SAM'11

The 2011 International Conference on Security and Management


SAM'11 Vol I -  ISBN #:  1-60132-196-1
SAM'11 Vol II - ISBN #:  1-60132-197-X
SAM'11 - Set -  ISBN #:  1-60132-198-8

EDITORS: Hamid R. Arabnia, Michael R. Grimaila, George Markowsky, Selim Aissi

ASSOCIATE EDITORS: Leonidas Deligiannidis, Ashu M. G. Solo, 
Kevin Daimi, Victor A. Clincy

Foreword

SESSION: SECURITY AND ALLIED TECHNOLOGIES

A Survey of Security Services and Techniques in Distributed Storage Systems

Zhiqian Xu, Keith Martin, Clifford Kotnik

Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics

HyunChul Joh, Yashwant Malaiya

Study of Information Security Pre-Diagnosis Model for New IT Services

Wan s. Yi, Kwangwoo Lee, Dongho Won

Common Network Security Threats and Counter Measures

Mahmoud Haidar, Nizar Al-Holou

Formal Verification of the Security of a Free-Space Quantum Key Distribution System

Veronica Fernandez, Maria-Jose García-Martínez, Luis Hernandez-Encinas, Agustin Martin

Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants

Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, Dong-Young Lee

Security in Cloud Computing

Kazi Zunnurhain, Susan Vrbsky

Security-Oriented Formal Techniques

Fausto Marcantoni, Federico Paoloni, Alberto Polzonetti

Internal Vs. External Penetrations: A Computer Security Dilemma

Pedro Diaz-Gomez, Gilberto ValleCarcamo, Douglas Jones

Practical Network Security Teaching in an Online Virtual Laboratory

Christian Willems, Christoph Meinel

Design and Implementation of a Critical Infrastructure Security and Assessment Laboratory

Guillermo Francia III, Noureddine Bekhouche, Terry Marbut

Data Center Physical Security Ontology for Automated Evaluation

Nanta Janpitak, Chanboon Sathitwiriyawong

A Strategy for Information Security: TOGAF

Levent Ertaul, Ahmad Movasseghi, Sunny Kumar

Enterprise Security Planning with TOGAF-9

Levent Ertaul, Ahmad Movasseghi, Sunny Kumar

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)

Levent Ertaul, Jinwei Hao

Enterprise Security Planning Using the Zachman Framework - Builder's Perspective

Levent Ertaul, Subburathinam Vandana, Kamini Gulati, Gokay Saldamli

Enterprise Security Planning using Zachman Framework: Designer's Perspective

Levent Ertaul, Archana Pasham, Hardik Patel

Access Control Model and Algebra of Firewall Rules

Vladimir Zaborovsky, Vladimir Mulukha, Alexander Silinenko

Information Security Risk Assessment Analysis

Ahmad Ghafarian, Travis Smith

SAT-based Verification of Data-Independent Access Control Security Systems

Yean-Ru Chen, Jui-Lung Yao, Chih-Sheng Lin, Shang-Wei Lin, Chun-Hsian Huang, Ya-Ping Hu, Pao-Ann Hsiung, Sao-Jie Chen, I-Hsin Chou

Security of the Social Network Site User

Amina Kinane Daouadji, Sadika Selka

Source ID Based Security (SIBS) Algorithm for Wireless Sensor Networks

Fahad T. Bin Muhaya, Adeel Akhtar, Fazle Hadi

SESSION: AUTHENTICATION + BIOMETRICS

Easing Text-based Mobile Device User Authentication Mechanisms

Dugald Hutchings

A PASS Scheme in Cloud Computing - Protecting Data Privacy by Authentication and Secret Sharing

Jyh-haw Yeh

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Luis Rosales-Roldan, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Hector Perez-Meana

Kerberos, Cryptography and Biometric based Remote Authentication Protocol

Karan Desai, Ruchir Patwa

SESSION: POLICIES AND RELATED ISSUES + INTRUSION DETECTION

Descriptive Analyses of Trusted Security Kernels and Autonomous Systems: Evolution of Security Approaches

Michael Workman

A Robust Trust Model for Named-Data Networks

Vahab Pournaghshband, Karthikeyan Natarajan

Practical IDS Alert Correlation in the Face of Dynamic Threats

Sathya Chandran Sundaramurthy, Loai Zomlot, Xinming Ou

Twitter on Drugs: Pharmaceutical Spam in Tweets

Chandra Shekar, Kathy Liszka, Chien-Chung Chan

Designing Information Security Policy for Establishing Trust Within Health Care Environments

Sarah M. North, Max M. North

Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing

Nishant Doshi, Devesh Jinwala

A Trust Model for Routing in MANETs : A Cognitive Agents based Approach

Babu B Sathish, Venkataram Pallapa

An Approach for Automatic Selection of Relevance Features in Intrusion Detection Systems

Shan Suthaharan, Karthik Vinnakota

Performance Evaluation of Machine Learning Methods for Intrusion Detection

Yasir Javed, Shafique Ahmad Chaudhry, Mohammed Habeeb Vulla

SESSION: PRIVACY AND RELATED ISSUES

Anonymous Secure Routing Protocol for Wireless Metropolitan Networks

Ren-Junn Hwang, Yu-Kai Hsiao

A First Step Towards Privacy Leakage Diagnosis and Protection

Shinsaku Kiyomoto, Toshiaki Tanaka

Secure Common Web Server Session: Sharing Object Data Across Deployed Java Web Applications on the Same Web Server

Chad Cook, Lei Chen

Private Information Retrieval in an Anonymous Peer-to-Peer Environment

Michael Miceli, John Sample, Elias Ioup, Mahdi Abdelguerfi

On Querying Encrypted Databases

Moheeb Alwarsh, Ray Kresman

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms

S. A. M. Rizvi, Syed Zeeshan Hussain, Neeta Wadhwa

SESSION: SECRECY METHODS AND RELATED ISSUES + CRYPTOGRAPHY +

CRYPTOSYSTEMS + WATERMARKING

Cryptanalysis on the RFID ACTION Protocol

Hung-Min Sun, Shuai-Min Chen, King-Hang Wang

Reversible Data Hiding Scheme Using Improved Hiding Tree

Jang Hee Choi, Kee-Young Yoo

A Reversible Image Hiding Scheme using Novel Linear Prediction Coding and Histogram Shifting

Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo

Robust Video Watermarking Using Image Normalization, Motion Vector and Perceptual

Information

Antonio Cedillo-Hernandez, Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, Mireya

Garcia-Vazquez

Log File Modification Detection and Location Using Fragile Watermark

Liang Xu, Huiping Guo

On Energy Efficiency of Elliptic Curve Cryptography for Wireless Sensor Networks

Tinara Hendrix, Michael Bimberg, Dulal Kar

Symmetric Key Cryptography Using Modified DJSSA Symmetric Key Algorithm

Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath

An Efficient Data Hiding Method Using Encrypted Secret Message Obtained by MSA Algorithm

Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh, Asoke Nath

SESSION: MALICIOUS CODE + ATTACKS DETECTION

Feasibility of Attacks: What is Possible in the Real World - A Framework for Threat Modeling

Ameya M Sanzgiri, Shambhu J Upadhyaya

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows

S. Farzaneh Tabatabaei, Mazleena Salleh, MohammadReza Abbasy, MohammadReza NajafTorkaman

A Witness Based Approach to Combat Malicious Packets in Wireless Sensor Network

Usman Tariq, Yasir Malik, ManPyo Hong, Bessam Abdulrazak

Detecting Undetectable Metamorphic Viruses

Sujandharan Venkatachalam, Mark Stamp

A Methodology to Identify Complex Network Attacks

Lisa Frye, Liang Cheng, Randy Kaplan

Database Security Architecture for Detection of Malicious Transactions in Database

Udai Rao, Dhiren Patel

Defence Against DOS Attacks Using a Partitioned Overlay Network

Muhammad Usman Saeed

SESSION: ALGORITHMS AND APPLICATIONS + MANAGEMENT INFRASTRUCTURES

Application Resilience with Process Failures

Kathleen McGill, Stephen Taylor

Tamper-resistant Monitoring for Securing Multi-core Environments

Ruchika Mehresh, Jairaj Rao, Shambhu J Upadhyaya, Sulaksh Natarajan, Kevin Kwiat

Observation from Microsoft Zero-Day Vulnerability Examples

Xiaohong Yuan, Nathaniel Evans

Smart Grid Insecurity - A New Generation of Threats

Summer Olmstead, Ambareen Siraj

New Detection Technique Using Correlation Of Network Flows for NIDS

Payam Vahdani Amoli, Alireza Ghobadi, Ghazaleh Taherzadeh, Roozbeh Karimi, Sanam Maham

A Generic Attribute-Improved RBAC Model by Using Context-aware Reasoning

Chen-Chieh Feng, Liang Yu

A Fuzzy Clustering Algorithm for Fingerprint Enhancement

Charlie Obimbo, Wei Wang

Methods of Speeding Up Secret Computations With Insecure Auxiliary Computer

Yerzhan Seitkulov

Implementation and Applications of a Fingerprint Encoding System

I-Fu Lin, Tzong-An Su

Automatic Mission-Critical Data Discovery Based On Content: Experimental Results

Jonathan White, Brajendra Panda

Analysis of Current Snapshot Options

SrinivasaRao Seelam, Chengcheng Li

System-Manipulation using Windows-Messaging-Hooks

Peter Schartner, Martin Foisner

Following the Trail of Image Spam

Shruti Wakade, Robert Bruen, Kathy Liszka, Chien-Chung Chan

Architecting for Disaster Recovery - A Practitioner View

Octavian Paul Rotaru

Optimized Edge Detection Alogorithm for Face Recognition

Madabusi Sudarshan, P. Ganga Mohan, Suryakanth V. Gangashetty

Risk Management in Healthcare Services

Montri Wiboonrat

SESSION: PERFORMANCE ANALYSIS AND EVALUATION

Analysis of a Man-in-the-Middle Experiment with Wireshark

Ming-Hsing Chiu, Kuo-Pao Yang, Randall Meyer, Tristan Kidder

Evaluation of Network Port Scanning Tools

Nazar Elnazeer, Kevin Daimi

Engineering Aspects of Hash Functions

Saif Al-Kuwari

Modern Hash Function Construction

Benjamin Denton, Reza Adhami

SESSION: CYBERSECURITY EDUCATION

DefEX: Hands-On Cyber Defense Exercises for Undergraduate Students

Sonja Glumich, Brian Kropa

A Plan for Training Global Leaders in Cybersecurity

Anna Bobkowska, Ludwik Kuzniarz, George Markowsky, Andrzej Rucinski, Bogdan Wiszniewski

Goals, Models, and Progress towards Establishing a Virtual Information Security Laboratory in Maine

Cory Cavanagh, Raymond Albert

RTFn - Enabling Cybersecurity Education through a Mobile Capture the Flag Client

Nicholas Capalbo, Theodore Reed, Michael Arpaia

Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity Education

George Markowsky, Linda Markowsky

Red Teaming for Education

Jeffrey Scaparra, Jeffrey Bullock

Blending Bloom's Taxonomy with Serious Game Design

Laurin Buchanan, Frances Wolanczyk, Frank Zinghini

Challenge Based Learning in Cybersecurity Education

Ronald Cheung, Joseph Cohen, Henry Lo, Fabio Elia

The Assembly and Provisioning of a Red Team

Daryl Johnson

Dynamic Threat-resistant Node Identification in Sensor Networks

David Pearson, Sumita Mishra, Yin Pan

SESSION: MISSION ASSURANCE AND CRITICAL INFRASTRUCTURE PROTECTION, STMACIP'11

Availability Based Risk Analysis for SCADA Embedded Computer Systems

Stephen Papa, William Casper, Suku Nair

Mission Assurance Implications for Federal Construction by Building Information Modeling Implementation

Krishna Surajbally, Peter Feng, William Sitzabee, Patrick Suermann

Towards a Low-Cost SCADA Test Bed: An Open-Source Platform for Hardware-in-the-Loop Simulation

Nicholas Wertzberger, Casey Glatter, William Mahoney, Robin Gandhi, Kenneth Dick

An Empirical Study of a Vulnerability Metric Aggregation Method

Su Zhang, Xinming Ou, Anoop Singhal, John Homer

A Method to Determine Superior QoS Configurations for Mission Objectives: Aligning the Network with the Mission

Vinod Naga, John Colombi, Michael Grimaila, Kenneth Hopkinson

Measuring the Utility of a Cyber Incident Mission Impact Assessment (CIMIA) Notification Process

Christy Peterson, Michael Grimaila, Robert Mills, Michael Haas, Gina Thomas, Doug Kelly

A Spatial Risk Analysis of Oil Refineries Within the United States

Zachary Schiff, William Sitzabee

Holistic Network Defense: Fusing Host and Network Features for Attack Classification

Jenny Ji, Gilbert Peterson, Michael Grimaila, Robert Mills

SESSION: NOVEL APPLICATIONS AND ALGORITHMS + METHODS RELATED TO: CYBER SECURITY, SECURITY POLICY, ATTACK DETECTION, RISK MANAGEMENT, AUTHENTICATION, AND ENCRYPTION

The Nature of Cyber Security

Eugene H. Spafford

An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA

Sunsern Limwiriyakul, Craig Valli

Information Security Policy Concerns as Case Law Shifts toward Balance between Employer Security and Employee Privacy

Kathleen Jungck, Syed Rahman

PPSAM: Proactive PowerShell Anti-Malware

Alejandro Villegas, Lei Chen

Modeling Learningless Vulnerability Discovery using a Folded Distribution

Awad Younis, HyunChul Joh, Yashwant Malaiya

Rule-Based Phishing Attack Detection

Ram Basnet, Andrew Sung, Quingzhong Liu

Technology Risk Management Plan for an Online University

Frizella Donegan, Syed Rahman

Towards Self-Protecting Security for e-Health CDA Documents

George Hsieh

Analysis of Security Requirements in Telemedicine Networks

Edward Guillen, Paola Estupiñan, Camilo Lemus, Leonardo Ramirez

The Knowledge Based Authentication Attacks

Farnaz Towhidi, Azizah Abdul Manaf, Salwani Mohd Daud, Arash Habibi Lashkari

User Authentication Platform Using Provisioning in Cloud Computing Environment

Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi

Use of 2D Codes and Mobile Technology for Monitoring of Machines in Manufacturing Systems

Boleslaw Fabisiak

Hashing Smartphone Serial Numbers: An ASLR Approach to Preventing Malware Attacks

Mark Wilson, Lei Chen

Mobile Security Threats and Issues -- A Broad Overview of Mobile Device Security

Lei Zhang

Chaos-Based Symmetric Key Cryptosystems

Christopher Wood

Secure Processing and Delivery of Medical Images for Patient Information Protection

Ming Yang, Lei Chen, Shengli Yuan, Wen-Chen Hu

A Secure Permutation Routing Protocol in Multi-hop Wireless Sensor Networks

Hicham Lakhlef, Jean Frederic Myoupo

Software Security Engineering Monitoring and Control

Esmiralda Moradian, Anne Håkansson

A Novel Approach as Multi-place Watermarking for Security in Database

Brijesh Mehta, Udai Rao

Quantifying the Role of Access Control in End-to-End Network Security

Usama Ahmed, Ammar Masood, Liaquat Ali Khan

A Framework for Online Document Attestation Using Encryption and Digital Watermarking

Mohammed El-Affendi, Muhammed Khan

Two-Argument Operations for Cryptographic Purposes

Krzysztof Bucholc

Proof of Concept Implementation of Trustworthy Mutual Attestation Architecture for True Single Sign-on

Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman

Presenting a New Approach for Predicting and Preventing Active/Deliberate Customer Churn in Telecommunication Industry

Majid Joudaki, Mehdi Imani, Maryam Esmaeili, Mahtab Mahmoodi, Niloofar Mazhari

An Automated Signature Generation Approach for Polymorphic Worms Using Factor Analysis

Mohssen Mohammed, Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin

A Key Agreement Protocol Based on Identity-Based Proxy Re-encryption

Adrian Atanasiu, Adela Mihaita

Double Bit Sterilization of Stego Images

Imon Mukherjee, Goutam Paul

Smart Phones Security - Touch Screen Smudge Attack

Khalid Al-Rowaily, Majed Al-Rubaian, Abdulrahman Mirza

A Novel Approach for Light Weight User Authentication Scheme in Wireless Sensor Network

Vivek Patel, Sankita Patel, Devesh Jinwala

Security of Handheld Devices; Short Overview

Suhair Amer