages 136-150
    5. Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis
      Pages 151-164
  4. Authentication, Authorization and Access Control

    1. Philippe Balbiani, Fahima Cheikh
      Pages 165-178
    2. Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin
      Pages 179-193
    3. Peter Schartner, Martin Schaffer
      Pages 194-205
  5. Information Flow Analysis, Covert Channels and Trust Management

    1. Danièle Beauquier, Marie Duflot, Marius Minea
      Pages 206-220
    2. Alexander Grusho, Alexander Kniazev, Elena Timonina
      Pages 235-244
    3. Gang Yin, Huaimin Wang, Dianxi Shi, Haiya Gu
      Pages 245-258
  6. Security Policy and Operating System Security

    1. Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
      Pages 259-271
    2. Dmitry P. Zegzhda, Alex M. Vovk
      Pages 272-285
    3. Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He
      Pages 286-297
  7. Threat Modeling, Vulnerability Assessment and Network Forensics

  8. Intrusion Detection

    1. Abdulrahman Alharby, Hideki Imai
      Pages 352-365
    2. Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov
      Pages 366-379
    3. Alexander O. Tarakanov, Sergei V. Kvachev, Alexander V. Sukhorukov
      Pages 394-405
  9. Short Papers

    1. Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
      Pages 406-411
    2. Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin
      Pages 412-417
    3. Félix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
      Pages 418-423
    4. Alexei Galatenko, Alexander Grusho, Alexander Kniazev, Elena Timonina
      Pages 424-429
    5. Ernő Jeges, Zoltán Hornák, Csaba Körmöczi
      Pages 430-435
    6. Soon Seok Kim, Sang Soo Yeo, Hong Jin Park, Sung Kwon Kim
      Pages 436-441
    7. Wojciech Molisz, Jacek Rak
      Pages 442-447
    8. Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger
      Pages 448-453
    9. Martin Schaffer, Peter Schartner
      Pages 454-459
    10. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova
      Pages 460-465
    11. Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
      Pages 472-477
  10. Back Matter

About these proceedings

Introduction

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The 1st and the 2nd International Workshops on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2001 and MMM-ACNS 2003), hosted by the St. Petersburg Institute for Informatics and Automation, demonstrated the keen interest of the international research community in the subject area. It was recognized that conducting a biannual series of such workshops in St. Petersburg stimulates fruitful exchanges between the di?erent schools of thought, facilitates the dissemination of new ideas and promotesthespiritofcooperationbetweenresearchersontheinternationalscale. MMM-ACNS 2005 provided an international forum for sharing original - search results and application experiences among specialists in fundamental and applied problems of computer network security. An important distinction of the workshop was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly dependable computer networks.

Keywords

access control authentication computer network security computer security crypotgraphy data security delegation information security intrusion detection mobile security network security nework security protocol attacks secure communications trust management

Editors and affiliations

  • Vladimir Gorodetsky
    • 1
  • Igor Kotenko
    • 2
  • Victor Skormin
    • 3
  1. 1.St. Petersburg Intitute for Informaticsand AutomationSt. PetersburgRussia
  2. 2.Computer Security Research Group, St. Petersburg Institute for Informatics and AutomationSt.-PetersburgRussia
  3. 3.US Air Force, Binghamton University (SUNYI)BinghamtonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11560326
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-29113-8
  • Online ISBN 978-3-540-31998-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site