This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.
The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography.
Author(s): Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)
Series: Lecture Notes in Computer Science 2776
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 478
Tags: Computer Communication Networks; Operating Systems; Data Encryption; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
ForNet: A Distributed Forensics Network....Pages 1-16
Usage Control: A Vision for Next Generation Access Control....Pages 17-31
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL....Pages 32-46
Complexity Problems in the Analysis of Information Systems Security....Pages 47-56
A Behavior-Based Approach to Securing Email Systems....Pages 57-81
Real-Time Intrusion Detection with Emphasis on Insider Attacks....Pages 82-85
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols....Pages 86-99
GRID Security Review....Pages 100-111
A Knowledge-Based Repository Model for Security Policies Management....Pages 112-121
Symbolic Partial Model Checking for Security Analysis....Pages 122-134
Rule-Based Systems Security Model....Pages 135-146
Logical Resolving for Security Evaluation....Pages 147-156
Enhanced Correlation in an Intrusion Detection Process....Pages 157-170
Safeguarding SCADA Systems with Anomaly Detection....Pages 171-182
Experiments with Simulation of Attacks against Computer Networks....Pages 183-194
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”....Pages 195-205
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences....Pages 206-216
Distributed Access Control: A Logic-Based Approach....Pages 217-228
Advanced Certificate Status Protocol....Pages 229-240
Key History Tree: Efficient Group Key Management with Off-Line Members....Pages 241-254
A Certificate Status Checking Protocol for the Authenticated Dictionary....Pages 255-266
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach....Pages 267-278
A Signcryption Scheme Based on Secret Sharing Technique....Pages 279-288
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem....Pages 289-297
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property....Pages 298-307
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper....Pages 308-315
On Cipher Design Based on Switchable Controlled Operations....Pages 316-327
Elliptic Curve Point Multiplication....Pages 328-336
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation....Pages 337-348
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel....Pages 349-359
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation....Pages 360-370
Digital Watermarking under a Filtering and Additive Noise Attack Condition....Pages 371-382
Data Hiding in Digital Audio by Frequency Domain Dithering....Pages 383-394
Steganography with Least Histogram Abnormality....Pages 395-406
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences....Pages 407-418
Authentication of Anycast Communication....Pages 419-423
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy....Pages 424-427
Construction of the Covert Channels....Pages 428-431
Privacy and Data Protection in Electronic Communications....Pages 432-435
Multiplier for Public-Key Cryptosystem Based on Cellular Automata....Pages 436-439
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols....Pages 440-443
Alert Triage on the ROC....Pages 444-448
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64....Pages 449-452
Immunocomputing Model of Intrusion Detection....Pages 453-456
Agent Platform Security Architecture....Pages 457-460
Support Vector Machine Based ICMP Covert Channel Attack Detection....Pages 461-464
Computer Immunology System with Variable Configuration....Pages 465-468
Back Matter....Pages -