2005, ISBN: 9783540319986
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersb… Mehr…
Springer.com new in stock. Versandkosten:zzgl. Versandkosten. (EUR 0.00) Details... |
2005, ISBN: 9783540319986
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersb… Mehr…
Springer.com Nr. 978-3-540-31998-6. Versandkosten:Worldwide free shipping, , zzgl. Versandkosten. (EUR 0.00) Details... |
2005, ISBN: 9783540319986
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings, e… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2005, ISBN: 9783540319986
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings, e… Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
Computer Network Security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, - neues Buch
2005, ISBN: 9783540319986
; PDF; Computing > Computer hardware > Network hardware, Springer Berlin Heidelberg
hive.co.uk No. 9783540319986. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2005, ISBN: 9783540319986
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersb… Mehr…
2005, ISBN: 9783540319986
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersb… Mehr…
2005
ISBN: 9783540319986
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings, e… Mehr…
2005, ISBN: 9783540319986
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings, e… Mehr…
Computer Network Security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, - neues Buch
2005, ISBN: 9783540319986
; PDF; Computing > Computer hardware > Network hardware, Springer Berlin Heidelberg
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Computer Network Security
EAN (ISBN-13): 9783540319986
Erscheinungsjahr: 2005
Herausgeber: Springer Berlin Heidelberg
Buch in der Datenbank seit 2017-04-19T00:58:29+02:00 (Vienna)
Detailseite zuletzt geändert am 2024-02-23T18:38:53+01:00 (Vienna)
ISBN/EAN: 9783540319986
ISBN - alternative Schreibweisen:
978-3-540-31998-6
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: gorodetsky
Titel des Buches: petersburg, computer security
Daten vom Verlag:
Autor/in: Vladimir Gorodetsky; Igor Kotenko; Victor Skormin
Titel: Computer Communication Networks and Telecommunications; Lecture Notes in Computer Science; Computer Network Security - Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings
Verlag: Springer; Springer Berlin
482 Seiten
Erscheinungsjahr: 2005-09-19
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 482 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerk-Hardware; Verstehen; access control; authentication; computer network security; computer security; crypotgraphy; data security; delegation; information security; intrusion detection; mobile security; network security; nework security; protocol attacks; secure communications; trust management; algorithm analysis and problem complexity; C; Computer Communication Networks; Cryptology; Algorithms; IT Operations; Computers and Society; Operating Systems; Computer Science; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; Betriebssysteme; BC
Invited Papers.- Self-managed Cells for Ubiquitous Systems.- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures.- Rule-Based Topological Vulnerability Analysis.- Models and Analysis of Active Worm Defense.- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes.- Mathematical Models, Architectures and Protocols for Computer Network Security.- Calibrating Entropy Functions Applied to Computer Networks.- A Passive External Web Surveillance Technique for Private Networks.- A Secure Way to Combine IPsec, NAT & DHCP.- A Generic Model for Analyzing Security Protocols.- Networks, Markov Lie Monoids, and Generalized Entropy.- Trust by Workflow in Autonomic Communication.- An Ontology-Based Approach to Information Systems Security Management.- Authentication, Authorization and Access Control.- Safety Problems in Access Control with Temporal Constraints.- A Modal Logic for Role-Based Access Control.- Unique User-Generated Digital Pseudonyms.- Information Flow Analysis, Covert Channels and Trust Management.- A Probabilistic Property-Specific Approach to Information Flow.- Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata.- Detection of Illegal Information Flow.- Towards More Controllable and Practical Delegation.- Security Policy and Operating System Security.- Policy-Driven Routing Management Using CIM.- Secure Hybrid Operating System “Linux over Fenix”.- A Formal Description of SECIMOS Operating System.- Threat Modeling, Vulnerability Assessment and Network Forensics.- A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures.- Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network LifeCycle.- A Temporal Logic-Based Model for Forensic Investigation in Networked System Security.- Vulnerabilities Detection in the Configurations of MS Windows Operating System.- Intrusion Detection.- Hybrid Intrusion Detection Model Based on Ordered Sequences.- Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems.- Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks.- A Formal Immune Network and Its Implementation for On-line Intrusion Detection.- Short Papers.- Foundation for a Time Interval Access Control Model.- Developing an Insider Threat Model Using Functional Decomposition.- An XML-Seamless Policy Based Management Framework.- Statistical Covert Channels Through PROXY Server.- Encoding Private Key in Fingerprint.- A New Scheme for the Location Information Protection in Mobile Communication Environments.- Region Protection/Restoration Scheme in Survivable Networks.- Massive Data Mining for Polymorphic Code Detection.- Key Escrow with Tree-Based Access Structure.- Security Checker Architecture for Policy-Based Security Management.- An Efficient Access Control Model Utilized the Attribute Certificate Structuring.- Secure Protected Password Change Scheme.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783319651279 Computer Network Security (Igor Kotenko, Jacek Rak, John Bay, Krzysztof Szczypiorski, Leonard Popyack, Victor Skormin)
- 9783319651279 Computer Network Security (Igor Kotenko, Jacek Rak, John Bay, Krzysztof Szczypiorski, Leonard Popyack, Victor Skormin)
- 9781119706724 Computer Network Security (Ali Sadiqui)
- 9783319651262 Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 201 (Jacek Rak; John Bay; Igor Kotenko; Leonard Popyack; Victor Skormin; Krzysztof Szczypiorski)
- 9783540291138 Computer Network Security (Vladimir Gorodetsky; Igor Kotenko; Victor Skormin)
< zum Archiv...