Elctronic Identitry Management Infrastructure for Trustworthy Services in e-Government
and e-Commerce
Alberto Polzonetti, Damiano Falcioni, Fausto Marcantoni
An Overview of Laws and Standards for Health Information Security and Privacy
Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang
Cyber Semantic Account Management - User Behavior Modeling, Visualization and
Monitoring
Keith Shapiro, Tony Stirtzinger
SESSION: SECURITY APPLICATIONS II + ABUSE PREVENTION METHODS + SOFTWARE
AND TOOLS
Towards Security Policy and Architecture for Managing Implantable Medical Devices
Ram Krishnan, Eugene John, Manoj Panday
A Secure Communication System Based on Self-Organizing Patterns
Paulius Palevicius, Loreta Saunoriene, Minvydas Ragulskis
Software Similarity and Metamorphic Detection
Mausami Mungale, Mark Stamp
Designing and Deploying a Secured VO for a Wine Geotraceability Application
Francois Barrere, Romain Laborde, Abdelmalek Benzekri
A Conceptual Framework for Securing Digital I&C Systems in Nuclear Power Plants
Jung-Woon Lee, Jae-Gu Song, Cheol-Kwon Lee, Dong-Young Lee
Sterilization of Stego-images Through Histogram Normalization
Goutam Paul, Imon Mukherjee
Infrared Technology Pinpoints Energy Loss in Buildings
Timmy Nguyen, Leonidas Deligiannidis
Methods for Security Access a Web Application
Nader Nassar, Grant Miller
A Bayesian Network Analysis of System Failure in the Presence of Low-Probability External
Correlating Events
Jack Horner
Tackling Internet abuse in Great Britain: Towards a Framework for Classifying Severities of
'flame trolling'
Jonathan Bishop
SESSION: COMPUTER AND INFORMATION SECURITY
A Theoretical Model for Probabilistically Based Detection and Mitigation of Malware Using
Self Organizing Taxonomies
Greg Vert, Anitha Chennamaneni, S.S. Iyengar
Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit
Woei-Jiunn Tsaur, Lo-Yao Yeh
BLAST Your Way Through Malware: Malware Analysis Assisted by Bioinformatics Tools