Skip to main content
  • Conference proceedings
  • © 2003

Computer Network Security

Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings

Conference proceedings info: MMM-ACNS 2003.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (47 papers)

  1. Front Matter

  2. Invited Papers

    1. ForNet: A Distributed Forensics Network

      • Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann
      Pages 1-16
    2. Usage Control: A Vision for Next Generation Access Control

      • Ravi Sandhu, Jaehong Park
      Pages 17-31
    3. Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL

      • Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin
      Pages 32-46
    4. A Behavior-Based Approach to Securing Email Systems

      • Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu
      Pages 57-81
  3. Mathematical Models and Architectures for Computer Network Security

    1. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols

      • Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
      Pages 86-99
    2. GRID Security Review

      • Lazaros Gymnopoulos, Stelios Dritsas, Stefanos Gritzalis, Costas Lambrinoudakis
      Pages 100-111
    3. A Knowledge-Based Repository Model for Security Policies Management

      • Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis
      Pages 112-121
    4. Rule-Based Systems Security Model

      • Michael Smirnov
      Pages 135-146
    5. Logical Resolving for Security Evaluation

      • Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin
      Pages 147-156
  4. Intrusion Detection

    1. Enhanced Correlation in an Intrusion Detection Process

      • Salem Benferhat, Fabien Autrel, Frédéric Cuppens
      Pages 157-170
    2. Safeguarding SCADA Systems with Anomaly Detection

      • John Bigham, David Gamez, Ning Lu
      Pages 171-182
    3. Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”

      • Victor A. Skormin, Douglas H. Summerville, James S. Moronski
      Pages 195-205
  5. Public Key Distribution, Authentication, Access Control

    1. Advanced Certificate Status Protocol

      • Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
      Pages 229-240

Other Volumes

  1. Computer Network Security

Keywords

  • access control
  • authentication
  • computer network security
  • computer security
  • cryptography
  • data security
  • information security
  • intrusion detection
  • network security
  • privacy
  • secure communications
  • secure networking
  • security
  • systems security

Editors and Affiliations

  • St. Petersburg Intitute for Informaticsand Automation, St. Petersburg, Russia

    Vladimir Gorodetsky

  • AFRL/IF, Rome, USA

    Leonard Popyack

  • US Air Force, Binghamton University (SUNYI), Binghamton, USA

    Victor Skormin

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions