This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001.
The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography: mathematical basis, protocols, and applied methods.
Author(s): Dipankar Dasgupta, Fabio A. Gonzalez (auth.), Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack (eds.)
Series: Lecture Notes in Computer Science 2052
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2001
Language: English
Pages: 316
Tags: Computer Communication Networks; Operating Systems; Data Encryption; Management of Computing and Information Systems; Computers and Society; Communications Engineering, Networks
An Intelligent Decision Support System for Intrusion Detection and Response....Pages 1-14
Mathematical Models of the Covert Channels....Pages 15-20
Open Issues in Formal Methods for Cryptographic Protocol Analysis....Pages 21-21
Future Directions in Role-Based Access Control Models....Pages 22-26
Secure Networked Computing....Pages 27-27
Composability of Secrecy....Pages 28-38
Agent-Based Model of Computer Network Security System: A Case Study....Pages 39-50
Security Considerations and Models for Service Creation in Premium IP Networks....Pages 51-62
Secure Systems Design Technology....Pages 63-71
A Privacy-Enhancing e-Business Model Based on Infomediaries....Pages 72-83
Applying Practical Formal Methods to the Specification and Analysis of Security Properties....Pages 84-89
Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ)....Pages 90-101
Analyzing Separation of Duties in Petri Net Workflows....Pages 102-114
Information Security with Formal Immune Networks....Pages 115-126
BASIS: A Biological Approach to System Information Security....Pages 127-142
Learning Temporal Regularities of User Behavior for Anomaly Detection....Pages 143-152
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining....Pages 153-158
Typed MSR: Syntax and Examples....Pages 159-177
TRBAC N : A Temporal Authorization Model....Pages 178-188
The Set and Function Approach to Modeling Authorization in Distributed Systems....Pages 189-207
Fenix Secure Operating System: Principles, Models, and Architecture....Pages 207-218
Generalized Oblivious Transfer Protocols Based on Noisy Channels....Pages 219-229
Controlled Operations as a Cryptographic Primitive....Pages 230-241
Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes....Pages 242-250
Dynamic Group Key Management Protocol....Pages 251-262
SVD-Based Approach to Transparent Embedding Data into Digital Images....Pages 263-274
Fast Encryption Algorithm Spectr-H64....Pages 275-286
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols....Pages 287-299
On Some Cryptographic Properties of Rijndael....Pages 300-311