Computer Network Security
Springer Berlin (Verlag)
9783540739852 (ISBN)
Invited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication-A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.
| Erscheint lt. Verlag | 28.8.2007 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | XIV, 418 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 664 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Access Control • adaptive security • algorithms • Architecture • authentication • authorizati • authorization • covert channels • Data Mining • Data Security • deception systems • Digital rights management • Dom • DoS attacks • eCommerce • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Warfare • language-based security • machine learning • Networks • Network Security • network survivability • organization • pervasive and ubiquitous computing • risk analysis and risk management • security • Smart card • software protection • trust management • Viruses • vulnerability assessment |
| ISBN-13 | 9783540739852 / 9783540739852 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich