Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_27
D. Zegzhda, P. D. Zegzhda, M. Kalinin
{"title":"Clarifying Integrity Control at the Trusted Information Environment","authors":"D. Zegzhda, P. D. Zegzhda, M. Kalinin","doi":"10.1007/978-3-642-14706-7_27","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_27","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_3
J. G. Morrisett
{"title":"Integrating Types and Specifications for Secure Software Development","authors":"J. G. Morrisett","doi":"10.1007/978-3-642-14706-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_3","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_8
V. Sankaranarayanan, S. Upadhyaya, K. Kwiat
{"title":"QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems","authors":"V. Sankaranarayanan, S. Upadhyaya, K. Kwiat","doi":"10.1007/978-3-642-14706-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_8","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124693227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_6
Leonid Domnitser, N. Abu-Ghazaleh, D. Ponomarev
{"title":"A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors","authors":"Leonid Domnitser, N. Abu-Ghazaleh, D. Ponomarev","doi":"10.1007/978-3-642-14706-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_6","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_10
Shiu-Kai Chin, Sarah L. Muccio, Susan Older, T. Vestal
{"title":"Policy-Based Design and Verification for Mission Assurance","authors":"Shiu-Kai Chin, Sarah L. Muccio, Susan Older, T. Vestal","doi":"10.1007/978-3-642-14706-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_10","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_4
B. Preneel
{"title":"Cryptography for Network Security: Failures, Successes and Challenges","authors":"B. Preneel","doi":"10.1007/978-3-642-14706-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_4","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127707019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_16
I. Saenko, Igor Kotenko
{"title":"Genetic Optimization of Access Control Schemes in Virtual Local Area Networks","authors":"I. Saenko, Igor Kotenko","doi":"10.1007/978-3-642-14706-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_16","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122963131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_18
J. Morales, Erhan J. Kartaltepe, Shouhuai Xu, R. Sandhu
{"title":"Symptoms-Based Detection of Bot Processes","authors":"J. Morales, Erhan J. Kartaltepe, Shouhuai Xu, R. Sandhu","doi":"10.1007/978-3-642-14706-7_18","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_18","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_22
A. Muñoz, A. Maña, Pablo Antón
{"title":"In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware","authors":"A. Muñoz, A. Maña, Pablo Antón","doi":"10.1007/978-3-642-14706-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_22","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-08DOI: 10.1007/978-3-642-14706-7_14
D. Moldovyan, N. Moldovyan
{"title":"A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols","authors":"D. Moldovyan, N. Moldovyan","doi":"10.1007/978-3-642-14706-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-14706-7_14","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}