Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings / edited by Igor Kotenko, Victor Skormin.

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefu...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kotenko, Igor (Editor), Skormin, Victor (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edition:1st ed. 2012.
Series:Computer Communication Networks and Telecommunications ; 7531
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Finding Malware on a Web Scale.
  • Exposing Security Risks for Commercial Mobile Devices
  • From Qualitative to Quantitative Enforcement of Security Policy
  • Design and Implementation of a Cloud-Based Assured Information Sharing System
  • Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries
  • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
  • Blind 384-bit Digital Signature Scheme
  • RABAC: Role-Centric Attribute-Based Access Control
  • Trust-Aware RBAC
  • Alternative Mechanisms for Information Security
  • Flow Policies by a Three-Valued Analysis
  • Towards the Orchestration of Secured Services under Non-disclosure Policies
  • An Approach for Network Information Flow Analysis for Systems of Embedded Components
  • Individual Countermeasure Selection Based on the Return On Response Investment Index
  • Security and Reliability Requirements for Advanced Security Event Management
  • Model-Based Security Event Management
  • Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks
  • Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation
  • Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems
  • Malware Characterization Using Behavioral Components
  • MADAM: A Multi-level Anomaly Detector for Android Malware
  • Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods
  • Configuration-Based Approach to Embedded Device Security
  • A Study of Entropy Sources in Cloud Computers: Random Number
  • Generation on Cloud Hosts
  • Security Modeling of Grid Systems Using Petri Nets
  • Using Graph Theory for Cloud System Security Modeling.