MMM-ACNS 2005:
St. Petersburg,
Russia
Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin (Eds.):
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings.
Lecture Notes in Computer Science 3685 Springer 2005, ISBN 3-540-29113-X BibTeX
Invited Papers
- Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Steven Heeps:
Self-managed Cells for Ubiquitous Systems.
1-6
Electronic Edition (link) BibTeX
- Ming-Yuh Huang:
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures.
7-22
Electronic Edition (link) BibTeX
- Vipin Swarup, Sushil Jajodia, Joseph Pamula:
Rule-Based Topological Vulnerability Analysis.
23-37
Electronic Edition (link) BibTeX
- David M. Nicol, Michael Liljenstam:
Models and Analysis of Active Worm Defense.
38-53
Electronic Edition (link) BibTeX
- Douglas H. Summerville, Victor A. Skormin, Alexander Volynkin, James Moronski:
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes.
54-75
Electronic Edition (link) BibTeX
Mathematical Models,
Architectures and Protocols for Computer Network Security
- Duncan A. Buell:
Calibrating Entropy Functions Applied to Computer Networks.
76-87
Electronic Edition (link) BibTeX
- Constantine Daicos, Scott Knight:
A Passive External Web Surveillance Technique for Private Networks.
88-103
Electronic Edition (link) BibTeX
- Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz:
A Secure Way to Combine IPsec, NAT & DHCP.
104-118
Electronic Edition (link) BibTeX
- Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu:
A Generic Model for Analyzing Security Protocols.
119-128
Electronic Edition (link) BibTeX
- Joseph E. Johnson:
Networks, Markov Lie Monoids, and Generalized Entropy.
129-135
Electronic Edition (link) BibTeX
- Mikhail I. Smirnov:
Trust by Workflow in Autonomic Communication.
136-150
Electronic Edition (link) BibTeX
- Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
An Ontology-Based Approach to Information Systems Security Management.
151-164
Electronic Edition (link) BibTeX
Authentication,
Authorization and Access Control
Information Flow Analysis,
Covert Channels and Trust Management
Security Policy and Operating System Security
Threat Modeling,
Vulnerability Assessment and Network Forensics
Intrusion Detection
Short Papers
- Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen:
Foundation for a Time Interval Access Control Model.
406-411
Electronic Edition (link) BibTeX
- Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:
Developing an Insider Threat Model Using Functional Decomposition.
412-417
Electronic Edition (link) BibTeX
- Félix J. García Clemente, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta:
An XML-Seamless Policy Based Management Framework.
418-423
Electronic Edition (link) BibTeX
- Alexei Galatenko, Alexander Grusho, Alexander Kniazev, Elena Timonina:
Statistical Covert Channels Through PROXY Server.
424-429
Electronic Edition (link) BibTeX
- Ernö Jeges, Zoltán Hornák, Csaba Körmöczi:
Encoding Private Key in Fingerprint.
430-435
Electronic Edition (link) BibTeX
- Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim:
A New Scheme for the Location Information Protection in Mobile Communication Environments.
436-441
Electronic Edition (link) BibTeX
- Wojciech Molisz, Jacek Rak:
Region Protection/Restoration Scheme in Survivable Networks.
442-447
Electronic Edition (link) BibTeX
- Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger:
Massive Data Mining for Polymorphic Code Detection.
448-453
Electronic Edition (link) BibTeX
- Martin Schaffer, Peter Schartner:
Key Escrow with Tree-Based Access Structure.
454-459
Electronic Edition (link) BibTeX
- Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova:
Security Checker Architecture for Policy-Based Security Management.
460-465
Electronic Edition (link) BibTeX
- Soomi Yang:
An Efficient Access Control Model Utilized the Attribute Certificate Structuring.
466-471
Electronic Edition (link) BibTeX
- Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Secure Protected Password Change Scheme.
472-477
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:30:21 2009
by Michael Ley (ley@uni-trier.de)