Hamid R. Arabnia, Selim Aissi (Eds.):
Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006.
CSREA Press 2006, ISBN 1-60132-001-9 BibTeX
Policies + Guidelines + Service Oriented Systems + Attack Detection
- Rune Gustavsson:
Ensuring Dependability in Service Oriented Computing.
3-11 BibTeX
- Kenichi Takahashi, Kouichi Sakurai:
A Framework for the User-Oriented Personal Information Protection.
12-19 BibTeX
- Andrzej Bialas:
A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling.
19-25 BibTeX
- Norbik Bashah Idris, Bharanidharan Shanmugam:
Novel Attack Detection Using Fuzzy Logic and Data Mining.
26-31 BibTeX
- Omer Mahmood:
Custom Plugin - A Solution to Phishing and Pharming Attacks.
32-37 BibTeX
- Eunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim:
The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service.
38-43 BibTeX
- Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan:
SPS-VN: Research on the Security Policy System for Virtual Network.
44-47 BibTeX
- Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il Lee:
The Information Security Guideline for SMEs in Korea.
48-56 BibTeX
Biometric Authentication + Steganographic Algorithms
Authentication Systems + Authorization Issues + Verification
- Jonathan White, Dale Thompson:
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
91-99 BibTeX
- Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni, Hisao Tokushima:
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication.
100-105 BibTeX
- Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Seog Jun:
A Study on DRM System for On/Off Line Key Authentication.
106-111 BibTeX
- Wilfrid Mirville, Jamie Kobie, Michael Nelson:
MRAS: A Multi-Layered Remote Authentication System.
112-117 BibTeX
- Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong:
A New Approach For Source Authentication Of Multicast Data.
118-121 BibTeX
- Huang-Ju Chen, Jyh-Ming Huang, Lei Wang:
Efficient and Secure Authentication Protocols for Mobile VoIP Communications.
122-128 BibTeX
- Hao Wang, Zhongfu Wu, Xin Tan:
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network.
129-133 BibTeX
- Haibo Tian, Yumin Wang:
Security Analysis of the Digital Transmission Copy Protection Specification.
134-137 BibTeX
- Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu:
An ID-based Anonymous Proxy Signature From Bilinear Pairings.
138-144 BibTeX
Encryption and Key Management
- Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:
Cryptcoding - Encryption and Error-Correction Coding in a Single Step.
145-151 BibTeX
- Levent Ertaul, Vaidehi Kedlaya:
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks.
152-158 BibTeX
- Li Lu, Lei Hu:
Pairing-Based Multi-Recipient Public Key Encryption.
159-165 BibTeX
- Sunghyuck Hong, Noé Lopez-Benitez:
Enhanced Group Key Generation Protocol.
166-171 BibTeX
- Levent Ertaul, Jayalalitha Panda:
Mobile Agent Security.
172-178 BibTeX
- Mykola Karpinskyy, Lesya Vasylkiv, Marcin Gizycki:
Secret Key Leakage Caused by Hamming-weight Timing Analysis on Modular Exponentiation.
179-185 BibTeX
- Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo Hong:
Flexible Cryptographic Component Design for Secure Web Applications.
186-192 BibTeX
Network Security + Intrusion Detection + Related Issues
- Norbert Lehmann, Reinhard Schwarz, Jörg Keller:
FireCrocodile: A Checker for Static Firewall Configurations.
193-199 BibTeX
- Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, Leonard Haynes:
Agent-based Distributed Intrusion Detection Methodology for MANETs.
200-206 BibTeX
- Grant A. Jacoby, Thadeus Hickman, Stuart Warders, Barak Griffin, Aaron Darensburg, Daniel Castle:
Gibraltar: A Mobile Host-Based Intrusion Protection System.
207-212 BibTeX
- Thawatchai Chomsiri, Chotipat Pornavalai:
Firewall Rules Analysis.
213-219 BibTeX
- Shuangbao Wang, Fengjing Shao, Robert S. Ledley:
Connputer - A Framework of Intrusion-Free Secure Computer Architecture.
220-225 BibTeX
- Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee:
Design and Implementation of a High-Performance Active Network Security System.
226-232 BibTeX
- Omer Demir, Ping Ji, Jinwoo Kim:
Session Based Logging (SBL) for IP-Traceback on Network Forensics.
233-239 BibTeX
- Richard Wasniowski:
Network Intrusion Detection System with Data Mart.
240-244 BibTeX
- Jun Qian, Chao Xu, Meilin Shi:
Remodeling and Simulation of Intrusion Detection Evaluation Dataset.
245-251 BibTeX
- Johnnes Arreymbi:
Modelling to Enhance GSM Network Security.
252-260 BibTeX
- Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang:
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System.
261-265 BibTeX
- Hsun-Jung Cho, Li-Yen Hsu:
Integrating the Generalized-Honeycomb-Torus for Sustainable Parking Structures in the Globalizing Age.
266-271 BibTeX
- Yan-ning Huang, Yong Jiang:
Firewall Design: Understandable, Designable and Testable.
272-278 BibTeX
Applications + Algorithms + Software Tools
- Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood:
Secure E-commerce Protection Profile.
279-285 BibTeX
- Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui:
An Efficient Bloom Filter Based Solution for Multiparty Private Matching.
286-292 BibTeX
- Mohammad Chowdhury, Bon Sy, Rasheed Ahmad:
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure.
293-299 BibTeX
- Jörg Keller, Tobias Eggendorfer:
Combining SMTP and HTTP tar Pits to Proactively Reduce Spam.
300-306 BibTeX
- Dongwan Shin:
Modeling Role-based Trust and Authority in Open Environments.
307-313 BibTeX
- Li-Yen Hsu, Shin-Shin Kao:
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori.
314-320 BibTeX
- Bernard Kaddour, Joël Quinqueton:
Using Aspects and Compilation Techniques to Dynamically Manage Applications.
321-327 BibTeX
- Michael LeMay, Jack Tan:
Acoustic Surveillance of Physically Unmodified PCs.
328-334 BibTeX
- Xiaodong Yuan, Dajiong Yue:
Software Vaccine Technique and Its Application in Early Virus.
335-340 BibTeX
- Jianwu Zheng, Mingsheng Liu, Hui Liu:
On Achieving Trustworthy SOA-Based Web Services.
341-350 BibTeX
Integrated Security
- Satish Baddelpeli, Gregory Vert:
Adaptive Security Metrics for Computer Systems.
351-356 BibTeX
- Rajasekhar Yakkali, Gregory Vert:
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs).
357-363 BibTeX
- Gregory Vert, Manaf Alfize:
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation.
364-370 BibTeX
- Sara Nasser, Sergiu Dascalu, Gregory Vert:
User Interface Design of the Interactive Fingerprint Recognition (INFIR) System.
371-377 BibTeX
- Arthur Reloj, Gregory Vert:
Optical Wireless: Chromatic Encoded Visual Data Transfer.
378-383 BibTeX
- Gregory Vert, Nic Herndon:
Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases.
384-389 BibTeX
- Amit Mathur, Suneuy Kim, Mark Stamp:
Role Based Access Control and the JXTA Peer-to-Peer Framework.
390-398 BibTeX
Securing Medical Information
Late Papers
- Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha:
A Visual Environment for Characterization of State Changes in Computer Systems.
435-440 BibTeX
- Ebrahim Khosravi, Brandy Tyson:
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing.
441-447 BibTeX
- Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy:
TRINETR: Facilitating Alerts Analysis and Response Decision Making.
448-455 BibTeX
- Shamila Makki, Wunnava V. Subbarao:
On Security in TCP/IP over Wireless Network.
456-461 BibTeX
- Okbin Lee, Seongyeol Kim:
Conference Key Agrement Protocol Employing a Symmetric Balanced Incomplete Block Design.
462-467 BibTeX
- Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints.
468-474 BibTeX
- Cesar Monroy, Rayford B. Vaughn:
Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment.
475-481 BibTeX
- Vivek Kumar Sehgal:
Stochastic Modeling of Worm Propagation in Trusted Networks.
482-488 BibTeX
- Ali Berrached, André de Korvin:
Reinforcing Access Control Using Fuzzy Relation Equations.
489-493 BibTeX
- Rajarshi Sanyal:
Framework for realizing Mobile and Computer Communications through Color Signals.
494-500 BibTeX
- Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar:
Securing Collaborative Applications.
501-508 BibTeX
- Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary, Fei Liu, Jiayue Chang, Manxue Guo:
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services.
509-514 BibTeX
- Bob Thibadeau, Michael Willett:
Trusted Storage: Focus on Use Cases.
515-521 BibTeX
- Pravesh Gaonjur, Chandradeo Bokhoree:
Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied?
522- BibTeX
Copyright © Sat May 16 23:04:19 2009
by Michael Ley (ley@uni-trier.de)