


default search action
MMM-ACNS 2001: St. Petersburg, Russia
- Vladimir I. Gorodetski, Victor A. Skormin, Leonard J. Popyack:

Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings. Lecture Notes in Computer Science 2052, Springer 2001, ISBN 3-540-42103-3
Invited Talks
- Dipankar Dasgupta, Fabio A. González:

An Intelligent Decision Support System for Intrusion Detection and Response. 1-14 - Alexander A. Grusho:

Mathematical Models of the Covert Channels. 15-20 - Catherine Meadows:

Open Issues in Formal Methods for Cryptographic Protocol Analysis. 21 - Ravi S. Sandhu:

Future Directions in Role-Based Access Control Models. 22-26 - Vijay Varadharajan:

Secure Networked Computing. 27
Network Security Systems: Foundations, Models, and Architectures
- Jan Jürjens:

Composability of Secrecy. 28-38 - Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko

, Leonard J. Popyack, Victor A. Skormin:
Agent-Based Model of Computer Network Security System: A Case Study. 39-50 - Michael Smirnov:

Security Considerations and Models for Service Creation in Premium IP Networks. 51-62 - Peter D. Zegzhda

, Dmitry P. Zegzhda:
Secure Systems Design Technology. 63-71 - Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis:

A Privacy-Enhancing e-Business Model Based on Infomediaries. 72-83 - Constance L. Heitmeyer:

Applying Practical Formal Methods to the Specification and Analysis of Security Properties. 84-89 - Andrey Kostogryzov:

Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ). 90-101 - Konstantin Knorr, Harald Weidner:

Analyzing Separation of Duties in Petri Net Workflows. 102-114
Intrusion Detection: Foundations and Models
- Alexander O. Tarakanov:

Information Security with Formal Immune Networks. 115-126 - Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov:

BASIS: A Biological Approach to System Information Security. 127-142 - Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen:

Learning Temporal Regularities of User Behavior for Anomaly Detection. 143-152 - Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland

:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. 153-158
Access Control, Authentication and Authorization
- Iliano Cervesato:

Typed MSR: Syntax and Examples. 159-177 - Steve Barker:

TRBAC: A Temporal Authorization Model. 178-188 - Tatyana Ryutov, B. Clifford Neuman:

The Set and Function Approach to Modeling Authorization in Distributed Systems. 189-206 - Dmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin:

Fenix Secure Operating System: Principles, Models and Architecture. 207-218
Cryptography and Steganography: Mathematical Basis, Protocols, and Applied Methods
- Valeri Korjik, Kirill Morozov:

Generalized Oblivious Transfer Protocols Based on Noisy Channels. 219-229 - Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan:

Controlled Operations as a Cryptographic Primitive. 230-241 - Viktor Yakovlev, Valery Korjik, Alexander Sinuk:

Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. 242-250 - Ghassan Chaddoud, Isabelle Chrisment, André Schaff:

Dynamic Group Key Management Protocol. 251-262 - Vladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin:

SVD-Based Approach to Transparent Embedding Data into Digital Images. 263-274 - Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan:

Fast Encryption Algorithm Spectr-H64. 275-286 - Antonio Durante, Riccardo Focardi, Roberto Gorrieri:

CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. 287-299 - Selçuk Kavut, Melek D. Yücel:

On Some Cryptographic Properties of Rijndael. 300-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














