Computer Network Security
Editat de Vladimir Gorodetsky, Igor Kotenko, Victor A. Skorminen Limba Engleză Paperback – 28 aug 2007
Preț: 328.13 lei
Preț vechi: 410.16 lei
-20% Nou
Puncte Express: 492
Preț estimativ în valută:
58.06€ • 68.09$ • 50.99£
58.06€ • 68.09$ • 50.99£
Carte tipărită la comandă
Livrare economică 09-23 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540739852
ISBN-10: 3540739858
Pagini: 436
Ilustrații: XIV, 418 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540739858
Pagini: 436
Ilustrații: XIV, 418 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Papers.- Surreptitious Software: Models from Biology and History.- Characterizing Software Self-healing Systems.- Assumptions: The Trojan Horses of Secure Protocols.- Smart Cards and Digital Security.- Virus Throttle as Basis for ProActive Defense.- Technologies for Protection Against Insider Attacks on Computer Systems.- Authentication, Authorization and Access Control.- Access Control and Declassification.- Reasoning About Delegation and Account Access in Retail Payment Systems.- Performance Evaluation of Keyless Authentication Based on Noisy Channel.- Avoiding Key Redistribution in Key Assignment Schemes.- Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching.- Class of Provably Secure Information Authentication Systems.- A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems.- Language-Based Security, Trust Management and Covert Channels.- Synthesis of Non-interferent Distributed Systems.- Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems.- Covert Channel Invisibility Theorem.- Security Verification and Evaluation.- Policy-Based Proactive Monitoring of Security Policy Performance.- Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric.- Abstraction Based Verification of a Parameterised Policy Controlled System.- Algebraic Models to Detect and Solve Policy Conflicts.- Event Calcululus Based Checking of Filtering Policies.- A New Approach to Security Evaluation of Operating Systems.- Intrusion Detection and Prevention.- Multi-agent Peer-to-Peer Intrusion Detection.- An Interval Temporal Logic-Based Matching Framework for Finding Occurrences of Multi-event Attack Signatures.- Towards Fully Automatic Defense Mechanism for a Computer Network Emulating Active Immune Response.- Mathematical Models of Intrusion Detection by an Intelligent Immunochip.- A Novel Intrusion Detection System for a Local Computer Network.- Investigation of the Effectiveness of Alert Correlation Methods in a Policy-Based Security Framework.- Host-Based Intrusion Detection System: Model and Design Features.- Network Survivability and Privacy.- Interval Approach to Preserving Privacy in Statistical Databases: Related Challenges and Algorithms of Computational Statistics.- Fast Service Restoration Under Shared Protection at Lightpath Level in Survivable WDM Mesh Grooming Networks.- Anycast Communication—A New Approach to Survivability of Connection-Oriented Networks.- Privacy Preserving Context Transfer in All-IP Networks.- Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols.- Watermarking.- A Spatial Watermarking Algorithm for Video Images.- Watermarking Software to Signal Copy Protection.