Computer Network Security
Springer Berlin (Verlag)
978-3-642-14705-0 (ISBN)
Invited Papers.- Service Dependencies in Information Systems Security.- Secure Applications without Secure Infrastructures.- Integrating Types and Specifications for Secure Software Development.- Cryptography for Network Security: Failures, Successes and Challenges.- Group-Centric Models for Secure and Agile Information Sharing.- Security Modeling and Covert Channels.- A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors.- Attack and Defense Modeling with BDMP.- QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems.- Problems of Modeling in the Analysis of Covert Channels.- Security Policies and Formal Analysis of Security Properties.- Policy-Based Design and Verification for Mission Assurance.- Using Equivalence Relations for Corrective Enforcement of Security Policies.- Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus.- Authentication, Authorization, Access Control and Public Key Cryptography.- Credentials Management for High-Value Transactions.- A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols.- Credential Chain Discovery in RTT Trust Management Language.- Genetic Optimization of Access Control Schemes in Virtual Local Area Networks.- Intrusion and Malware Detection.- Intellectual Intrusion Detection with Sequences Alignment Methods.- Symptoms-Based Detection of Bot Processes.- A Comparison of Feature-Selection Methods for Intrusion Detection.- From NLP (Natural Language Processing) to MLP (Machine Language Processing).- Security of Multi-agent Systems and Software Protection.- Secure Multi-Agent System for Multi-Hop Environments.- In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware.- Security and Scalability of Remote Entrusting Protection.- Adaptive Security, Security Analysis and Virtualization.- A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks.- Predictive Security Analysis for Event-Driven Processes.- Virtual Environment Security Modeling.- Clarifying Integrity Control at the Trusted Information Environment.
| Erscheint lt. Verlag | 11.8.2010 |
|---|---|
| Reihe/Serie | Computer Communication Networks and Telecommunications | Lecture Notes in Computer Science |
| Zusatzinfo | XIII, 345 p. 92 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Access Control • Anomaly Detection • application security • authentication • Block Ciphers • computer network • Local Area Network • Network Security • protection • Quality of Service • Quality of Service (QoS) • security • Virtual Local Area Network |
| ISBN-10 | 3-642-14705-4 / 3642147054 |
| ISBN-13 | 978-3-642-14705-0 / 9783642147050 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich