Advances in Computer Science - ASIAN 2007. Computer and Network Security
Editat de Iliano Cervesatoen Limba Engleză Paperback – 22 noi 2007
Preț: 322.61 lei
Preț vechi: 403.26 lei
-20% Nou
Puncte Express: 484
Preț estimativ în valută:
57.08€ • 66.50$ • 49.84£
57.08€ • 66.50$ • 49.84£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540769279
ISBN-10: 3540769277
Pagini: 328
Ilustrații: XI, 316 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540769277
Pagini: 328
Ilustrații: XI, 316 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.5 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Speaker: Andrei Sabelfeld.- Dimensions of Declassification in Theory and Practice.- A Static Birthmark of Binary Executables Based on API Call Structure.- Compiling C Programs into a Strongly Typed Assembly Language.- Information Flow Testing.- Large Scale Simulation of Tor:.- Privacy Enhancing Credentials.- Browser Based Agile E-Voting System.- Risk Balance in Exchange Protocols.- Scalable DRM System for Media Portability.- Computational Semantics for Basic Protocol Logic – A Stochastic Approach.- Management Advantages of Object Classification in Role-Based Access Control (RBAC).- An Integrated Model for Access Control and Information Flow Requirements.- Digital Rights Management Using a Master Control Device.- Invited Speaker: Joshua Guttman.- How to do Things with Cryptographic Protocols.- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols.- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.- Secure Verification of Location Claims with Simultaneous Distance Modification.- Invited Speaker: Kazuhiko Kato.- Modeling and Virtualization for Secure Computing Environments.- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces.- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks.- Masquerade Detection Based Upon GUI User Profiling in Linux Systems.- One-Time Receiver Address in IPv6 for Protecting Unlinkability.- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.- Combining Heterogeneous Classifiers for Network Intrusion Detection.- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments.- On Run-Time Enforcement of Policies.- Static vs Dynamic Typingfor Access Control in Pi-Calculus.- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.