|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Vladimir Gorodetsky , Igor Kotenko , Victor A. SkorminPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 1 Dimensions: Width: 15.50cm , Height: 2.50cm , Length: 23.50cm Weight: 0.664kg ISBN: 9783540739852ISBN 10: 3540739858 Pages: 418 Publication Date: 28 August 2007 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsInvited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication-A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |