Computer Network Security: 5th International Conference On Mathematical Methods, Models And Architectures For Computer Network Security, Mmm-acns 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings

E-Book Overview

This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS (SPIIRAS) in co- eration with Binghamton University (SUNY). The previous conferences in the series (MMM-ACNS 2001, MMM-ACNS 2003, MMM-ACNS 2005 and MMM-ACNS 2007) organized by SPIIRAS and Binghamton University (SUNY) demonstrated the great interest of the international scientific community in the theoretical and practical aspects of computer network and information security. MMM-ACNS 2010 provided the next international forum for sharing original - search results among specialists in fundamental and applied problems of computer network security. A total of 54 papers from 19 countries related to significant aspects of the theory and applications of computer network and information security were submitted to MMM-ACNS 2010: 16 papers were selected for regular and 6 for short presentations (30% of acceptance for full papers and 40% for all papers).


E-Book Content

Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany 6258 Igor Kotenko Victor Skormin (Eds.) Computer Network Security 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010 St. Petersburg, Russia, September 8-10, 2010 Proceedings 13 Volume Editors Igor Kotenko Institution of the Russian Academy of Sciences St. Petersburg Institute for Informatics and Automation of RAS 39, 14-th Liniya, St. Petersburg, 199178, Russia E-mail: [email protected] Victor Skormin Binghamton University (SUNYI) Binghamton, NY 13902, USA E-mail: [email protected] Library of Congress Control Number: 2010931166 CR Subject Classification (1998): C.2, D.4.6, E.3, K.6.5, K.4, H.4, J.1 LNCS Sublibrary: SL 5 – Computer Communication Networks and Telecommunications ISSN ISBN-10 ISBN-13 0302-9743 3-642-14705-4 Springer Berlin Heidelberg New York 978-3-642-14705-0 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,
You might also like

Network Analysis: Methodological Foundations
Authors: Ulrik Brandes , Thomas Erlebach (auth.) , Ulrik Brandes , Thomas Erlebach (eds.)    178    0


Concise Algorithmics: The Basic Toolbox
Authors: Mehlhorn K. , Sanders P.    126    0


Bioinformatics, Biocomputing And Perl: An Introduction
Authors: Michael Moorhouse , Paul Barry    134    0



Pattern Classification
Authors: Richard O. Duda , Peter E. Hart , David G. Stork    156    0


с++
Authors: Элджер Дж.    229    0



Oracle Call Interface Getting Started
Authors: Belden E. , Greenberg J. , Slattery H.    108    0


Data Mining Techniques For Marketing, Sales, And Customer Relationship Management
Authors: Michael J. A. Berry , Gordon S. Linoff    125    0