Computer Network Security计算机网络安全/会议录

出版时间:2003-9  出版社:1 (2005年10月19日)  作者:Vladimir Gorodetsky  页数:477  

内容概要

The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.    The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.    —proceedings (published in time for the respective conference)    —post-proceedings (consisting of thoroughly revised final full papers)    —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).

书籍目录

Invited Papers Self-managed Cells for Ubiquitous Systems Critical Information Assurance Challenges for Modern Large-Scale Infrastructures Rule-Based Topological Vulnerability Analysis Models and Analysis of Active Worm Defense Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer CodesMathematical Models, Architectures and Protocolsfor Computer Network Security Calibrating Entropy Functions Applied to Computer Networks A Passive External Web Surveillance Technique for Private Networks A Secure Way to Combine IPsec, NAT & DHCP A Generic Model for Analyzing Security Protocols Networks, Markov Lie Monoids, and Generalized Entropy Trust by Workflow in Autonomic Communication An Ontology-Based Approach to Information Systems Security ManagementAuthentication, Authorization and Access Control Safety Problems in Access Control with Temporal Constraints A ModM Logic for Role-Based Access Control Unique User-Generated Digital Pseudonyms Information Flow Analysis, Covert Channels and Trust Management A Probabilistic Property-Specific Approach to Information Flow Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata Detection of Illegal Information Flow Towards More Controllable and Practical DelegationSecurity Policy and Operating System Security Policy-Driven Routing Management Using CIM Secure Hybrid Operating System "Linux over Fenix" ……Threat Modeling,Vulnerability Assessment and Network ForensicsIntrusion DetectionXhort PatersAuthor Index

图书封面

评论、评分、阅读与下载


    Computer Network Security计算机网络安全/会议录 PDF格式下载


用户评论 (总计0条)

 
 

推荐图书


 

250万本中文图书简介、评论、评分,PDF格式免费下载。 第一图书网 手机版

京ICP备13047387号-7