Skip to main content
  • Conference proceedings
  • © 2012

Computer Network Security

6th International Conference on Mathematical Methods, Models and Architectures for Comüuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Conference proceedings info: MMM-ACNS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Invited Papers

    1. Finding Malware on a Web Scale

      • Benjamin Livshits
      Pages 1-2
    2. Exposing Security Risks for Commercial Mobile Devices

      • Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou
      Pages 3-21
    3. From Qualitative to Quantitative Enforcement of Security Policy

      • Fabio Martinelli, Ilaria Matteucci, Charles Morisset
      Pages 22-35
    4. Design and Implementation of a Cloud-Based Assured Information Sharing System

      • Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham
      Pages 36-50
  3. Applied Cryptography and Security Protocols

    1. Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries

      • Victor Yakovlev, Valery Korzhik, Mihail Bakaev, Guillermo Morales-Luna
      Pages 51-64
    2. Blind 384-bit Digital Signature Scheme

      • Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova
      Pages 77-83
  4. Access Control and Information Protection

    1. RABAC: Role-Centric Attribute-Based Access Control

      • Xin Jin, Ravi Sandhu, Ram Krishnan
      Pages 84-96
    2. Trust-Aware RBAC

      • Vladimir Oleshchuk
      Pages 97-107
    3. Alternative Mechanisms for Information Security

      • Alexander Grusho, Nick Grusho, Elena Timonina
      Pages 108-113
  5. Security Policies

    1. Enforcing Information Flow Policies by a Three-Valued Analysis

      • Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi
      Pages 114-129
    2. Towards the Orchestration of Secured Services under Non-disclosure Policies

      • Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
      Pages 130-145
    3. An Approach for Network Information Flow Analysis for Systems of Embedded Components

      • Andrey Chechulin, Igor Kotenko, Vasily Desnitsky
      Pages 146-155
  6. Security Event and Information Management

    1. Individual Countermeasure Selection Based on the Return On Response Investment Index

      • Gustavo Gonzalez Granadillo, Hervé Débar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal
      Pages 156-170
    2. Security and Reliability Requirements for Advanced Security Event Management

      • Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber
      Pages 171-180
    3. Model-Based Security Event Management

      • Julian Schütte, Roland Rieke, Timo Winkelvos
      Pages 181-190
  7. Intrusion Prevention, Detection, and Response

    1. Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks

      • Andrey Dolgikh, Tomas Nykodym, Victor Skormin, Zachary Birnbaum
      Pages 191-202
    2. Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation

      • Yosra Ben Mustapha, Hervé Débar, Grégoire Jacob
      Pages 203-217

Other Volumes

  1. Computer Network Security

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Editors and Affiliations

  • St. Petersburg Institute for Informatics and Automation, Russian Academy of Science, St.-Petersburg, Russia

    Igor Kotenko

  • Binghamton University (SUNYI), Binghamton, USA

    Victor Skormin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access