SAM'11
The 2011 International Conference on Security and Management
SAM'11 Vol I - ISBN #: 1-60132-196-1 SAM'11 Vol II - ISBN #: 1-60132-197-X SAM'11 - Set - ISBN #: 1-60132-198-8 EDITORS: Hamid R. Arabnia, Michael R. Grimaila, George Markowsky, Selim Aissi ASSOCIATE EDITORS: Leonidas Deligiannidis, Ashu M. G. Solo, Kevin Daimi, Victor A. Clincy
SESSION: SECURITY AND ALLIED TECHNOLOGIES
A Survey of Security Services and Techniques in Distributed Storage Systems
Zhiqian Xu, Keith Martin, Clifford Kotnik
HyunChul Joh, Yashwant Malaiya
Study of Information Security Pre-Diagnosis Model for New IT Services
Wan s. Yi, Kwangwoo Lee, Dongho Won
Common Network Security Threats and Counter Measures
Mahmoud Haidar, Nizar Al-Holou
Formal Verification of the Security of a Free-Space Quantum Key Distribution System
Veronica Fernandez, Maria-Jose García-Martínez, Luis Hernandez-Encinas, Agustin Martin
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, Dong-Young Lee
Kazi Zunnurhain, Susan Vrbsky
Security-Oriented Formal Techniques
Fausto Marcantoni, Federico Paoloni, Alberto Polzonetti
Internal Vs. External Penetrations: A Computer Security Dilemma
Pedro Diaz-Gomez, Gilberto ValleCarcamo, Douglas Jones
Practical Network Security Teaching in an Online Virtual Laboratory
Christian Willems, Christoph Meinel
Design and Implementation of a Critical Infrastructure Security and Assessment Laboratory
Guillermo Francia III, Noureddine Bekhouche, Terry Marbut
Data Center Physical Security Ontology for Automated Evaluation
Nanta Janpitak, Chanboon Sathitwiriyawong
A Strategy for Information Security: TOGAF
Levent Ertaul, Ahmad Movasseghi, Sunny Kumar
Enterprise Security Planning with TOGAF-9
Levent Ertaul, Ahmad Movasseghi, Sunny Kumar
Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)
Levent Ertaul, Jinwei Hao
Enterprise Security Planning Using the Zachman Framework - Builder's Perspective
Levent Ertaul, Subburathinam Vandana, Kamini Gulati, Gokay Saldamli
Enterprise Security Planning using Zachman Framework: Designer's Perspective
Levent Ertaul, Archana Pasham, Hardik Patel
Access Control Model and Algebra of Firewall Rules
Vladimir Zaborovsky, Vladimir Mulukha, Alexander Silinenko
Information Security Risk Assessment Analysis
Ahmad Ghafarian, Travis Smith
SAT-based Verification of Data-Independent Access Control Security Systems
Yean-Ru Chen, Jui-Lung Yao, Chih-Sheng Lin, Shang-Wei Lin, Chun-Hsian Huang, Ya-Ping Hu, Pao-Ann Hsiung, Sao-Jie Chen, I-Hsin Chou
Security of the Social Network Site User
Amina Kinane Daouadji, Sadika Selka
Source ID Based Security (SIBS) Algorithm for Wireless Sensor Networks
Fahad T. Bin Muhaya, Adeel Akhtar, Fazle Hadi
SESSION: AUTHENTICATION + BIOMETRICS
Easing Text-based Mobile Device User Authentication Mechanisms
Dugald Hutchings
A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret Sharing
Jyh-haw Yeh
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Luis Rosales-Roldan, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Hector Perez-Meana
Kerberos, Cryptography and Biometric based Remote Authentication Protocol
Karan Desai, Ruchir Patwa
SESSION: POLICIES AND RELATED ISSUES + INTRUSION DETECTION
Michael Workman
A Robust Trust Model for Named-Data Networks
Vahab Pournaghshband, Karthikeyan Natarajan
Practical IDS Alert Correlation in the Face of Dynamic Threats
Sathya Chandran Sundaramurthy, Loai Zomlot, Xinming Ou
Twitter on Drugs: Pharmaceutical Spam in Tweets
Chandra Shekar, Kathy Liszka, Chien-Chung Chan
Designing Information Security Policy for Establishing Trust Within Health Care Environments
Sarah M. North, Max M. North
Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing
Nishant Doshi, Devesh Jinwala
A Trust Model for Routing in MANETs : A Cognitive Agents based Approach
Babu B Sathish, Venkataram Pallapa
An Approach for Automatic Selection of Relevance Features in Intrusion Detection Systems
Shan Suthaharan, Karthik Vinnakota
Performance Evaluation of Machine Learning Methods for Intrusion Detection
Yasir Javed, Shafique Ahmad Chaudhry, Mohammed Habeeb Vulla
SESSION: PRIVACY AND RELATED ISSUES
Anonymous Secure Routing Protocol for Wireless Metropolitan Networks
Ren-Junn Hwang, Yu-Kai Hsiao
A First Step Towards Privacy Leakage Diagnosis and Protection
Shinsaku Kiyomoto, Toshiaki Tanaka
Chad Cook, Lei Chen
Private Information Retrieval in an Anonymous Peer-to-Peer Environment
Michael Miceli, John Sample, Elias Ioup, Mahdi Abdelguerfi
On Querying Encrypted Databases
Moheeb Alwarsh, Ray Kresman
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms
S. A. M. Rizvi, Syed Zeeshan Hussain, Neeta Wadhwa
SESSION: SECRECY METHODS AND RELATED ISSUES + CRYPTOGRAPHY +
CRYPTOSYSTEMS + WATERMARKING
Cryptanalysis on the RFID ACTION Protocol
Hung-Min Sun, Shuai-Min Chen, King-Hang Wang
Reversible Data Hiding Scheme Using Improved Hiding Tree
Jang Hee Choi, Kee-Young Yoo
A Reversible Image Hiding Scheme using Novel Linear Prediction Coding and Histogram Shifting
Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo
Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual
Antonio Cedillo-Hernandez, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Mireya
Garcia-Vazquez
Log File Modification Detection and Location Using Fragile Watermark
Liang Xu, Huiping Guo
On Energy Efficiency of Elliptic Curve Cryptography for Wireless Sensor Networks
Tinara Hendrix, Michael Bimberg, Dulal Kar
Symmetric Key Cryptography Using Modified DJSSA Symmetric Key Algorithm
Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath
An Efficient Data Hiding Method Using Encrypted Secret Message Obtained by MSA Algorithm
Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh, Asoke Nath
SESSION: MALICIOUS CODE + ATTACKS DETECTION
Feasibility of Attacks: What is Possible in the Real World - A Framework for Threat Modeling
Ameya M Sanzgiri, Shambhu J Upadhyaya
Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows
S. Farzaneh Tabatabaei, Mazleena Salleh, MohammadReza Abbasy, MohammadReza NajafTorkaman
A Witness Based Approach to Combat Malicious Packets in Wireless Sensor Network
Usman Tariq, Yasir Malik, ManPyo Hong, Bessam Abdulrazak
Detecting Undetectable Metamorphic Viruses
Sujandharan Venkatachalam, Mark Stamp
A Methodology to Identify Complex Network Attacks
Lisa Frye, Liang Cheng, Randy Kaplan
Database Security Architecture for Detection of Malicious Transactions in Database
Udai Rao, Dhiren Patel
Defence Against DOS Attacks Using a Partitioned Overlay Network
Muhammad Usman Saeed
SESSION: ALGORITHMS AND APPLICATIONS + MANAGEMENT INFRASTRUCTURES
Application Resilience with Process Failures
Kathleen McGill, Stephen Taylor
Tamper-resistant Monitoring for Securing Multi-core Environments
Ruchika Mehresh, Jairaj Rao, Shambhu J Upadhyaya, Sulaksh Natarajan, Kevin Kwiat
Observation from Microsoft Zero-Day Vulnerability Examples
Xiaohong Yuan, Nathaniel Evans
Smart Grid Insecurity - A New Generation of Threats
Summer Olmstead, Ambareen Siraj
New Detection Technique Using Correlation Of Network Flows for NIDS
Payam Vahdani Amoli, Alireza Ghobadi, Ghazaleh Taherzadeh, Roozbeh Karimi, Sanam Maham
A Generic Attribute-Improved RBAC Model by Using Context-aware Reasoning
Chen-Chieh Feng, Liang Yu
A Fuzzy Clustering Algorithm for Fingerprint Enhancement
Charlie Obimbo, Wei Wang
Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer
Yerzhan Seitkulov
Implementation and Applications of a Fingerprint Encoding System
I-Fu Lin, Tzong-An Su
Automatic Mission-Critical Data Discovery Based On Content: Experimental Results
Jonathan White, Brajendra Panda
Analysis of Current Snapshot Options
SrinivasaRao Seelam, Chengcheng Li
System-Manipulation using Windows-Messaging-Hooks
Peter Schartner, Martin Foisner
Following the Trail of Image Spam
Shruti Wakade, Robert Bruen, Kathy Liszka, Chien-Chung Chan
Architecting for Disaster Recovery - A Practitioner View
Octavian Paul Rotaru
Optimized Edge Detection Alogorithm for Face Recognition
Madabusi Sudarshan, P. Ganga Mohan, Suryakanth V. Gangashetty
Risk Management in Healthcare Services
Montri Wiboonrat
SESSION: PERFORMANCE ANALYSIS AND EVALUATION
Analysis of a Man-in-the-Middle Experiment with Wireshark
Ming-Hsing Chiu, Kuo-Pao Yang, Randall Meyer, Tristan Kidder
Evaluation of Network Port Scanning Tools
Nazar Elnazeer, Kevin Daimi
Engineering Aspects of Hash Functions
Saif Al-Kuwari
Modern Hash Function Construction
Benjamin Denton, Reza Adhami
SESSION: CYBERSECURITY EDUCATION
DefEX: Hands-On Cyber Defense Exercises for Undergraduate Students
Sonja Glumich, Brian Kropa
A Plan for Training Global Leaders in Cybersecurity
Anna Bobkowska, Ludwik Kuzniarz, George Markowsky, Andrzej Rucinski, Bogdan Wiszniewski
Goals, Models, and Progress towards Establishing a Virtual Information Security Laboratory in Maine
Cory Cavanagh, Raymond Albert
RTFn - Enabling Cybersecurity Education through a Mobile Capture the Flag Client
Nicholas Capalbo, Theodore Reed, Michael Arpaia
Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity Education
George Markowsky, Linda Markowsky
Jeffrey Scaparra, Jeffrey Bullock
Blending Bloom's Taxonomy with Serious Game Design
Laurin Buchanan, Frances Wolanczyk, Frank Zinghini
Challenge Based Learning in Cybersecurity Education
Ronald Cheung, Joseph Cohen, Henry Lo, Fabio Elia
The Assembly and Provisioning of a Red Team
Daryl Johnson
Dynamic Threat-resistant Node Identification in Sensor Networks
David Pearson, Sumita Mishra, Yin Pan
SESSION: MISSION ASSURANCE AND CRITICAL INFRASTRUCTURE PROTECTION, STMACIP'11
Availability Based Risk Analysis for SCADA Embedded Computer Systems
Stephen Papa, William Casper, Suku Nair
Krishna Surajbally, Peter Feng, William Sitzabee, Patrick Suermann
Towards a Low-Cost SCADA Test Bed: An Open-Source Platform for Hardware-in-the-Loop Simulation
Nicholas Wertzberger, Casey Glatter, William Mahoney, Robin Gandhi, Kenneth Dick
An Empirical Study of a Vulnerability Metric Aggregation Method
Su Zhang, Xinming Ou, Anoop Singhal, John Homer
Vinod Naga, John Colombi, Michael Grimaila, Kenneth Hopkinson
Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process
Christy Peterson, Michael Grimaila, Robert Mills, Michael Haas, Gina Thomas, Doug Kelly
A Spatial Risk Analysis of Oil Refineries Within the United States
Zachary Schiff, William Sitzabee
Holistic Network Defense: Fusing Host and Network Features for Attack Classification
Jenny Ji, Gilbert Peterson, Michael Grimaila, Robert Mills
SESSION: NOVEL APPLICATIONS AND ALGORITHMS + METHODS RELATED TO: CYBER SECURITY, SECURITY POLICY, ATTACK DETECTION, RISK MANAGEMENT, AUTHENTICATION, AND ENCRYPTION
Eugene H. Spafford
Sunsern Limwiriyakul, Craig Valli
Kathleen Jungck, Syed Rahman
PPSAM: Proactive PowerShell Anti-Malware
Alejandro Villegas, Lei Chen
Modeling Learningless Vulnerability Discovery using a Folded Distribution
Awad Younis, HyunChul Joh, Yashwant Malaiya
Rule-Based Phishing Attack Detection
Ram Basnet, Andrew Sung, Quingzhong Liu
Technology Risk Management Plan for an Online University
Frizella Donegan, Syed Rahman
Towards Self-Protecting Security for e-Health CDA Documents
George Hsieh
Analysis of Security Requirements in Telemedicine Networks
Edward Guillen, Paola Estupiñan, Camilo Lemus, Leonardo Ramirez
The Knowledge Based Authentication Attacks
Farnaz Towhidi, Azizah Abdul Manaf, Salwani Mohd Daud, Arash Habibi Lashkari
User Authentication Platform Using Provisioning in Cloud Computing Environment
Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi
Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing Systems
Boleslaw Fabisiak
Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware Attacks
Mark Wilson, Lei Chen
Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security
Lei Zhang
Chaos-Based Symmetric Key Cryptosystems
Christopher Wood
Secure Processing and Delivery of Medical Images for Patient Information Protection
Ming Yang, Lei Chen, Shengli Yuan, Wen-Chen Hu
A Secure Permutation Routing Protocol in Multi-hop Wireless Sensor Networks
Hicham Lakhlef, Jean Frederic Myoupo
Software Security Engineering Monitoring and Control
Esmiralda Moradian, Anne Håkansson
A Novel Approach as Multi-place Watermarking for Security in Database
Brijesh Mehta, Udai Rao
Quantifying the Role of Access Control in End-to-End Network Security
Usama Ahmed, Ammar Masood, Liaquat Ali Khan
A Framework for Online Document Attestation Using Encryption and Digital Watermarking
Mohammed El-Affendi, Muhammed Khan
Two-Argument Operations for Cryptographic Purposes
Krzysztof Bucholc
Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman
Majid Joudaki, Mehdi Imani, Maryam Esmaeili, Mahtab Mahmoodi, Niloofar Mazhari
An Automated Signature Generation Approach for Polymorphic Worms Using Factor Analysis
Mohssen Mohammed, Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin
A Key Agreement Protocol Based on Identity-Based Proxy Re-encryption
Adrian Atanasiu, Adela Mihaita
Double Bit Sterilization of Stego Images
Imon Mukherjee, Goutam Paul
Smart Phones Security - Touch Screen Smudge Attack
Khalid Al-Rowaily, Majed Al-Rubaian, Abdulrahman Mirza
A Novel Approach for Light Weight User Authentication Scheme in Wireless Sensor Network
Vivek Patel, Sankita Patel, Devesh Jinwala
Security of Handheld Devices; Short Overview
Suhair Amer