Coverart for item
The Resource Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, edited by Iliano Cervesato, (electronic resource)

Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, edited by Iliano Cervesato, (electronic resource)

Label
Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings
Title
Advances in Computer Science - ASIAN 2007. Computer and Network Security
Title remainder
12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings
Statement of responsibility
edited by Iliano Cervesato
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Member of
Is Subseries of
Dewey number
004.0151
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
KdkZvxHMglQ
Image bit depth
0
Language note
English
LC call number
QA75.5-76.95
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
Cervesato, Iliano.
Series statement
Theoretical Computer Science and General Issues
Series volume
4846
http://library.link/vocab/subjectName
  • Information theory
  • Logic design
  • Data structures (Computer scienc
  • Computer security
  • Computer software
  • Computer Communication Networks
  • Theory of Computation
  • Logics and Meanings of Programs
  • Data Structures and Information Theory
  • Systems and Data Security
  • Algorithm Analysis and Problem Complexity
  • Computer Communication Networks
Label
Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, edited by Iliano Cervesato, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Invited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typing for Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (XI, 316 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540769293
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/978-3-540-76929-3
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000490230
  • (SSID)ssj0000315792
  • (PQKBManifestationID)11230077
  • (PQKBTitleCode)TC0000315792
  • (PQKBWorkID)10255558
  • (PQKB)11334145
  • (DE-He213)978-3-540-76929-3
  • (EXLCZ)991000000000490230
Label
Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, edited by Iliano Cervesato, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Invited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typing for Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications
Dimensions
unknown
Edition
1st ed. 2007.
Extent
1 online resource (XI, 316 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540769293
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/978-3-540-76929-3
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000490230
  • (SSID)ssj0000315792
  • (PQKBManifestationID)11230077
  • (PQKBTitleCode)TC0000315792
  • (PQKBWorkID)10255558
  • (PQKB)11334145
  • (DE-He213)978-3-540-76929-3
  • (EXLCZ)991000000000490230

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...