Computer Network Security: Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, held in St. Petersburg, Russia in September 2003.

The 29 revised full papers and 12 revised short papers presented together with 6 invited papers were carefully reviewed and selected from a total of 62 submissions. The papers are organized in topical sections on mathematical models and architectures for computer network security; intrusion detection; public key distribution, authentication, and access control; cryptography; and stenography.

Author(s): Kulesh Shanmugasundaram, Nasir Memon, Anubhav Savant, Herve Bronnimann (auth.), Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)
Series: Lecture Notes in Computer Science 2776
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 478
Tags: Computer Communication Networks; Operating Systems; Data Encryption; Computer Appl. in Administrative Data Processing; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
ForNet: A Distributed Forensics Network....Pages 1-16
Usage Control: A Vision for Next Generation Access Control....Pages 17-31
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL....Pages 32-46
Complexity Problems in the Analysis of Information Systems Security....Pages 47-56
A Behavior-Based Approach to Securing Email Systems....Pages 57-81
Real-Time Intrusion Detection with Emphasis on Insider Attacks....Pages 82-85
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols....Pages 86-99
GRID Security Review....Pages 100-111
A Knowledge-Based Repository Model for Security Policies Management....Pages 112-121
Symbolic Partial Model Checking for Security Analysis....Pages 122-134
Rule-Based Systems Security Model....Pages 135-146
Logical Resolving for Security Evaluation....Pages 147-156
Enhanced Correlation in an Intrusion Detection Process....Pages 157-170
Safeguarding SCADA Systems with Anomaly Detection....Pages 171-182
Experiments with Simulation of Attacks against Computer Networks....Pages 183-194
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”....Pages 195-205
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences....Pages 206-216
Distributed Access Control: A Logic-Based Approach....Pages 217-228
Advanced Certificate Status Protocol....Pages 229-240
Key History Tree: Efficient Group Key Management with Off-Line Members....Pages 241-254
A Certificate Status Checking Protocol for the Authenticated Dictionary....Pages 255-266
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach....Pages 267-278
A Signcryption Scheme Based on Secret Sharing Technique....Pages 279-288
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem....Pages 289-297
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property....Pages 298-307
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper....Pages 308-315
On Cipher Design Based on Switchable Controlled Operations....Pages 316-327
Elliptic Curve Point Multiplication....Pages 328-336
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation....Pages 337-348
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel....Pages 349-359
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation....Pages 360-370
Digital Watermarking under a Filtering and Additive Noise Attack Condition....Pages 371-382
Data Hiding in Digital Audio by Frequency Domain Dithering....Pages 383-394
Steganography with Least Histogram Abnormality....Pages 395-406
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences....Pages 407-418
Authentication of Anycast Communication....Pages 419-423
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy....Pages 424-427
Construction of the Covert Channels....Pages 428-431
Privacy and Data Protection in Electronic Communications....Pages 432-435
Multiplier for Public-Key Cryptosystem Based on Cellular Automata....Pages 436-439
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols....Pages 440-443
Alert Triage on the ROC....Pages 444-448
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64....Pages 449-452
Immunocomputing Model of Intrusion Detection....Pages 453-456
Agent Platform Security Architecture....Pages 457-460
Support Vector Machine Based ICMP Covert Channel Attack Detection....Pages 461-464
Computer Immunology System with Variable Configuration....Pages 465-468
Back Matter....Pages -