This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original - search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers).
Author(s): Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor Kotenko, Victor Skormin (eds.)
Series: Lecture Notes in Computer Science 6258 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 345
Tags: Computer Communication Networks
Front Matter....Pages -
Service Dependencies in Information Systems Security....Pages 1-20
Secure Applications without Secure Infrastructures....Pages 21-31
Integrating Types and Specifications for Secure Software Development....Pages 32-35
Cryptography for Network Security: Failures, Successes and Challenges....Pages 36-54
Group-Centric Models for Secure and Agile Information Sharing....Pages 55-69
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors....Pages 70-85
Attack and Defense Modeling with BDMP....Pages 86-101
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems....Pages 102-117
Problems of Modeling in the Analysis of Covert Channels....Pages 118-124
Policy-Based Design and Verification for Mission Assurance....Pages 125-138
Using Equivalence Relations for Corrective Enforcement of Security Policies....Pages 139-154
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus....Pages 155-168
Credentials Management for High-Value Transactions....Pages 169-182
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols....Pages 183-194
Credential Chain Discovery in RT T Trust Management Language....Pages 195-208
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks....Pages 209-216
Intellectual Intrusion Detection with Sequences Alignment Methods....Pages 217-228
Symptoms-Based Detection of Bot Processes....Pages 229-241
A Comparison of Feature-Selection Methods for Intrusion Detection....Pages 242-255
From NLP (Natural Language Processing) to MLP (Machine Language Processing)....Pages 256-269
Secure Multi-Agent System for Multi-Hop Environments....Pages 270-283
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware....Pages 284-297
Security and Scalability of Remote Entrusting Protection....Pages 298-306
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks....Pages 307-320
Predictive Security Analysis for Event-Driven Processes....Pages 321-328
Virtual Environment Security Modeling....Pages 329-336
Clarifying Integrity Control at the Trusted Information Environment....Pages 337-344
Back Matter....Pages -