The SCEAS System
Navigation Menu

Conferences in DBLP

Mathematical Methods, Models, and Architectures for Network Security Systems (MMM-ACNS) (mmmacns)
2001 (conf/mmmacns/2001)

  1. Dipankar Dasgupta, Fabio A. González
    An Intelligent Decision Support System for Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:1-14 [Conf]
  2. Alexander Grusho
    Mathematical Models of the Covert Channels. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:15-20 [Conf]
  3. Catherine Meadows
    Open Issues in Formal Methods for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:21- [Conf]
  4. Ravi S. Sandhu
    Future Directions in Role-Based Access Control Models. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:22-26 [Conf]
  5. Vijay Varadharajan
    Secure Networked Computing. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:27- [Conf]
  6. Jan Jürjens
    Composability of Secrecy. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:28-38 [Conf]
  7. Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin
    Agent-Based Model of Computer Network Security System: A Case Study. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:39-50 [Conf]
  8. Michael Smirnov
    Security Considerations and Models for Service Creation in Premium IP Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:51-62 [Conf]
  9. Peter D. Zegzhda, Dmitry P. Zegzhda
    Secure Systems Design Technology. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:63-71 [Conf]
  10. Dimitris Gritzalis, Konstantinos Moulinos, Konstantinos Kostis
    A Privacy-Enhancing e-Business Model Based on Infomediaries. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:72-83 [Conf]
  11. Constance L. Heitmeyer
    Applying Practical Formal Methods to the Specification and Analysis of Security Properties. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:84-89 [Conf]
  12. Andrey Kostogryzov
    Modeling Software Tools Complex for Evaluation of Information Systems Operation Quality (CEISOQ). [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:90-101 [Conf]
  13. Konstantin Knorr, Harald Weidner
    Analyzing Separation of Duties in Petri Net Workflows. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:102-114 [Conf]
  14. Alexander O. Tarakanov
    Information Security with Formal Immune Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:115-126 [Conf]
  15. Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov
    BASIS: A Biological Approach to System Information Security. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:127-142 [Conf]
  16. Alexandr Seleznyov, Oleksiy Mazhelis, Seppo Puuronen
    Learning Temporal Regularities of User Behavior for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:143-152 [Conf]
  17. Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland
    Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:153-158 [Conf]
  18. Iliano Cervesato
    Typed MSR: Syntax and Examples. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:159-177 [Conf]
  19. Steve Barker
    TRBAC: A Temporal Authorization Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:178-188 [Conf]
  20. Tatyana Ryutov, B. Clifford Neuman
    The Set and Function Approach to Modeling Authorization in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:189-206 [Conf]
  21. Dmitry P. Zegzhda, Pavel G. Stepanov, Alexey D. Otavin
    Fenix Secure Operating System: Principles, Models and Architecture. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:207-218 [Conf]
  22. Valeri Korjik, Kirill Morozov
    Generalized Oblivious Transfer Protocols Based on Noisy Channels. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:219-229 [Conf]
  23. Boris V. Izotov, Alexander A. Moldovyan, Nick A. Moldovyan
    Controlled Operations as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:230-241 [Conf]
  24. Viktor Yakovlev, Valery Korjik, Alexander Sinuk
    Key Distribution Protocol Based on Noisy Channel and Error Detecting Codes. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:242-250 [Conf]
  25. Ghassan Chaddoud, Isabelle Chrisment, André Schaff
    Dynamic Group Key Management Protocol. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:251-262 [Conf]
  26. Vladimir I. Gorodetski, Leonard J. Popyack, Vladimir Samoilov, Victor A. Skormin
    SVD-Based Approach to Transparent Embedding Data into Digital Images. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:263-274 [Conf]
  27. Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan
    Fast Encryption Algorithm Spectr-H64. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:275-286 [Conf]
  28. Antonio Durante, Riccardo Focardi, Roberto Gorrieri
    CVS at Work: A Report on New Failures upon Some Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:287-299 [Conf]
  29. Selçuk Kavut, Melek D. Yücel
    On Some Cryptographic Properties of Rijndael. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:300-312 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002