default search action
MMM-ACNS 2001: St. Petersburg, Russia
- Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack:
Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings. Lecture Notes in Computer Science 2052, Springer 2001, ISBN 3-540-42103-3
Invited Talks
- Dipankar Dasgupta, Fabio A. González:
An Intelligent Decision Support System for Intrusion Detection and Response. 1-14 - Alexander A. Grusho:
Mathematical Models of the Covert Channels. 15-20 - Catherine Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis. 21 - Ravi S. Sandhu:
Future Directions in Role-Based Access Control Models. 22-26 - Vijay Varadharajan:
Secure Networked Computing. 27
Network Security Systems: Foundations, Models, and Architectures
- Jan Jürjens:
Composability of Secrecy. 28-38 - Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin:
Agent-Based Model of Computer Network Security System: A Case Study. 39-50 - Michael Smirnov:
Security Considerations and Models for Service Creation in Premium IP Networks. 51-62 - Peter D. Zegzhda, Dmitry P. Zegzhda:
Secure Systems Design Technology. 63-71 - Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis:
A Privacy-Enhancing e-Business Model Based on Infomediaries. 72-83 - Constance L. Heitmeyer:
Applying Practical Formal Methods to the Specification and Analysis of Security Properties. 84-89 - Andrey Kostogryzov:
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ). 90-101 - Konstantin Knorr, Harald Weidner:
Analyzing Separation of Duties in Petri Net Workflows. 102-114
Intrusion Detection: Foundations and Models
- Alexander O. Tarakanov:
Information Security with Formal Immune Networks. 115-126 - Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov:
BASIS: A Biological Approach to System Information Security. 127-142 - Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen:
Learning Temporal Regularities of User Behavior for Anomaly Detection. 143-152 - Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. 153-158
Access Control, Authentication and Authorization
- Iliano Cervesato:
Typed MSR: Syntax and Examples. 159-177 - Steve Barker:
TRBAC: A Temporal Authorization Model. 178-188 - Tatyana Ryutov, B. Clifford Neuman:
The Set and Function Approach to Modeling Authorization in Distributed Systems. 189-206 - Dmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin:
Fenix Secure Operating System: Principles, Models and Architecture. 207-218
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
- Valeri Korjik, Kirill Morozov:
Generalized Oblivious Transfer Protocols Based on Noisy Channels. 219-229 - Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan:
Controlled Operations as a Cryptographic Primitive. 230-241 - Viktor Yakovlev, Valery Korjik, Alexander Sinuk:
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. 242-250 - Ghassan Chaddoud, Isabelle Chrisment, André Schaff:
Dynamic Group Key Management Protocol. 251-262 - Vladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin:
SVD-Based Approach to Transparent Embedding Data into Digital Images. 263-274 - Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan:
Fast Encryption Algorithm Spectr-H64. 275-286 - Antonio Durante, Riccardo Focardi, Roberto Gorrieri:
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. 287-299 - Selçuk Kavut, Melek D. Yücel:
On Some Cryptographic Properties of Rijndael. 300-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.