Skip to main content
  • Conference proceedings
  • © 2005

Computer Network Security

Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005, Proceedings

Conference proceedings info: MMM-ACNS 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. Invited Papers

    1. Self-managed Cells for Ubiquitous Systems

      • Naranker Dulay, Emil Lupu, Morris Sloman, Joe Sventek, Nagwa Badr, Stephen Heeps
      Pages 1-6
    2. Rule-Based Topological Vulnerability Analysis

      • Vipin Swarup, Sushil Jajodia, Joseph Pamula
      Pages 23-37
    3. Models and Analysis of Active Worm Defense

      • David M. Nicol, Michael Liljenstam
      Pages 38-53
    4. Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes

      • Douglas Summerville, Victor Skormin, Alexander Volynkin, James Moronski
      Pages 54-75
  3. Mathematical Models, Architectures and Protocols for Computer Network Security

    1. A Passive External Web Surveillance Technique for Private Networks

      • Constantine Daicos, Scott Knight
      Pages 88-103
    2. A Secure Way to Combine IPsec, NAT & DHCP

      • Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz
      Pages 104-118
    3. A Generic Model for Analyzing Security Protocols

      • Yonggen Gu, Yuxi Fu, Farong Zhong, Han Zhu
      Pages 119-128
    4. Trust by Workflow in Autonomic Communication

      • Mikhail I. Smirnov
      Pages 136-150
    5. An Ontology-Based Approach to Information Systems Security Management

      • Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis
      Pages 151-164
  4. Authentication, Authorization and Access Control

    1. Safety Problems in Access Control with Temporal Constraints

      • Philippe Balbiani, Fahima Cheikh
      Pages 165-178
    2. A Modal Logic for Role-Based Access Control

      • Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin
      Pages 179-193
    3. Unique User-Generated Digital Pseudonyms

      • Peter Schartner, Martin Schaffer
      Pages 194-205
  5. Information Flow Analysis, Covert Channels and Trust Management

    1. A Probabilistic Property-Specific Approach to Information Flow

      • Danièle Beauquier, Marie Duflot, Marius Minea
      Pages 206-220
    2. Detection of Illegal Information Flow

      • Alexander Grusho, Alexander Kniazev, Elena Timonina
      Pages 235-244
    3. Towards More Controllable and Practical Delegation

      • Gang Yin, Huaimin Wang, Dianxi Shi, Haiya Gu
      Pages 245-258

Other Volumes

  1. Computer Network Security

About this book

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St. Petersburg, Russia, during September 25–27, 2005. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The 1st and the 2nd International Workshops on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2001 and MMM-ACNS 2003), hosted by the St. Petersburg Institute for Informatics and Automation, demonstrated the keen interest of the international research community in the subject area. It was recognized that conducting a biannual series of such workshops in St. Petersburg stimulates fruitful exchanges between the di?erent schools of thought, facilitates the dissemination of new ideas and promotesthespiritofcooperationbetweenresearchersontheinternationalscale. MMM-ACNS 2005 provided an international forum for sharing original - search results and application experiences among specialists in fundamental and applied problems of computer network security. An important distinction of the workshop was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly dependable computer networks.

Editors and Affiliations

  • St. Petersburg Intitute for Informaticsand Automation, St. Petersburg, Russia

    Vladimir Gorodetsky

  • Computer Security Research Group, St. Petersburg Institute for Informatics and Automation, St.-Petersburg, Russia

    Igor Kotenko

  • US Air Force, Binghamton University (SUNYI), Binghamton, USA

    Victor Skormin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access