You are on page 1of 25

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Second International Conference on Information International Conference on Information Security and Assurance (ISA 2008) will be held on April 24th ~ 26th 2008, in Busan, Korea. ISA 2008 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Communication and Networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007) The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology. Topics of Conference The main topics include but will not be limited to: (Excellent surveying works in these areas are welcome, too.) 1) 2) 3) 4) 5) 6) Security Security Security Security Security Others Engineering and Its Application and Assurance in Operational Area and Assurance in Technology Area and Assurance in Commercial Area and Assurance in Military Area

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Welcome Message from the Conference Organizers


Welcome to the 2008 International Conference on Information Security and Assurance (ISA 2008). On behalf of the conference committees, we thank you for your participation, and hope that you will enjoy the presentations and social programs offered in this conference. ISA 2008 will be the most comprehensive conference focused on the various aspects of advances in Information Security and Assurance. The concepts of Security and Assurance are emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Communication and Networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks 2007, Jeju-island, Korea, December, 2007)The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Information Technology. We are grateful in particular to the following speakers who kindly accepted our invitation and, in this way, helped to meet the objectives of the conference: Belur V. Dasarathy Byeongho Kang Information Fusion Technologies Consultant University of Tasmania

The success of ISA 2008would not have been possible without the huge support from our sponsors and the work of our chairs, and these are listed in the following pages. Moreover, we would like to thank the 5th International Workshop, AMSE 2008 chairs and the special sessions SPPC 2008 and ESRPI 2008 organizers for contributions that have added variety to the topics represented. With best regards, Hong-Sub Lee (Soonchunhyang University, Korea) Tai-hoon Kim (Hannam University, Korea) Wai Chi Fang (NASA JPL, USA)

Honorary Chair and General Chairs

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Welcome Message from the Program Co-chairs


We would like to extend our welcome and express our gratitude to all of the authors of submitted papers and to all of the attendees, for their contributions and participation. In ISA 2008, the second international conference, the number of 459 submitted papers it has attracted is very impressive. The international character of the conference is reflected in the fact that submissions came from 20 countries. The submitted abstracts and papers went through a thorough reviewing process. As a result, 122 articles were accepted for the ISA 2008 proceedings published by IEEE, reflecting (but not limited to) the following areas: 1) Security Engineering and Its Application - Security Level Definition Criteria and Its Application - Security Requirements Engineering - Security in System/Software/Product Development Site - Security in Development Processes - Security Maturity Model - Security Evaluation Criteria and Methodology - New Idea, Theory and Paradigm for Security - etc 2) Security and Assurance in Operational Area - Security Policy, Strategy and Management - Authentication and Identity Management - Security Education and Training - Personnel Security and Privacy - Trust Negotiation, Establishment and Management - Vulnerability, Threat, and Risk Analysis - etc 3) Security and Assurance in Technology Area - Agent and Mobile Code Security - Authorization and Access Control

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Biometrics Security and Applications Computer Forensics Cryptographic Protocols Data Integrity and Privacy Database Security Intrusion Detection and Prevention Distributed System Security Key Management and Recovery Mobile and Ad hoc network security Operating System Security Secure Hardware and Software Design Smartcards and Chip Security RFID, Sensor Network, Ubiquitous Computing Security etc

4) Security and Assurance in Commercial Area - Cell phone, PDA, and Potable Device Security - Biometrics Products and its Applications - Firewall, IDS, Anti-virus, and other Security Products - E-Commerce and E-Government Security - Intellectual Property Protection - Internet and Web Services Security - etc 5) Security and Assurance in Military Area - Information Warfare and Countermeasures - Cyber-attack and Cyber-terrorism - Anti-tamper and TEMPEST - Physical Security and Soldier Security - E-bomb and Electronic Attack - Tactical Communication and Network Security - Sensor-to-shooter/Command Control System Security - etc 6) Others

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Achieving such a high quality of proceedings would have been impossible without the huge work that was undertaken by the International Program Committee members. We take this opportunity to thank them for their great support and cooperation. Sincerely yours, Deok Gyu Lee Kirk P. Arnett Sajid Hussain Program Chairs (ETRI, Korea) (MississippiStateUniversity, U.S.A) (Acadia University, Canada)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

ISA 2008 is organized by

Honorary Chair:
Hong-Sub Lee (Soonchunhyang University, Korea)

General Co-Chairs:
Tai-hoon Kim (Hannam University, Korea) Wai Chi Fang (NASA JPL, USA)

Program Co-Chairs:
Deok Gyu Lee (ETRI, Korea) Kirk P. Arnett (MississippiStateUniversity, USA) Sajid Hussain (Acadia University, Canada)

Workshop Co-Chairs:
Yan Zhang (Simula Research Laboratory, Norway)

International Advisory Board:


Dianhui Wang (La Trobe University, Australia) Dominik Slezak (Inforbright, Poland) Edwin H-M. Sha (University of Texas at Dallas, USA) Gil-cheol Park (HannamUniversity, Korea) Haeng-kon Kim (Catholic University of Daegu, Korea) Hai Jin (Huazhong University of Science and Technology, China) Jong Hyuk Park (Kyungnam University, Korea) Justin Zhan (Carnegie Mellon University, USA) Kouichi Sakurai (Kyushu University, Japan) Kyoil Chung (ETRI, Korea) Laurence T. Yang (St Francis Xavier University, Canada) Radu G. Andrei (PluraTech, USA) Stan Matwin (University of Ottawa, Canada) Tanya Vladimirova (University of Surrey, UK)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Tony Shan (University of Phoenix, USA) Tughrul Arslan (Unviersity of Edinburgh, UK)

Publication Co-Chair:
Yong-ik Yoon (Sookmyung Women's University, Korea)

Publicity Co-Chairs:
Antonio Coronato (ICAR-CNR, Italy) Byung-gyu No (KISA, Korea) Damien Sauveron (Universit de Limoges/CNRS, France) Hua Liu (Xerox Corporation, USA) Kevin Raymond Boyce Butler (Pennsylvania State University, USA) Seok-soo Kim (Hannam University, Korea) Soo-Cheol Hwang (Inha Technical College, Korea)

System Management Chair:


Sang-Soo Yeo (Kyushu University, Japan)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Program Committee
Abdelwahab Hamou-Lhadj (Concordia University, Canada) Ahmet Koltuksuz (Izmir Institute of Technology, Turkey) Ajay Kumar (Indian Institute of Technology Deihi, India) Albert Levi (Sabanci university, Turkey) Andreas Jacobsson (Blekinge Institute of Technology, Sweden) Arosha Bandara (The Open University, UK) Audun Josang (QUT, Australia) Bingyang Zhou (Australian Catholic University, Australia) Bruno Crispo (Faculty of Science, Netherland) Carlo Ghezzi (Politecnico di Milano, Italy) Chantana Chantrapornchai (Silpakorn University, Tailand) Chengcui Zhang (University of Alabama at Birmingham, UK) Chin-Laung Lei (National Taiwan University, Taiwan) Chin-Tser Huang (University of South Carolina, USA) D. Manivannan (University of Kentucky, USA) Daniel Port (University of Hawaii, USA) Dharma P. Agrawal (University of Cincinnati, USA) Edward David Moreno (UEA & BenQ, Manaus, AM, Brazil) Gerard Damm (Alcatel-Lucent, USA) Gerald Schaefer (Aston University, UK) Geyong Min (University of Bradford, UK) Hakan Duman (British Telecom, UK) Han-Chieh Chao (National Ilan University I-Lan, Taiwan) Hironori Washizaki (National Institute of Informatics, Japan) Hongji Yang (De Montfort University, UK) J. H. Abbawajy (Deakin University, Australia) Jan deMeer (Brandenburg Technical University, German) Jari Veijalainen (University of Jyvaskyla, FINLAND) Javier Garcia Villalba (Complutense University of Madrid, Spain) Javier Lopez (University of Malaga, Spain) Jeng-Shyang Pan (National Kaohsiung University of Applied Sciences, Taiwan) Jiang (Leo) Li (Howard University, USA)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Jonathan I. Maletic (Kent State University, USA) Jonathan Lee (National Central university, Taiwan) Jongmoon Baik (ICU, Korea) Jordi Castell-Roca (Rovira i Virgili University, Spain) Jordi Forne (University of Catalonia, Spain) Josef Bigun (Halmstad University, Sweden) Jun Bi (Tsinghua University, China) Katrin FRANKE (Gjovik University College, Norway) Kenichi Takahashi (ISIT, Japan) Kerry Ward (University of Nebraska at Omaha, USA) Kevin Butler (Pennsylvania State University, USA) Kiumi Akingbehin (University of Michigan, USA) Kyung Seok Kim (Chungbuk National University, Korea) Larbi Esmahi (Athabasca University, Canada) Luigi Buglione (Atos Origin, Italy) MalRey LEE (Chonbuk National University, Korea) Maria Tortorella (Universita' degli studi del sannio, Italy) Marios Savvides (Carnegie Mellon University, USA) Martin Drahansky (Brno University of Technology, Czech Republic) Michael Tunstall (University College Cork, Ireland) Ning Zhang (University of Manchester, UK) Nizamettin AYDIN (Bahcesehir University, TURKEY) Paolo Falcarin (Politecnico di Torino, Italy) Pierre Dusart (University of Limoges, France) Pierre-Franois Bonnefoi (University of Limoges, France) Prabhat K.Mahanti (University of New Brunswick, Canada) Qi Shi (Liverpool John Moores University, UK) Rainer Malaka (University of Bremen, German) Reinhard Schwarz (Fraunhofer IESE, German) Rob Rittenhouse (McMurry University, USA) Rodrigo Fernandes de Mello (University of Sao Paulo, Brazil) Serge Chaumette (University Bordeaux 1, France) Slobodan Petrovic (Gjovik University College, Norway) Stan Kurkovsky (Central Connecticut State University, USA)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Stefanos Gritzalis (University of the Aegean, Greece) Sudhirkumar Barai (Indian Institute of Technology Kharagpur, India) Thomas M. Gatton (National University, Canada) Tony Shan (University of Phoenix, USA) Umberto Villano (Universita' del Sannio, Italy) Victor Winter (University of Nebraska at Omaha, USA) Vincent Hsu (L1-Identity Solutions, USA) Yann-Gal Guhneuc (Universit de Montral, Canada) Yeong Deok Kim (Woosong Univertisy, Korea) Yoshiaki Hori (Kyushu University, Japan) Yooyeong Lee (National Institue of Standards and Technology, USA)

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Invited Talk
Incremental learning method in traffic anomaly detection systems
Dr. Byeong Ho Kang Professor, University of Tasmania, Australia Abstract Traffic anomaly detection is a standard task for network administration and security systems. Traffic anomaly is caused by mechanical faults, fraudulent behaviour or human errors. Anomaly detection is about how to detect the faults or fraud from normal situation (Hodge and Austin, 2004). As people share more information across Internet, many approaches have been proposed to automate this task. Many of these approaches attempt to develop a sophisticated model to represent the full range of normal traffic behaviour. As well as this, the model can be used to identify anomalies. However, it is not easy to develop such model because it requires large amount of training data and it does not guarantee that data set covers all normal and abnormal patterns in the domain. In addition to this, it is more difficult because the domain itself changes rapidly, changing hardware and software. In this talk, a different approach using incremental knowledge acquisition method known as Ripple Down Rules will be introduced as a solution for the development and maintenance of domain model. RDR assumes that the current model detecting anomaly is always incomplete and should be updated on the fly. Therefore, human experts should be able to reconstruct or update the domain model again for newly identified abnormal cases. This seems to be obvious but traditional expert system studies have shown that this can not be easily done, known as knowledge acquisition bottleneck. The main problem is how the system can validate and verify the changes for the new cases. RDR has been used in various expert system developments and has proven that it can maintain domain knowledge well regardless of the amount of domain knowledge. It proposed a new mechanism that ensures the verification and validation process while it is learning a new model.

The 2nd International Conference on Information Security and Assurance (ISA 2008)

The evaluation study shows that it performs as the conventional system does while it provides a new function, updating a domain model in real time. About Dr. Byeong Ho Kang Dr. Byeong Ho Knag is a senior lecturer at the School of Computing, University of Tasmania, Australia and a head of Research and Development of a joint venture company, kmAgent Pty.Ltd.,Hobart Australia. He received his Ph.D from the University of New South Wales, Sydney in 1996 and has worked in the Advanced Research Lab. HITACHI, Japan and Hoseo Univerity, Korea, before he joined the University of Tasmania in 2000. He also has worked in research and development projects with industries and research organizations, the Smart Internet Collaborative Research Centre, in Australia, the Asian Office of Aerospace Research Department, US in Japan. His research includes basic Knowledge Acquisition methods and many applied researches in Internet systems as well as medical expert systems. His work appears to be one of the few examples of research that has gone beyond criticizing the dominant assumptions and attempted to develop and apply different types of systems based on alternate assumptions. He has been involved in the development of several commercial AI products, an expert system development tool, an Intelligent Help Desk System, Web based information monitoring and classification systems, etc. He has been involved in the foundation of several joint venture companies in Australia and Korea. At present, the Tasmanian State Library is using his Web monitoring system for the Tasmanian government Web site. He has published many papers in refereed journals, conference proceedings and book chapters in these areas and has been involved in many conference and workshops as conference chair or program committee member. He recently organized the 19th Australian Joint Conference on Artificial Intelligence 2006 in Hobart, the Pacific Knowledge Acquisition Workshop in China 2006 and in New Zealand 2004.

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Invited Talk
Multi-Source Information Fusion An Overview in the Context of Information Security and Assurance
Dr. Belur V. Dasarathy Fellow IEEE Information Fusion Technologies Consultant Editor-in-Chief, Information Fusion http://belur.no-ip.com fusion_consultant@yahoo.com Abstract This lecture will offer an introductory overview of the evolving field of Information Fusion with a view to delineate its role in the context of Information Security and Assurance, the theme of the conference. The presentation will start with a brief introduction to the field of multi-sensor, multi-source information fusion and underlying taxonomies touching upon the three facets of architectures, algorithms, and applications. The Information Security and Assurance Issues have been addressed in the Information Fusion domain as an intrusion detection problem. Accordingly, the talk will discuss the role of information fusion in enhancing the performance of intrusion detection systems as one among the more popular and upcoming application areas. About Dr. Belur V. Dasarathy Dr. Belur V. Dasarathy, IEEE Fellow, is an independent consultant serving multiple defense and commercial clients in the areas of multi-sensor multi-source information fusion, target discrimination and recognition, pattern recognition, image analysis and other related topics, for the design and development of automated intelligent decision systems arising in a variety of strategic/tactical defense-related problems as well as other commercial/ civilian applications. Dr. Dasarathy has over 175 publications and is the author of three IEEE Computer Society Press books: Decision Fusion, Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques, and Image Data Compression: Block Truncation Coding.

The 2nd International Conference on Information Security and Assurance (ISA 2008)

His prior professional affiliations include Distinguished Scientist/Senior Principal Engineer at Dynetics, Inc.; Senior Technical Manager/Senior System Consultant at Intergraph Corporation; Computer Scientist at Computer Sciences Corporation; Assistant Professor at Indian Institute of Science, Visiting Professor at Southern Methodist University, Dallas, Texas; Adjunct Professor at Univ. of Alabama. He is the founding (an entrepreneurial accomplishment funded by Elsevier) and current Editor-in-chief of the International Journal on Information Fusion, published by Elsevier, the very first journal dedicated to this evolving field. He was one of the key founding members of the board of directors of the International Society on Information Fusion (ISIF) and served in that capacity for a couple of years afterwards. He is the organizer and chairman of the annual SPIE Conferences on Sensor Fusion since 1997 and on data mining, intrusion detection, and network security since 1999. He has delivered lectures as keynote invited speaker at very many national and International Conference including. 2006 IDGA Conference on Night Vision Systems, Washington, DC; 2006 IEEE Intl Conf on Multisensor Fusion and Integration for Intelligent Systems, Germany; 2006 Biologically Inspired Information Fusion, UK; ISSNIP '04 Melbourne, Australia; ICHMI'04, Bangalore, India; ICCC'04 Vienna, Austria, ICAR 03 Coimbra, Portugal, Fusion Workshop 02 china, Intl. Conf. on Industrial Technology 2000 - India; SNRAFI 01 - Spain; Workshop on Environmental Fusion - Sept. 00, Greece, Recpad 00 Portugal; Intl. Conf. on Applications of Pattern Recognition 1998- England, etc., etc. Dr. Dasarathy was the 1997 IEEE Region 3 Outstanding Engineer, a recipient of the IEEE Third Millennium Medal, 1996 IEEE Huntsville Section Outstanding Engineer. He was the Chairman of the First Rocket City Seminar conducted by IEEE Huntsville Section. He was the technical vice-chair for IEEE Autotestcon 2002. He has organized and chaired special sessions on Information Fusion and Data Mining at many IEEE sponsored conferences including IEEE Decision and Control 1998, International Joint Conference on Neural Networks 1999, IGARSS 2000, IECON-2000, . He has also been on the technical committee of various other IEEE sponsored or cosponsored conferences on pattern recognition, image processing, International Workshop on Web-based Support Systems and many other areas too numerous to recall. He was the lead/chair of data fusion and mining sub-committee under the Intelligent Systems Committee for the IEEE Industrial Electronics Society.

The 2nd International Conference on Information Security and Assurance (ISA 2008)

April 24th, 2008


Registration Open 08:20 ~
Session 1 Technical Session Session 4 Session 5

09:30~ 11:00

MUE 2008 General


Youngsoo Kim Jinju Hall
Reconfigurable Depth Buffer Compression Design for 3D Graphics System

ISA 2008 General


Kyung-Hyune Rhee Pado Hall

ISA 2008 General


Eun-Jun Yoon Bada Hall

09:30~ 09:45

09:45~ 10:00

10:00~ 10:15

10:15~ 10:30

Implementation and Analysis of New Lightweight Secure Deniable Authenticated Cryptographic Algorithm Key Establishment for Internet Suitable for Wireless Sensor Protocols Networks Tzung-Rung Jung, Lan-Da Woo Kwon Koo, Hwaseong Meng-Hui Lim, Sanggon Lee, Van, Wai-Chi Fang, Teng-Yao Lee, Yong Ho Kim, Dong Youngho Park, Sangjae Moon Sheu Hoon Lee Combined ANN and A Video Sharing Platform with Integrating Trust and Role for Lagrangian Relaxation Method Data Grid Technology for Secure Interoperation in for Unit Commitment Mobile Devices Multi-Domain Environment Scheduling Chao-Tung Yang, Chun-Jen Jianfeng Lu, Ruixuan Li, Zhen Liu, Ning Tan, Jinsong Chen, Chien-Jung Huang, Zhengding Lu Han Hung-Yen Chen A Performance-Effective and Experimental Evaluation of Secure Deniable High-Scalable Grid File Different Intensity Distributions Authentication Protocol Based System for Palmprint Identification on ElGamal Cryptography Chin-Chen Chu, Ching-Hsien Yanqiang Zhang, Zhengding Eun-Jun Yoon, Kee-Young Hsu Qiu, Dongmei Sun Yoo Intelligent security for SSDR - Reconfigurable An Intrusion Detection System inter-space surveillance Firewall: Reconfiguration in Mobile AdHoc networks applications Model Impact Fabio Dacencio Pereira, Geon-Woo Kim, Jong-Wook Edward David Moreno SaniKommu Madhavi Han, Sang-Wook Kim Ordonez, Cesar Giacomini Penteado, Fernando Augusto

The 2nd International Conference on Information Security and Assurance (ISA 2008)

10:30~ 10:45

10:45~ 11:00

Garcia Muzzi Information leakage via FMCS: A File Replication and electromagnetic emanation A Security Protocol Compiler Consistency Strategy in Data and effectiveness of averaging Generating C Source Codes Grids technique Chao-Tung Yang, Chun-Pin Shinsaku Kiyomoto, Haruki Fu, Chien-Jung Huang, Hidema Tanaka Ota, Toshiaki Tanaka Ching-Hsien Hsu Optimized Implementation of A Forward-Secure Signature Improvement of a Ray Tracing on Cell with Backward-Secure Fingerprint-Based Remote Broadband Engine Detection User Authentication Scheme Jing Xu, Wentao Zhu, Bo Li, Hai Jin, Zhiyuan Shao, Dai-Rui Lin, Chih-I Wang Dengguo Feng Yong Li, Xin Liu

11:00~ 12:00

Invited Speaking - Jinju Hall


Dr. Han-Chieh Chao Cross-Layer Design in 3G Wireless Networks and Beyond

12:00~ 13:00

Lunch Time Invited Speaking - Jinju Hall

13:00~ 14:00

Dr. Stephen S. Yau Development of Adaptive Service-based Systems in Ubiquitous Computing Environments

14:00~ 15:00

Invited Speaking - Jinju Hall


Dr. Hyoung Joong Kim Multimedia Hashes for Ubiquitous Applications Coffee Break Technical Session

15:00~ 15:30 15:30~ 17:45

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Session 6

Session 9

Session 10

ISA 2008 General


Han-Chieh Chao Jinju Hall
15:30~ A new forensic image format 15:45 for high capacity disk storage

ISA 2008 General


Yeong-Deok Kim Pado Hall
Breaking a Smart Card based Secure Password Authentication Scheme

ISA 2008 General


Kee-Young Yoo Bada Hall
IDEA: A New Intrusion Detection Data Source

Sang Su Lee, Tae-Sik Park, Eun-Jun Yoon, Kee-Young William Mahoney, William Sang-Uk Shin, Sung-Kyong Yoo Sousan Un, Do-Won Hong InvestigatingWireless Sensor Incident-driven memory A Survey for Open Shortest 15:45~ Network Lifetime using a snapshot for full-virtualized OS Path First Weight Setting 16:00 Realistic Radio using interruptive debugging (OSPFWS) Problem Communication Model techniques Michael Mallinson, Sajid Ahmed Abo Ghazala, Ayman Ruo Ando, Youki Hussain, Jong Hyuk Park El Sayed Kadobayashi, Youichi Shinoda UMOST : Ubiquitous Secure Delegation Model 16:00~ Multimedia Framework for Collaborative Privacy based on SAML in Ubiquitous 16:15 Context-aware Session Management System Environments Mobility Kyu Il Kim, Hae Kyung Lee, InJoo Jang, Hyeong Seon YongJu Lee Ung Mo Kim Yoo Fine Granulation Access Biometric Handshake Protocol IMAGE-BASED MODELING 16:15~ Rights for Information Flow on Telebiometric System OF VIRTUAL PAGODA OF 16:30 Control in Object Oriented Mechanism for National CHINA Systems Infrastructure Yong-Nyuo Shin, YongJun Wu Guo, Yi Li, Wenhui Li, Allaoua Maamir, Abdelaziz Lee, Woochang Shin, Meiying Sun Fellah, Lina A. Salem Jin-Young Choi Cognitive Modeling in Medical Improved Impossible Use of LFSR for Sensor 16:30~ Pattern Semantic Differential Cryptanalysis of Network Security: A New 16:45 Understanding ARIA Approach Kalpana Sharma, Vikash Lidia Ogiela, Ryszard Shenhua Li, Chunyan Song Varun, Rohit Kumar, Vikrant Tadeusiewicz, Marek Ogiela Jain 16:45~ An IMS based Inter-Working A Static Java Birthmark A3RP : Anonymous and

The 2nd International Conference on Information Security and Assurance (ISA 2008)

17:00

Solution for Multimedia Service in a Converged Network Zhongwen Zhu

Based on Operand Stack Behaviors

Authenticated Ad Hoc Routing Protocol

17:00~ 17:15

OPTIMAL REQUANTIZER SELECTION FOR MPEG-4 VIDEO Anand B. Deshpande, Hemant V. Kamat Video customization system using Mpeg standards Svetlana Kim, Yong-Ik Yoon

Heewan Park, Hyun-il Lim, Jung Ha Paik, Bum Han Kim, Seokwoo Choi, Taisook Han Dong Hoon Lee A Unified Threat Model for Secure authentication on Assessing Threat in Web WiMAX with Neural Applications Cryptography Xiaohong Li, Ke He Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine Yan Wen, Jinjing Zhao, Huaimin Wang Dong Hu, YuYan Wang Strategic Planning for Information Security and Assurance Daniel Port Catalog of Metrics for Assessing Security Risks of Software throughout the Software Development Life Cycle Khalid Sultan, Abdeslam En_Nouaary, Abdelwahab Hamou-Lhadj

17:15~ 17:30

17:30~ 17:45

Genetic Algorithm for Shortest Windows Registry and Hiding Driving Time in Intelligent Suspects Secret in Registry Transportation Systems Chu-Hsing Lin, Jung-Chun Liu, Jui-Ling Yu, Chia-Jen Li

Youngsoo Kim, Dowon Hong

The 2nd International Conference on Information Security and Assurance (ISA 2008)

April 25th, 2008


Registration Open 08:30 ~
Session 14 Technical Session Session 15 Session 16

09:00~ 11:00

ISA 2008 General


Wai Chi Fang Pado Hall

ISA 2008 General


Byeongho Kang Bada Hall

AMSE + SPPC
Byoung-soo Koh TaeJongDae Hall

Live Forensic Analysis of a Design and Implementation A Traffic Analysis of for EPC System Method to 09:00~ Compromised Linux System Authentication Methods for Authentication and 09:15 Using LECT (Linux Evidence Proxy Mobile IPv6 Collection Tool) Cryptography Joonho Choi, Antonio Savoldi, Dae-jung Kim, Jeong-jai Kim, Jong-Hyouk Lee, Tai-Myoung Paolo Gubian, Seohkee Lee, Seung-min Lee, Moon-seog Chung Sangjin Lee Jun Cryptographic key EXCEPTION-AWARE DIGITAL A Novel Reputation Model for 09:15~ management for SCADA RIGHTS MANAGEMENT Mobile Agent-Based 09:30 systems - issues and ARCHITECTURE E-Commerce Systems perspectives EXPERIMENTATION Ludovic Pietre-Cambacedes, Jean-Henry Morin, Michel Zaobin Gan, Yijie Li Pascal Sitbon Pawlak A Rapid and Efficient Pre-deployment Key Scheme An Authentication Mechanism Smart Card-Based 09:30~ for Secure Data of Digital Contents in Three-Party Key Exchange 09:45 Transmissions in Sensor Pervasive Computing without Server's Assistance Networks Using Lagrange Environment Interpolation Polynomial Yong Hun Kim, Taek Young Eun-Gyeom Jang, Yong-Rak Hua-Yi Lin, De-Jun Pan, Youn, Young Ho Park, Seok Choi Zhi-Ren Qiu Hee Hong A Study on an Effective 09:45~ An Organizational Framework Group Management Scheme Anomaly Detection Using 10:00 for Building Secure Software for Secure Multicast LibSVM Training Tools Transmission in MIPv6 Abdelwahab Hamou-Lhadj, Chu-Hsing Lin, Jung-Chun Hoon Ko, Yong-Jun Lee,

The 2nd International Conference on Information Security and Assurance (ISA 2008)

10:00~ 10:15

10:15~ 10:30

10:30~ 10:45

10:45~ 11:00

Kyung-Sang Sung, Hae-Seok Oh and Yongtae Shin Security Engineering in IT Detection of Hidden E-commerce and E-commerce Governance for University Information in Forensic Tools Fraud in Saudi Arabia Information System Yeog Kim, Jewan Bang, Saleh Alfuraih Ho-Yeol Kwon Sangjin Lee, Jongin Lim Deciding Optimal Entropic Implementation and Automatic Thresholds to Calibrate the Performance Analysis of Testing for Security Detection Mechanism for STBC Based on STTC Enhancement of Linux Based Variable Rate DDoS Attacks System on Least Privilege in ISP Domain Gaoshou Zhai, Jie Zeng, Chulgyu Kang, Changheon Anjali Sardana, Ramesh Joshi Miaoxia Ma, Liang Zhang Oh CRYPTEX Model for Software S3PR: Secure Serverless Attribute-based Signature Source code Search Protocols for RFID Scheme Sheikh Ahamed, Farzana Rahman, Endadul Hoque, Guo Shanqing ByungRae Cha Fahim Kawsar, Tatsuo Nakajima A Group Rekeying Scheme Maximizing Return on Security MIMO-OFDM for the Better for Location-aware Sensor Safeguard Investment with Quality Link of Wireless Networks Constraint Satisfaction Network Subir Biswas, Syed Afzal, Taek Lee, Dohoon Kim, Hoh Long Bora, Heau Jo Kang, Young-hun Park, Dong-kyoo In Yoon Ho Kim Kim Abdelkrim Hamou-Lhadj Liu, Chia-Han Ho

11:00~ 12:00

Invited Speaking - TaeJongDae Hall


Dr. Byeongho Kang Incremental learning method in traffic anomaly detection systems

12:00~ 13:00 13:00~ 15:30

Lunch Time
Technical Session

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Session 20

Session 21

Session 22

ISA 2008 General


Hangbae Chang Pado Hall

ISA 2008 General


Hai Jin Bada Hall

ESRPI
Sang-Soo Yeo TaeJongDae Hall
Incorporating Security Requirements Engineering into the Rational Unified Process Nancy R. Mead Privacy Preserving Collaborative Social Network Gary Blosser Privacy Preserving SQL Queries Hyun-A Park Network Intrusion Detection using Cost-distribution based Outlier Detection Scheme Komsit Prakobphol

Integrated Access Permission: Cyber Criminal Activity Secure and Simple Policy 13:00~ Analysis Models using Markov Description by Integration of 13:15 Chain for Digital Forensics File Access Vector Permission Takuto Yamaguchi, Yuichi Do Hoon Kim, Hoh In Nakamura, Toshihiro Tabata Password Generation of OTP Design and Evaluation of a 13:15~ System using Fingerprint Bayesian-filter-based Image 13:30 Features Spam Filtering Method Masahiro Uemura, Toshihiro ByungRae Cha, ChulWon Kim Tabata Authenticated Group Key Research on Software 13:30~ Distribution for Unreliable Dependability Testing Profile 13:45 Sensor Networks in Internet Environment Changjie Ma, Jing Zhao, Hwaseong Lee Guochang Gu, Xiaoyun Ma Design and Implementation of A Contemporary Technique to 13:45~ a FAT File System for Guarantee Quality of Service 14:00 Reduced Cluster Switching (QoS) for Heterogeneous Overhead Data Traffic Moonsoo Choi, Heemin Park, Jaewook Jeon 14:00~ 14:15 CALDUWEL NEWTON P

Towards Optimal Software Anonymous and Traceable Rejuvenation in Wireless Privacy Preserving in Jointing Authentication Scheme using Sensor Networks using Recommender Systems Smart Cards Self-Regenerative Components Sazia Parvin, Dong Seong Seil Kim, Ji Young Chun, Chia-Lung Hsieh Kim, Jong Sou Park Dong Hoon Lee Foot Step Based Person Correlating Multi-Step Attack 14:15~ Identification Using Histogram and Constructing Attack Security Applications in 14:30 Similarity and Wavelet Scenarios Based on Attack Dynamic Evolution Systems Decomposition Pattern Modeling

The 2nd International Conference on Information Security and Assurance (ISA 2008)

Ahmed Mostayed, Sikyung Kim, Mohammad Mynuddin Gani Mazumder, Se Jin Park 14:30~ 14:45 Detection SYN Flooding Attacks Using Fuzzy Logic Taner Tuncer, Yetkin Tatar 14:45~ 15:00 Integrated Wireless Rogue Access Point Detection and Counterattack System Songrit Srilasak, Kitti Wongthavarawat, Anan Phonphoem Intelligent Multimedia Data Hiding Techniques and Applications

Zhijie Liu, Chongjun Wang, Shifu Chen An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Gunhee Lee, Jungtaek Seo, Dong-kyoo Kim A New Approach for Hiding Policy and Checking Policy Consistency Deqing Zou, Jong Hyuk Park, Zhensong Liao

Xianming Xu Towards Empirical Aspect of Secure Scalar Product Protocol Chi-Hao Shen The Economics of Privacy: Privacy: People, Policy and Technology Justin Zhan

Simple and Flexible Random Sufficient conditions for Key Predistribution Schemes secrecy under any equational for Wireless Sensor Networks theory Using Deployment Knowledge Hsiang-Cheh Huang, Wai-Chi Sinan Emre Tasci, Ersoy Hanane Houmani, Mohamed Fang Bayramoglu, Albert Levi Meji A Hypertension Management Why MSN lost to QQ in 15:15~ Positioning using Acceleration System based Multi-Agent for China market?Different 15:30 prompt perception of and Moving Direction privacy protection design Emergencies Bongeun Gu, Yunsik Kwak Eungyeong Kim, Malrey Lee Zhaoli Meng, Meiyun Zuo 15:00~ 15:15 15:30~ 16:00

Coffee Break

16:00~ 17:00

Invited Speaking - TaeJongDae Hall


Dr. Weijia Jia Ubiquitous Networking: How to make it work?

17:10~ 17:30

Welcome Ceremony - TaeJongDae Hall


1. VIP

The 2nd International Conference on Information Security and Assurance (ISA 2008)

2. Conferenc Chiar 3. Program Chair 4. President of SERSC 5. Best Papers Award 17:30~ 21:00

Conference Dinner - TaeJongDae Hall

The 2nd International Conference on Information Security and Assurance (ISA 2008)

April 26th, 2008


Registration Open 08:30 ~
Invited Speaking - TaeJongDae Hall
09:00~ Dr. Belur V. Dasarathy 10:00 Multi-Source Information Fusion - An Overview in the Context of Information

Security and Assurance Technical Session


10:00~ 12:00

Session 26

Session 27

ISA 2008 General


Laurence T. Yang Pado Hall
Security Research on WiMAX with Neural Cryptography Dong Hu

ISA 2008 General


Jianhua Ma Bada Hall
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Krishan Sabaragamu Koralalage, Jingde Cheng A Security Engineering Environment Based on ISO/IEC Standards: Providing Standard, Formal, and Consistent Supports for Design, Development, Operation, and Maintenance of Secure Information Systems Jingde Cheng, Yuichi Goto, Shoichi Morimoto, Daisuke Horie Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing

10:00~ 10:15

10:15~ 10:30

Towards a Security Cockpit

Nguyen Pham, Loic Baud, Patrick Bellot 10:30~ 10:45 A Model of sharing based multi-agent to support adaptive service in ubiquitous environment Hyogun Yoon, Malrey Lee

Sungju Lee, Daesung Moon, Hanna Choi, Yongwha Chung 10:45~ Teaching Computer Security using Xen in a Towards Reliable Trust Management based on 11:00 Virtual Environment Structural Trust Scopes of Distributed Roles Dong Hu Gang Yin, Ning Zhou, Huaimin Wang 11:00~ Analyzing the Secure and Energy Efficient An Abnormal Area Scanning for Scalable and

The 2nd International Conference on Information Security and Assurance (ISA 2008)

11:15

Transmissions of Compressed Fingerprint Images using Encryption and Watermarking Seungwoo Hong, Hakjae Kim, Sungju Lee, Yongwha Chung

Energy-Efficient SensorNet Fault Management Hayoung Oh, Kijoon Chae

12:00~

Conference Tour Pusan City Tour with Lunch (Half Day Tour) - Please visit tour desk : About $60 USD -

You might also like