Skip to main content
  • Conference proceedings
  • © 2010

Computer Network Security

5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings

  • up-to-date results
  • fast track conference proceedings
  • state-of-the-art report

Conference proceedings info: MMM-ACNS 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Invited Papers

    1. Service Dependencies in Information Systems Security

      • Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 1-20
    2. Group-Centric Models for Secure and Agile Information Sharing

      • Ravi Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough
      Pages 55-69
  3. Security Modeling and Covert Channels

    1. A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors

      • Leonid Domnitser, Nael Abu-Ghazaleh, Dmitry Ponomarev
      Pages 70-85
    2. Attack and Defense Modeling with BDMP

      • Ludovic Piètre-Cambacédès, Marc Bouissou
      Pages 86-101
    3. QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems

      • Vidyaraman Sankaranarayanan, Shambhu Upadhyaya, Kevin Kwiat
      Pages 102-117
    4. Problems of Modeling in the Analysis of Covert Channels

      • Alexander Grusho, Nikolai Grusho, Elena Timonina
      Pages 118-124
  4. Security Policies and Formal Analysis of Security Properties

    1. Policy-Based Design and Verification for Mission Assurance

      • Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal
      Pages 125-138
  5. Authentication, Authorization, Access Control and Public Key Cryptography

    1. Credentials Management for High-Value Transactions

      • Glenn Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older
      Pages 169-182
    2. A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols

      • Dmitriy N. Moldovyan, Nikolay A. Moldovyan
      Pages 183-194
  6. Intrusion and Malware Detection

    1. Intellectual Intrusion Detection with Sequences Alignment Methods

      • Yaroslav A. Markov, Maxim O. Kalinin
      Pages 217-228
    2. Symptoms-Based Detection of Bot Processes

      • Jose Andre Morales, Erhan Kartaltepe, Shouhuai Xu, Ravi Sandhu
      Pages 229-241
    3. A Comparison of Feature-Selection Methods for Intrusion Detection

      • Hai Thanh Nguyen, Slobodan Petrović, Katrin Franke
      Pages 242-255

Other Volumes

  1. Computer Network Security

About this book

This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original - search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers).

Editors and Affiliations

  • Computer Security Research Group, St. Petersburg Institute for Informatics and Automation, St.-Petersburg, Russia

    Igor Kotenko

  • US Air Force, Binghamton University (SUNYI), Binghamton, USA

    Victor Skormin

Bibliographic Information

  • Book Title: Computer Network Security

  • Book Subtitle: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, Proceedings

  • Editors: Igor Kotenko, Victor Skormin

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-14706-7

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2010

  • Softcover ISBN: 978-3-642-14705-0Published: 11 August 2010

  • eBook ISBN: 978-3-642-14706-7Published: 12 August 2010

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 345

  • Number of Illustrations: 92 b/w illustrations

  • Topics: Computer Communication Networks

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access