Mobile agents and security / / Giovanni Vigna, editor |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | New York : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (XII, 257 p. 8 illus.) |
Disciplina | 006.3 |
Collana | Lecture notes in computer science |
Soggetto topico |
Mobile agents (Computer software)
Computer security |
ISBN | 3-540-68671-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security. |
Record Nr. | UNISA-996466137503316 |
New York : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Mobile agents and security / / Giovanni Vigna, editor |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | New York : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (XII, 257 p. 8 illus.) |
Disciplina | 006.3 |
Collana | Lecture notes in computer science |
Soggetto topico |
Mobile agents (Computer software)
Computer security |
ISBN | 3-540-68671-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security. |
Record Nr. | UNINA-9910143631603321 |
New York : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 242 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computer communication systems Operating systems (Computers) Computers and civilization Management of Computing and Information Systems Cryptology Computer Communication Networks Computer Science, general Operating Systems Computers and Society |
ISBN | 3-540-45248-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. |
Record Nr. | UNISA-996466061303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 242 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computer networks Operating systems (Computers) Computers and civilization Management of Computing and Information Systems Cryptology Computer Communication Networks Computer Science, general Operating Systems Computers and Society |
ISBN | 3-540-45248-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. |
Record Nr. | UNINA-9910144048203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recent Advances in Intrusion Detection [[electronic resource] ] : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (X, 327 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
System safety
Computer science Computer communication systems Operating systems (Computers) Data encryption (Computer science) Computers and civilization Security Science and Technology Computer Science, general Computer Communication Networks Operating Systems Cryptology Computers and Society |
ISBN | 3-540-36084-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. |
Record Nr. | UNISA-996465560003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (X, 327 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
System safety
Computer science Computer networks Operating systems (Computers) Data encryption (Computer science) Computers and civilization Security Science and Technology Computer Science, general Computer Communication Networks Operating Systems Cryptology Computers and Society |
ISBN | 3-540-36084-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. |
Record Nr. | UNINA-9910143895503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|