Skip to main content
  • Conference proceedings
  • © 2007

Computer Network Security

Fourth International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007, Proceedings

Conference proceedings info: MMM-ACNS 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XIV
  2. Invited Papers

    1. Academia Track

      1. Surreptitious Software: Models from Biology and History
        • Christian Collberg, Jasvir Nagra, Fei-Yue Wang
        Pages 1-21
      2. Characterizing Software Self-healing Systems
        • Angelos D. Keromytis
        Pages 22-33
    2. Industry Track

      1. Smart Cards and Digital Security
        • Jean-Daniel Aussel
        Pages 42-56
      2. Virus Throttle as Basis for ProActive Defense
        • Mauricio Sanchez
        Pages 57-74
  3. Authentication, Authorization and Access Control

    1. Full Papers

      1. Access Control and Declassification
        • Gérard Boudol, Marija Kolundžija
        Pages 85-98
      2. Performance Evaluation of Keyless Authentication Based on Noisy Channel
        • Valery Korzhik, Viktor Yakovlev, Guillermo Morales-Luna, Roman Chesnokov
        Pages 115-126
      3. Avoiding Key Redistribution in Key Assignment Schemes
        • Harry Rowe, Jason Crampton
        Pages 127-140
    2. Short Papers

      1. Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching
        • E. Freudenthal, D. Herrera, S. Gutstein, R. Spring, L. Longpré
        Pages 141-146
      2. Class of Provably Secure Information Authentication Systems
        • N.A. Moldovyan, A.A. Moldovyan
        Pages 147-152
  4. Language-Based Security, Trust Management and Covert Channels

    1. Full Papers

      1. Synthesis of Non-interferent Distributed Systems
        • Franck Cassez, John Mullins, Olivier H. Roux
        Pages 159-170
      2. Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
        • Changyu Dong, Giovanni Russello, Naranker Dulay
        Pages 171-186
      3. Covert Channel Invisibility Theorem
        • Alexander Grusho, Nick Grebnev, Elena Timonina
        Pages 187-196
  5. Security Verification and Evaluation

    1. Full Papers

      1. Policy-Based Proactive Monitoring of Security Policy Performance
        • Vitaly Bogdanov, Igor Kotenko
        Pages 197-212
      2. Abstraction Based Verification of a Parameterised Policy Controlled System
        • Peter Ochsenschläger, Roland Rieke
        Pages 228-241

Other Volumes

  1. Computer Network Security

About this book

This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) in cooperation with Binghamton University (SUNY, USA). The organizers are proud that the MMM-ACNS workshops hosted by the St. Petersburg Institute for Informatics and Automation in 2001, 2003 and 2005 evolved into a bi-annual series recognized in the professional community. These events not only demonstrated the keen interest of the participating researchers in the subject matter and the opportunity to present and disseminate individual achievements, but also promoted the spirit of cooperation, camaraderie, free exchange of ideas, and intellectually stimulating interaction between colleagues. Again, MMM-ACNS 2007 provided an international forum for sharing or- inal research results among specialists in fundamental and applied problems of computer network security. An important distinction of the conference was its focus on mathematical aspects of information and computer network security addressing the ever-increasing demands for secure computing and highly - pendable computer networks. A total of 56 papers from 18 countries related to signi?cant aspects of both theory and applications ofcomputer networkand informationsecurity weres- mitted to MMM-ACNS 2007. In total, 18 papers were selected for regular p- sentationsand 12 for short presentations(32 % of acceptance for full papers and 53 % for all papers).

Editors and Affiliations

  • St. Petersburg Institute for Informatics and Automation, St. Petersburg, Russia

    Vladimir Gorodetsky, Igor Kotenko

  • US Air Force, Binghamton University (SUNY), Binghamton, USA

    Victor A. Skormin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access