Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_24
B. Kerrigan, Yu Chen
{"title":"A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts","authors":"B. Kerrigan, Yu Chen","doi":"10.1007/978-3-642-33704-8_24","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_24","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_4
Tyrone Cadenhead, Murat Kantarcioglu, V. Khadilkar, B. Thuraisingham
{"title":"Design and Implementation of a Cloud-Based Assured Information Sharing System","authors":"Tyrone Cadenhead, Murat Kantarcioglu, V. Khadilkar, B. Thuraisingham","doi":"10.1007/978-3-642-33704-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_4","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126725444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_13
G. Benson, Shiu-Kai Chin, Sean Croston, K. Jayaraman, Susan Older
{"title":"Credentials Management for High-Value Transactions","authors":"G. Benson, Shiu-Kai Chin, Sean Croston, K. Jayaraman, Susan Older","doi":"10.1007/978-3-642-14706-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_13","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_11
R. Khoury, N. Tawbi
{"title":"Using Equivalence Relations for Corrective Enforcement of Security Policies","authors":"R. Khoury, N. Tawbi","doi":"10.1007/978-3-642-14706-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_11","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_17
Yaroslav A. Markov, M. Kalinin
{"title":"Intellectual Intrusion Detection with Sequences Alignment Methods","authors":"Yaroslav A. Markov, M. Kalinin","doi":"10.1007/978-3-642-14706-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_17","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_24
W. Molisz, J. Rak
{"title":"A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks","authors":"W. Molisz, J. Rak","doi":"10.1007/978-3-642-14706-7_24","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_24","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"101 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_5
R. Sandhu, R. Krishnan, Jianwei Niu, W. Winsborough
{"title":"Group-Centric Models for Secure and Agile Information Sharing","authors":"R. Sandhu, R. Krishnan, Jianwei Niu, W. Winsborough","doi":"10.1007/978-3-642-14706-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_5","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_7
L. Piètre-Cambacédès, M. Bouissou
{"title":"Attack and Defense Modeling with BDMP","authors":"L. Piètre-Cambacédès, M. Bouissou","doi":"10.1007/978-3-642-14706-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_7","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_1
Hervé Debar, Nizar Kheir, N. Cuppens-Boulahia, F. Cuppens
{"title":"Service Dependencies in Information Systems Security","authors":"Hervé Debar, Nizar Kheir, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1007/978-3-642-14706-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_1","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}