000 | 04305nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-540-76929-3 | ||
003 | DE-He213 | ||
005 | 20240730182326.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2007 gw | s |||| 0|eng d | ||
020 |
_a9783540769293 _9978-3-540-76929-3 |
||
024 | 7 |
_a10.1007/978-3-540-76929-3 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUYA _2bicssc |
|
072 | 7 |
_aCOM014000 _2bisacsh |
|
072 | 7 |
_aUYA _2thema |
|
082 | 0 | 4 |
_a004.0151 _223 |
245 | 1 | 0 |
_aAdvances in Computer Science - ASIAN 2007. Computer and Network Security _h[electronic resource] : _b12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / _cedited by Iliano Cervesato. |
250 | _a1st ed. 2007. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2007. |
|
300 |
_aXI, 316 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v4846 |
|
505 | 0 | _aInvited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic - A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typingfor Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. | |
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aTheory of Computation. _9127837 |
650 | 2 | 4 |
_aComputer Science Logic and Foundations of Programming. _942203 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9127838 |
700 | 1 |
_aCervesato, Iliano. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9127839 |
|
710 | 2 |
_aSpringerLink (Online service) _9127840 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540769279 |
776 | 0 | 8 |
_iPrinted edition: _z9783540846161 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v4846 _9127841 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-76929-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91312 _d91312 |