第一图书网

Computer Network Security计算机网络安全/会议录

Vladimir Gorodetsky 1 (2005年10月19日)
出版时间:

2003-9  

出版社:

1 (2005年10月19日)  

作者:

Vladimir Gorodetsky  

页数:

477  

内容概要

The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available. The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes. —proceedings (published in time for the respective conference) —post-proceedings (consisting of thoroughly revised final full papers) —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).

书籍目录

Invited Papers Self-managed Cells for Ubiquitous Systems Critical Information Assurance Challenges for Modern Large-Scale Infrastructures Rule-Based Topological Vulnerability Analysis Models and Analysis of Active Worm Defense Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer CodesMathematical Models, Architectures and Protocolsfor Computer Network Security Calibrating Entropy Functions Applied to Computer Networks A Passive External Web Surveillance Technique for Private Networks A Secure Way to Combine IPsec, NAT & DHCP A Generic Model for Analyzing Security Protocols Networks, Markov Lie Monoids, and Generalized Entropy Trust by Workflow in Autonomic Communication An Ontology-Based Approach to Information Systems Security ManagementAuthentication, Authorization and Access Control Safety Problems in Access Control with Temporal Constraints A ModM Logic for Role-Based Access Control Unique User-Generated Digital Pseudonyms Information Flow Analysis, Covert Channels and Trust Management A Probabilistic Property-Specific Approach to Information Flow Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata Detection of Illegal Information Flow Towards More Controllable and Practical DelegationSecurity Policy and Operating System Security Policy-Driven Routing Management Using CIM Secure Hybrid Operating System "Linux over Fenix" ……Threat Modeling,Vulnerability Assessment and Network ForensicsIntrusion DetectionXhort PatersAuthor Index


图书封面

广告

下载页面


Computer Network Security计算机网络安全/会议录 PDF格式下载



相关图书