Computer network security: 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6258 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIII, 344 S. graph. Darst. |
ISBN: | 9783642147050 3642147054 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036616567 | ||
003 | DE-604 | ||
005 | 20101027 | ||
007 | t| | ||
008 | 100816s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N27 |2 dnb | ||
016 | 7 | |a 1004071116 |2 DE-101 | |
020 | |a 9783642147050 |c PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.) |9 978-3-642-14705-0 | ||
020 | |a 3642147054 |9 3-642-14705-4 | ||
024 | 3 | |a 9783642147050 | |
028 | 5 | 2 | |a 80018870 |
035 | |a (OCoLC)669170876 | ||
035 | |a (DE-599)DNB1004071116 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Computer network security |b 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings |c Igor Kotenko ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 344 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6258 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Sankt Petersburg |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kotenko, Igor |e Sonstige |0 (DE-588)142070238 |4 oth | |
711 | 2 | |a International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security |n 5 |d 2010 |c Sankt Petersburg |j Sonstige |0 (DE-588)16077834-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6258 |w (DE-604)BV000000607 |9 6258 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3499298&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020536695&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020536695 |
Datensatz im Suchindex
_version_ | 1820875254236446720 |
---|---|
adam_text |
TABLE OF CONTENTS INVITED PAPERS SERVICE DEPENDENCIES IN INFORMATION
SYSTEMS SECURITY 1 HERVE DEBAR, NIZAR KHEIR, NORA CUPPENS-BOULAHIA, AND
FREDERIC CUPPENS SECURE APPLICATIONS WITHOUT SECURE INFRASTRUCTURES 21
DIETER GOLLMANN INTEGRATING TYPES AND SPECIFICATIONS FOR SECURE SOFTWARE
DEVELOPMENT 32 GREG MORRISETT CRYPTOGRAPHY FOR NETWORK SECURITY:
FAILURES, SUCCESSES AND CHALLENGES 36 BART PRENEEL GROUP-CENTRIC MODELS
FOR SECURE AND AGILE INFORMATION SHARING 55 RAVI SANDHU, RAM KRISHNAN,
JIANWEI NIU, AND WILLIAM H. WINSBOROUGH SECURITY MODELING AND COVERT
CHANNELS A PREDICTIVE MODEL FOR CACHE-BASED SIDE CHANNELS IN MULTICORE
AND MULTITHREADED MICROPROCESSORS 70 LEONID DOMNITSER, NAEL
ABU-GHAZALEH, AND DMITRY PONOMAREV ATTACK AND DEFENSE MODELING WITH BDMP
86 LUDOVIC PIETRE- CAMBACEDES AND MARC BOUISSOU QOS-T: QOS THROTTLING TO
ELICIT USER COOPERATION IN COMPUTER SYSTEMS 102 VIDYARAMAN
SANKARANARAYANAN, SHAMBHU UPADHYAYA, AND KEVIN KWIAT PROBLEMS OF
MODELING IN THE ANALYSIS OF COVERT CHANNELS 118 ALEXANDER GRUSHO,
NIKOLAI GRUSHO, AND ELENA TIMONINA SECURITY POLICIES AND FORMAL ANALYSIS
OF SECURITY PROPERTIES POLICY-BASED DESIGN AND VERIFICATION FOR MISSION
ASSURANCE 125 SHIU-KAI BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/1004071116 DIGITALISIERT DURCH XII TABLE OF CONTENTS
USING EQUIVALENCE RELATIONS FOR CORRECTIVE ENFORCEMENT OF SECURITY
POLICIES 139 RAPHAEL KHOURY AND NADIA TAWBI MODEL CHECKING OF LOCATION
AND MOBILITY RELATED SECURITY POLICY SPECIFICATIONS IN AMBIENT CALCULUS
155 DEVRIM UNAL, OZAN AKAR, AND M. UFUK CAGLAYAN AUTHENTICATION,
AUTHORIZATION, ACCESS CONTROL AND PUBLIC KEY CRYPTOGRAPHY CREDENTIALS
MANAGEMENT FOR HIGH-VALUE TRANSACTIONS 169 GLENN BENSON, SHIU-KAI CHIN,
SEAN CROSTON, KARTHICK JAYARAMAN, AND SUSAN OLDER A NEW HARD PROBLEM
OVER NON-COMMUTATIVE FINITE GROUPS FOR CRYPTOGRAPHIC PROTOCOLS 183
DMITRIY N. MOLDOVYAN AND NIKOLAY A. MOLDOVYAN CREDENTIAL CHAIN DISCOVERY
IN RT T TRUST MANAGEMENT LANGUAGE 195 KRZYSZTOF SACHA GENETIC
OPTIMIZATION OF ACCESS CONTROL SCHEMES IN VIRTUAL LOCAL AREA NETWORKS
209 IGOR SAENKO AND IGOR KOTENKO INTRUSION AND MALWARE DETECTION
INTELLECTUAL INTRUSION DETECTION WITH SEQUENCES ALIGNMENT METHODS .
217 YAROSLAV A. MARKOV AND MAXIM O. KALININ SYMPTOMS-BASED DETECTION OF
BOT PROCESSES 229 JOSE ANDRE MORALES, ERHAN KARTALTEPE, SHOUHUAI XU, AND
RAVI SANDHU A COMPARISON OF FEATURE-SELECTION METHODS FOR INTRUSION
DETECTION . 242 HAI THANH NGUYEN, SLOBODAN PETROVIC, AND KATRIN
FRANKE FRO TABLE OF CONTENTS XIII IN THE TRACK OF THE AGENT PROTECTION:
A SOLUTION BASED ON CRYPTOGRAPHIC HARDWARE 284 ANTONIO MUNOZ, ANTONIO
MANA, AND PABLO ANTON SECURITY AND SCALABILITY OF REMOTE ENTRUSTING
PROTECTION 298 VASILY DESNITSKY AND IGOR KOTENKO ADAPTIVE SECURITY,
SECURITY ANALYSIS AND VIRTUALIZATION A NOVEL GENETIC APPROACH TO PROVIDE
DIFFERENTIATED LEVELS OF SERVICE RESILIENCE IN IP-MPLS/WDM NETWORKS 307
WOJCIECH MOLISZ AND JACEK RAK PREDICTIVE SECURITY ANALYSIS FOR
EVENT-DRIVEN PROCESSES 321 ROLAND RIEKE AND ZAHARINA STOYNOVA VIRTUAL
ENVIRONMENT SECURITY MODELING 329 DMITRY ZEGZHDA AND EKATERINA RUDINA
CLARIFYING INTEGRITY CONTROL AT THE TRUSTED INFORMATION ENVIRONMENT . .
. 337 DMITRY P. ZEGZHDA, PETER D. ZEGZHDA, AND MAXIM O. KALININ AUTHOR
INDEX 34, R |
any_adam_object | 1 |
author_GND | (DE-588)142070238 |
building | Verbundindex |
bvnumber | BV036616567 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)669170876 (DE-599)DNB1004071116 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036616567</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101027</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100816s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N27</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1004071116</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642147050</subfield><subfield code="c">PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.)</subfield><subfield code="9">978-3-642-14705-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642147054</subfield><subfield code="9">3-642-14705-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642147050</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80018870</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)669170876</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1004071116</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer network security</subfield><subfield code="b">5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings</subfield><subfield code="c">Igor Kotenko ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 344 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6258</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Sankt Petersburg</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kotenko, Igor</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142070238</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security</subfield><subfield code="n">5</subfield><subfield code="d">2010</subfield><subfield code="c">Sankt Petersburg</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16077834-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6258</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6258</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3499298&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020536695&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020536695</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Sankt Petersburg gnd-content |
genre_facet | Konferenzschrift 2010 Sankt Petersburg |
id | DE-604.BV036616567 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:12:41Z |
institution | BVB |
institution_GND | (DE-588)16077834-7 |
isbn | 9783642147050 3642147054 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020536695 |
oclc_num | 669170876 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIII, 344 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings Igor Kotenko ... (eds.) Berlin [u.a.] Springer 2010 XIII, 344 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6258 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Sankt Petersburg gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Kotenko, Igor Sonstige (DE-588)142070238 oth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security 5 2010 Sankt Petersburg Sonstige (DE-588)16077834-7 oth Lecture notes in computer science 6258 (DE-604)BV000000607 6258 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3499298&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020536695&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings |
title_auth | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings |
title_exact_search | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings |
title_full | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings Igor Kotenko ... (eds.) |
title_fullStr | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings Igor Kotenko ... (eds.) |
title_full_unstemmed | Computer network security 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings Igor Kotenko ... (eds.) |
title_short | Computer network security |
title_sort | computer network security 5th international conference on mathematical methods models and architectures for computer network security mmm acns 2010 st petersburg russia september 8 10 2010 proceedings |
title_sub | 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8 - 10, 2010 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Rechnernetz Computersicherheit Konferenzschrift 2010 Sankt Petersburg |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3499298&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020536695&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kotenkoigor computernetworksecurity5thinternationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritymmmacns2010stpetersburgrussiaseptember8102010proceedings AT internationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritysanktpetersburg computernetworksecurity5thinternationalconferenceonmathematicalmethodsmodelsandarchitecturesforcomputernetworksecuritymmmacns2010stpetersburgrussiaseptember8102010proceedings |