Computer Network Security计算机网络安全/会议录

出版社:1 (2005年10月19日)
出版日期:2003-9
ISBN:9783540291138
作者:Vladimir Gorodetsky
页数:477页

作者简介

The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.    The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.    —proceedings (published in time for the respective conference)    —post-proceedings (consisting of thoroughly revised final full papers)    —research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.).

书籍目录

Invited Papers Self-managed Cells for Ubiquitous Systems Critical Information Assurance Challenges for Modern Large-Scale Infrastructures Rule-Based Topological Vulnerability Analysis Models and Analysis of Active Worm Defense Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer CodesMathematical Models, Architectures and Protocolsfor Computer Network Security Calibrating Entropy Functions Applied to Computer Networks A Passive External Web Surveillance Technique for Private Networks A Secure Way to Combine IPsec, NAT & DHCP A Generic Model for Analyzing Security Protocols Networks, Markov Lie Monoids, and Generalized Entropy Trust by Workflow in Autonomic Communication An Ontology-Based Approach to Information Systems Security ManagementAuthentication, Authorization and Access Control Safety Problems in Access Control with Temporal Constraints A ModM Logic for Role-Based Access Control Unique User-Generated Digital Pseudonyms Information Flow Analysis, Covert Channels and Trust Management A Probabilistic Property-Specific Approach to Information Flow Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata Detection of Illegal Information Flow Towards More Controllable and Practical DelegationSecurity Policy and Operating System Security Policy-Driven Routing Management Using CIM Secure Hybrid Operating System "Linux over Fenix" ……Threat Modeling,Vulnerability Assessment and Network ForensicsIntrusion DetectionXhort PatersAuthor Index


 Computer Network Security计算机网络安全/会议录下载



发布书评

 
 


 

农业基础科学,时尚,美术/书法,绘画,软件工程/开发项目管理,研究生/本专科,爱情/情感,动漫学堂PDF下载,。 PDF下载网 

PDF下载网 @ 2024