isa2008 conference program

Upload: cairo601

Post on 07-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 ISA2008 Conference Program

    1/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Second International Conference on Information International Conference on Information Security

    and Assurance (ISA 2008) will be held on April 24th ~ 26th 2008, in Busan, Korea.

    ISA 2008 will be the most comprehensive conference focused on the various aspects of advances

    in Information Security and Assurance. The concepts of Security and Assurance are emerging

    rapidly as an exciting new paradigm to provide reliable and safe life services.

    Our Conference provides a chance for academic and industry professionals to discuss recent

    progress in the area of Communication and Networking including modeling, simulation and novel

    applications associated with the utilization and acceptance of computing devices and systems.

    ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks

    (IAN 2007, Jeju-island, Korea, December, 2007)

    The goal of this conference is to bring together the researchers from academia and industry as

    well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of

    Information Technology.

    Topics of Conference

    The main topics include but will not be limited to:

    (Excellent surveying works in these areas are welcome, too.)

    1) Security Engineering and Its Application

    2) Security and Assurance in Operational Area

    3) Security and Assurance in Technology Area

    4) Security and Assurance in Commercial Area

    5) Security and Assurance in Military Area

    6) Others

  • 8/3/2019 ISA2008 Conference Program

    2/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Welcome Message from the Conference Organizers

    Welcome to the 2008 International Conference on Information Security and Assurance (ISA 2008).

    On behalf of the conference committees, we thank you for your participation, and hope that you

    will enjoy the presentations and social programs offered in this conference.

    ISA 2008 will be the most comprehensive conference focused on the various aspects of advances

    in Information Security and Assurance. The concepts of Security and Assurance are emerging

    rapidly as an exciting new paradigm to provide reliable and safe life services.

    Our Conference provides a chance for academic and industry professionals to discuss recent

    progress in the area of Communication and Networking including modeling, simulation and novel

    applications associated with the utilization and acceptance of computing devices and systems.

    ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks

    2007, Jeju-island, Korea, December, 2007)The goal of this conference is to bring together the

    researchers from academia and industry as well as practitioners to share ideas, problems and

    solutions relating to the multifaceted aspects of Information Technology.We are grateful in particular to the following speakers who kindly accepted our invitation and,

    in this way, helped to meet the objectives of the conference:

    Belur V. Dasarathy Information Fusion Technologies Consultant

    Byeongho Kang University of Tasmania

    The success of ISA 2008would not have been possible without the huge support from our

    sponsors and the work of our chairs, and these are listed in the following pages. Moreover, we

    would like to thank the 5th International Workshop, AMSE 2008 chairs and the special sessions

    SPPC 2008 and ESRPI 2008 organizers for contributions that have added variety to the topicsrepresented.

    With best regards,

    Hong-Sub Lee (Soonchunhyang University, Korea)

    Tai-hoon Kim (Hannam University, Korea)

    Wai Chi Fang (NASA JPL, USA)

    Honorary Chair and General Chairs

  • 8/3/2019 ISA2008 Conference Program

    3/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Welcome Message from the Program Co-chairs

    We would like to extend our welcome and express our gratitude to all of the authors of

    submitted papers and to all of the attendees, for their contributions and participation.

    In ISA 2008, the second international conference, the number of 459 submitted papers it has

    attracted is very impressive. The international character of the conference is reflected in the fact

    that submissions came from 20 countries.

    The submitted abstracts and papers went through a thorough reviewing process. As a result,

    122 articles were accepted for the ISA 2008 proceedings published by IEEE, reflecting (but not

    limited to) the following areas:

    1) Security Engineering and Its Application

    - Security Level Definition Criteria and Its Application- Security Requirements Engineering

    - Security in System/Software/Product Development Site

    - Security in Development Processes

    - Security Maturity Model

    - Security Evaluation Criteria and Methodology

    - New Idea, Theory and Paradigm for Security

    - etc

    2) Security and Assurance in Operational Area

    - Security Policy, Strategy and Management

    - Authentication and Identity Management- Security Education and Training

    - Personnel Security and Privacy

    - Trust Negotiation, Establishment and Management

    - Vulnerability, Threat, and Risk Analysis

    - etc

    3) Security and Assurance in Technology Area

    - Agent and Mobile Code Security

    - Authorization and Access Control

  • 8/3/2019 ISA2008 Conference Program

    4/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    - Biometrics Security and Applications

    - Computer Forensics

    - Cryptographic Protocols

    - Data Integrity and Privacy

    - Database Security

    - Intrusion Detection and Prevention- Distributed System Security

    - Key Management and Recovery

    - Mobile and Ad hoc network security

    - Operating System Security

    - Secure Hardware and Software Design

    - Smartcards and Chip Security

    - RFID, Sensor Network, Ubiquitous Computing Security

    - etc

    4) Security and Assurance in Commercial Area

    - Cell phone, PDA, and Potable Device Security- Biometrics Products and its Applications

    - Firewall, IDS, Anti-virus, and other Security Products

    - E-Commerce and E-Government Security

    - Intellectual Property Protection

    - Internet and Web Services Security

    - etc

    5) Security and Assurance in Military Area

    - Information Warfare and Countermeasures

    - Cyber-attack and Cyber-terrorism

    - Anti-tamper and TEMPEST

    - Physical Security and Soldier Security

    - E-bomb and Electronic Attack

    - Tactical Communication and Network Security

    - Sensor-to-shooter/Command Control System Security

    - etc

    6) Others

  • 8/3/2019 ISA2008 Conference Program

    5/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Achieving such a high quality of proceedings would have been impossible without the huge

    work that was undertaken by the International Program Committee members. We take this

    opportunity to thank them for their great support and cooperation.

    Sincerely yours,

    Deok Gyu Lee (ETRI, Korea)

    Kirk P. Arnett (MississippiStateUniversity, U.S.A)

    Sajid Hussain (Acadia University, Canada)

    Program Chairs

  • 8/3/2019 ISA2008 Conference Program

    6/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    ISA 2008 is organized by

    Honorary Chair:

    Hong-Sub Lee (Soonchunhyang University, Korea)

    General Co-Chairs:

    Tai-hoon Kim (Hannam University, Korea)

    Wai Chi Fang (NASA JPL, USA)

    Program Co-Chairs:

    Deok Gyu Lee (ETRI, Korea)

    Kirk P. Arnett (MississippiStateUniversity, USA)

    Sajid Hussain (Acadia University, Canada)

    Workshop Co-Chairs:

    Yan Zhang (Simula Research Laboratory, Norway)

    International Advisory Board:

    Dianhui Wang (La Trobe University, Australia)

    Dominik Slezak (Inforbright, Poland)

    Edwin H-M. Sha (University of Texas at Dallas, USA)

    Gil-cheol Park (HannamUniversity, Korea)

    Haeng-kon Kim (Catholic University of Daegu, Korea)Hai Jin (Huazhong University of Science and Technology, China)

    Jong Hyuk Park (Kyungnam University, Korea)

    Justin Zhan (Carnegie Mellon University, USA)

    Kouichi Sakurai (Kyushu University, Japan)

    Kyoil Chung (ETRI, Korea)

    Laurence T. Yang (St Francis Xavier University, Canada)

    Radu G. Andrei (PluraTech, USA)

    Stan Matwin (University of Ottawa, Canada)

    Tanya Vladimirova (University of Surrey, UK)

  • 8/3/2019 ISA2008 Conference Program

    7/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Tony Shan (University of Phoenix, USA)

    Tughrul Arslan (Unviersity of Edinburgh, UK)

    Publication Co-Chair:

    Yong-ik Yoon (Sookmyung Women's University, Korea)

    Publicity Co-Chairs:

    Antonio Coronato (ICAR-CNR, Italy)

    Byung-gyu No (KISA, Korea)

    Damien Sauveron (Universit de Limoges/CNRS, France)

    Hua Liu (Xerox Corporation, USA)

    Kevin Raymond Boyce Butler (Pennsylvania State University, USA)

    Seok-soo Kim (Hannam University, Korea)

    Soo-Cheol Hwang (Inha Technical College, Korea)

    System Management Chair:

    Sang-Soo Yeo (Kyushu University, Japan)

  • 8/3/2019 ISA2008 Conference Program

    8/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Program Committee

    Abdelwahab Hamou-Lhadj (Concordia University, Canada)

    Ahmet Koltuksuz (Izmir Institute of Technology, Turkey)

    Ajay Kumar (Indian Institute of Technology Deihi, India)

    Albert Levi (Sabanci university, Turkey)

    Andreas Jacobsson (Blekinge Institute of Technology, Sweden)

    Arosha Bandara (The Open University, UK)

    Audun Josang (QUT, Australia)

    Bingyang Zhou (Australian Catholic University, Australia) Bruno Crispo (Faculty of Science,

    Netherland)

    Carlo Ghezzi (Politecnico di Milano, Italy)

    Chantana Chantrapornchai (Silpakorn University, Tailand)

    Chengcui Zhang (University of Alabama at Birmingham, UK)

    Chin-Laung Lei (National Taiwan University, Taiwan)Chin-Tser Huang (University of South Carolina, USA)

    D. Manivannan (University of Kentucky, USA)

    Daniel Port (University of Hawaii, USA)

    Dharma P. Agrawal (University of Cincinnati, USA)

    Edward David Moreno (UEA & BenQ, Manaus, AM, Brazil)

    Gerard Damm (Alcatel-Lucent, USA)

    Gerald Schaefer (Aston University, UK)

    Geyong Min (University of Bradford, UK)

    Hakan Duman (British Telecom, UK)

    Han-Chieh Chao (National Ilan University I-Lan, Taiwan)Hironori Washizaki (National Institute of Informatics, Japan)

    Hongji Yang (De Montfort University, UK)

    J. H. Abbawajy (Deakin University, Australia)

    Jan deMeer (Brandenburg Technical University, German)

    Jari Veijalainen (University of Jyvaskyla, FINLAND)

    Javier Garcia Villalba (Complutense University of Madrid, Spain)

    Javier Lopez (University of Malaga, Spain)

    Jeng-Shyang Pan (National Kaohsiung University of Applied Sciences, Taiwan)

    Jiang (Leo) Li (Howard University, USA)

  • 8/3/2019 ISA2008 Conference Program

    9/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Jonathan I. Maletic (Kent State University, USA)

    Jonathan Lee (National Central university, Taiwan)

    Jongmoon Baik (ICU, Korea)

    Jordi Castell-Roca (Rovira i Virgili University, Spain)

    Jordi Forne (University of Catalonia, Spain)

    Josef Bigun (Halmstad University, Sweden) Jun Bi (Tsinghua University, China)

    Katrin FRANKE (Gjovik University College, Norway)

    Kenichi Takahashi (ISIT, Japan)

    Kerry Ward (University of Nebraska at Omaha, USA)

    Kevin Butler (Pennsylvania State University, USA)

    Kiumi Akingbehin (University of Michigan, USA)

    Kyung Seok Kim (Chungbuk National University, Korea)

    Larbi Esmahi (Athabasca University, Canada)

    Luigi Buglione (Atos Origin, Italy)

    MalRey LEE (Chonbuk National University, Korea)

    Maria Tortorella (Universita' degli studi del sannio, Italy)

    Marios Savvides (Carnegie Mellon University, USA)

    Martin Drahansky (Brno University of Technology, Czech Republic)

    Michael Tunstall (University College Cork, Ireland)

    Ning Zhang (University of Manchester, UK)

    Nizamettin AYDIN (Bahcesehir University, TURKEY)

    Paolo Falcarin (Politecnico di Torino, Italy)

    Pierre Dusart (University of Limoges, France)

    Pierre-Franois Bonnefoi (University of Limoges, France)

    Prabhat K.Mahanti (University of New Brunswick, Canada)

    Qi Shi (Liverpool John Moores University, UK)

    Rainer Malaka (University of Bremen, German)

    Reinhard Schwarz (Fraunhofer IESE, German)

    Rob Rittenhouse (McMurry University, USA)

    Rodrigo Fernandes de Mello (University of Sao Paulo, Brazil)

    Serge Chaumette (University Bordeaux 1, France)

    Slobodan Petrovic (Gjovik University College, Norway)

    Stan Kurkovsky (Central Connecticut State University, USA)

  • 8/3/2019 ISA2008 Conference Program

    10/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Stefanos Gritzalis (University of the Aegean, Greece)

    Sudhirkumar Barai (Indian Institute of Technology Kharagpur, India)

    Thomas M. Gatton (National University, Canada)

    Tony Shan (University of Phoenix, USA)

    Umberto Villano (Universita' del Sannio, Italy)

    Victor Winter (University of Nebraska at Omaha, USA)Vincent Hsu (L1-Identity Solutions, USA)

    Yann-Gal Guhneuc (Universit de Montral, Canada)

    Yeong Deok Kim (Woosong Univertisy, Korea)

    Yoshiaki Hori (Kyushu University, Japan)

    Yooyeong Lee (National Institue of Standards and Technology, USA)

  • 8/3/2019 ISA2008 Conference Program

    11/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Invited Talk

    Incremental learning method in traffic anomaly detection systems

    Dr. Byeong Ho Kang

    Professor, University of Tasmania, Australia

    Abstract

    Traffic anomaly detection is a standard task for network administration and security systems.

    Traffic anomaly is caused by mechanical faults, fraudulent behaviour or human errors. Anomaly

    detection is about how to detect the faults or fraud from normal situation (Hodge and Austin,

    2004). As people share more information across Internet, many approaches have been proposed to

    automate this task.

    Many of these approaches attempt to develop a sophisticated model to represent the full range of

    normal traffic behaviour. As well as this, the model can be used to identify anomalies. However,

    it is not easy to develop such model because it requires large amount of training data and it

    does not guarantee that data set covers all normal and abnormal patterns in the domain. In

    addition to this, it is more difficult because the domain itself changes rapidly, changing hardware

    and software.

    In this talk, a different approach using incremental knowledge acquisition method known as

    Ripple Down Rules will be introduced as a solution for the development and maintenance of

    domain model. RDR assumes that the current model detecting anomaly is always incomplete andshould be updated on the fly. Therefore, human experts should be able to reconstruct or update

    the domain model again for newly identified abnormal cases. This seems to be obvious but

    traditional expert system studies have shown that this can not be easily done, known as

    knowledge acquisition bottleneck. The main problem is how the system can validate and verify

    the changes for the new cases.

    RDR has been used in various expert system developments and has proven that it can maintain

    domain knowledge well regardless of the amount of domain knowledge. It proposed a new

    mechanism that ensures the verification and validation process while it is learning a new model.

  • 8/3/2019 ISA2008 Conference Program

    12/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    The evaluation study shows that it performs as the conventional system does while it provides a

    new function, updating a domain model in real time.

    About Dr. Byeong Ho Kang

    Dr. Byeong Ho Knag is a senior lecturer at the School of Computing, University of Tasmania,Australia and a head of Research and Development of a joint venture company, kmAgent

    Pty.Ltd.,Hobart Australia. He received his Ph.D from the University of New South Wales, Sydney

    in 1996 and has worked in the Advanced Research Lab. HITACHI, Japan and Hoseo Univerity,

    Korea, before he joined the University of Tasmania in 2000. He also has worked in research and

    development projects with industries and research organizations, the Smart Internet Collaborative

    Research Centre, in Australia, the Asian Office of Aerospace Research Department, US in Japan.

    His research includes basic Knowledge Acquisition methods and many applied researches in

    Internet systems as well as medical expert systems. His work appears to be one of the few

    examples of research that has gone beyond criticizing the dominant assumptions and attempted to

    develop and apply different types of systems based on alternate assumptions.

    He has been involved in the development of several commercial AI products, an expert system

    development tool, an Intelligent Help Desk System, Web based information monitoring and

    classification systems, etc. He has been involved in the foundation of several joint venture

    companies in Australia and Korea. At present, the Tasmanian State Library is using his Web

    monitoring system for the Tasmanian government Web site.

    He has published many papers in refereed journals, conference proceedings and book chapters in

    these areas and has been involved in many conference and workshops as conference chair or

    program committee member. He recently organized the 19th Australian Joint Conference on

    Artificial Intelligence 2006 in Hobart, the Pacific Knowledge Acquisition Workshop in China 2006

    and in New Zealand 2004.

  • 8/3/2019 ISA2008 Conference Program

    13/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Invited Talk

    Multi-Source Information Fusion

    An Overview in the Context of Information Security and Assurance

    Dr. Belur V. Dasarathy

    Fellow IEEE

    Information Fusion Technologies Consultant

    Editor-in-Chief, Information Fusion

    http://belur.no-ip.com

    [email protected]

    Abstract

    This lecture will offer an introductory overview of the evolving field of Information Fusion with a

    view to delineate its role in the context of Information Security and Assurance, the theme of the

    conference. The presentation will start with a brief introduction to the field of multi-sensor,

    multi-source information fusion and underlying taxonomies touching upon the three facets of

    architectures, algorithms, and applications. The Information Security and Assurance Issues have

    been addressed in the Information Fusion domain as an intrusion detection problem. Accordingly,

    the talk will discuss the role of information fusion in enhancing the performance of intrusion

    detection systems as one among the more popular and upcoming application areas.

    About Dr. Belur V. Dasarathy

    Dr. Belur V. Dasarathy, IEEE Fellow, is an independent consultant serving multiple defense and

    commercial clients in the areas of multi-sensor multi-source information fusion, target

    discrimination and recognition, pattern recognition, image analysis and other related topics, for the

    design and development of automated intelligent decision systems arising in a variety of

    strategic/tactical defense-related problems as well as other commercial/ civilian applications. Dr.

    Dasarathy has over 175 publications and is the author of three IEEE Computer Society Press

    books: Decision Fusion, Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques, and

    Image Data Compression: Block Truncation Coding.

  • 8/3/2019 ISA2008 Conference Program

    14/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    His prior professional affiliations include Distinguished Scientist/Senior Principal Engineer at

    Dynetics, Inc.; Senior Technical Manager/Senior System Consultant at Intergraph Corporation;

    Computer Scientist at Computer Sciences Corporation; Assistant Professor at Indian Institute of

    Science, Visiting Professor at Southern Methodist University, Dallas, Texas; Adjunct Professor at

    Univ. of Alabama.

    He is the founding (an entrepreneurial accomplishment funded by Elsevier) and current

    Editor-in-chief of the International Journal on Information Fusion, published by Elsevier, the very

    first journal dedicated to this evolving field. He was one of the key founding members of the

    board of directors of the International Society on Information Fusion (ISIF) and served in that

    capacity for a couple of years afterwards. He is the organizer and chairman of the annual SPIE

    Conferences on Sensor Fusion since 1997 and on data mining, intrusion detection, and network

    security since 1999.

    He has delivered lectures as keynote invited speaker at very many national and International

    Conference including. 2006 IDGA Conference on Night Vision Systems, Washington, DC; 2006

    IEEE Intl Conf on Multisensor Fusion and Integration for Intelligent Systems, Germany; 2006

    Biologically Inspired Information Fusion, UK; ISSNIP '04 Melbourne, Australia; ICHMI'04,

    Bangalore, India; ICCC'04 Vienna, Austria, ICAR 03 Coimbra, Portugal, Fusion Workshop 02 china,

    Intl. Conf. on Industrial Technology 2000 - India; SNRAFI 01 - Spain; Workshop on Environmental

    Fusion - Sept. 00, Greece, Recpad 00 Portugal; Intl. Conf. on Applications of Pattern Recognition

    1998- England, etc., etc.

    Dr. Dasarathy was the 1997 IEEE Region 3 Outstanding Engineer, a recipient of the IEEE Third

    Millennium Medal, 1996 IEEE Huntsville Section Outstanding Engineer. He was the Chairman of

    the First Rocket City Seminar conducted by IEEE Huntsville Section. He was the technical

    vice-chair for IEEE Autotestcon 2002. He has organized and chaired special sessions on

    Information Fusion and Data Mining at many IEEE sponsored conferences including IEEE Decision

    and Control 1998, International Joint Conference on Neural Networks 1999, IGARSS 2000,

    IECON-2000, . He has also been on the technical committee of various other IEEE sponsored or

    cosponsored conferences on pattern recognition, image processing, International Workshop on

    Web-based Support Systems and many other areas too numerous to recall. He was the lead/chair

    of data fusion and mining sub-committee under the Intelligent Systems Committee for the IEEE

    Industrial Electronics Society.

  • 8/3/2019 ISA2008 Conference Program

    15/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    April 24th, 2008Registration Open 08:20 ~

    09:30~

    11:00

    Technical SessionSession 1 Session 4 Session 5

    MUE 2008 General ISA 2008 General ISA 2008 General Youngsoo Kim Kyung-Hyune Rhee Eun-Jun Yoon

    Jinju Hall Pado Hall Bada Hall

    09:30~

    09:45

    Reconfigurable Depth Buffer

    Compression Design for 3D

    Graphics System

    Implementation and Analysis

    of New Lightweight

    Cryptographic Algorithm

    Suitable for Wireless Sensor

    Networks

    Secure Deniable Authenticated

    Key Establishment for Internet

    Protocols

    Tzung-Rung Jung, Lan-DaVan, Wai-Chi Fang, Teng-Yao

    Sheu

    Woo Kwon Koo, HwaseongLee, Yong Ho Kim, Dong

    Hoon Lee

    Meng-Hui Lim, Sanggon Lee,Youngho Park, Sangjae Moon

    09:45~

    10:00

    A Video Sharing Platform with

    Data Grid Technology for

    Mobile Devices

    Integrating Trust and Role for

    Secure Interoperation in

    Multi-Domain Environment

    Combined ANN and

    Lagrangian Relaxation Method

    for Unit Commitment

    Scheduling

    Chao-Tung Yang, Chun-Jen

    Chen, Chien-Jung Huang,

    Hung-Yen Chen

    Jianfeng Lu, Ruixuan Li,

    Zhengding Lu

    Zhen Liu, Ning Tan, Jinsong

    Han

    10:00~

    10:15

    A Performance-Effective and

    High-Scalable Grid FileSystem

    Experimental Evaluation of

    Different Intensity Distributionsfor Palmprint Identification

    Secure Deniable

    Authentication Protocol Basedon ElGamal Cryptography

    Chin-Chen Chu, Ching-Hsien

    Hsu

    Yanqiang Zhang, Zhengding

    Qiu, Dongmei Sun

    Eun-Jun Yoon, Kee-Young

    Yoo

    10:15~

    10:30

    Intelligent security for

    inter-space surveillance

    applications

    SSDR - Reconfigurable

    Firewall: Reconfiguration

    Model Impact

    An Intrusion Detection System

    in Mobile AdHoc networks

    Geon-Woo Kim, Jong-Wook

    Han, Sang-Wook Kim

    Fabio Dacencio Pereira,

    Edward David Moreno

    Ordonez, Cesar Giacomini

    Penteado, Fernando Augusto

    SaniKommu Madhavi

  • 8/3/2019 ISA2008 Conference Program

    16/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Garcia Muzzi

    10:30~

    10:45

    FMCS: A File Replication and

    Consistency Strategy in Data

    Grids

    Information leakage via

    electromagnetic emanation

    and effectiveness of averaging

    technique

    A Security Protocol Compiler

    Generating C Source Codes

    Chao-Tung Yang, Chun-PinFu, Chien-Jung Huang,

    Ching-Hsien Hsu

    Hidema TanakaShinsaku Kiyomoto, Haruki

    Ota, Toshiaki Tanaka

    10:45~

    11:00

    Optimized Implementation of

    Ray Tracing on Cell

    Broadband Engine

    A Forward-Secure Signature

    with Backward-Secure

    Detection

    Improvement of a

    Fingerprint-Based Remote

    User Authentication Scheme

    Bo Li, Hai Jin, Zhiyuan Shao,

    Yong Li, Xin LiuDai-Rui Lin, Chih-I Wang

    Jing Xu, Wentao Zhu,

    Dengguo Feng

    11:00~

    12:00

    Invited Speaking - Jinju HallDr. Han-Chieh Chao

    Cross-Layer Design in 3G Wireless Networks and Beyond

    12:00~

    13:00Lunch Time

    13:00~

    14:00

    Invited Speaking - Jinju HallDr. Stephen S. Yau

    Development of Adaptive Service-based Systems in Ubiquitous Computing

    Environments

    14:00~

    15:00

    Invited Speaking - Jinju HallDr. Hyoung Joong Kim

    Multimedia Hashes for Ubiquitous Applications

    15:00~

    15:30Coffee Break

    15:30~

    17:45Technical Session

  • 8/3/2019 ISA2008 Conference Program

    17/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Session 6 Session 9 Session 10

    ISA 2008 General ISA 2008 General ISA 2008 GeneralHan-Chieh Chao Yeong-Deok Kim Kee-Young Yoo

    Jinju Hall Pado Hall Bada Hall

    15:30~

    15:45

    A new forensic image format

    for high capacity disk storage

    Breaking a Smart Card basedSecure Password

    Authentication Scheme

    IDEA: A New Intrusion

    Detection Data Source

    Sang Su Lee, Tae-Sik Park,

    Sang-Uk Shin, Sung-Kyong

    Un, Do-Won Hong

    Eun-Jun Yoon, Kee-Young

    Yoo

    William Mahoney, William

    Sousan

    15:45~

    16:00

    InvestigatingWireless Sensor

    Network Lifetime using a

    Realistic Radio

    Communication Model

    A Survey for Open Shortest

    Path First Weight Setting

    (OSPFWS) Problem

    Incident-driven memory

    snapshot for full-virtualized OS

    using interruptive debugging

    techniques

    Michael Mallinson, Sajid

    Hussain, Jong Hyuk Park

    Ahmed Abo Ghazala, Ayman

    El Sayed

    Ruo Ando, Youki

    Kadobayashi, Youichi Shinoda

    16:00~

    16:15

    UMOST : Ubiquitous

    Multimedia Framework for

    Context-aware Session

    Mobility

    Secure Delegation Model

    based on SAML in Ubiquitous

    Environments

    Collaborative Privacy

    Management System

    YongJu LeeKyu Il Kim, Hae Kyung Lee,

    Ung Mo Kim

    InJoo Jang, Hyeong Seon

    Yoo

    16:15~

    16:30

    IMAGE-BASED MODELING

    OF VIRTUAL PAGODA OF

    CHINA

    Fine Granulation Access

    Rights for Information Flow

    Control in Object Oriented

    Systems

    Biometric Handshake Protocol

    on Telebiometric System

    Mechanism for National

    Infrastructure

    Wu Guo, Yi Li, Wenhui Li,

    Meiying Sun

    Allaoua Maamir, Abdelaziz

    Fellah, Lina A. Salem

    Yong-Nyuo Shin, YongJunLee, Woochang Shin,

    Jin-Young Choi

    16:30~

    16:45

    Cognitive Modeling in Medical

    Pattern Semantic

    Understanding

    Improved Impossible

    Differential Cryptanalysis of

    ARIA

    Use of LFSR for Sensor

    Network Security: A New

    Approach

    Lidia Ogiela, Ryszard

    Tadeusiewicz, Marek OgielaShenhua Li, Chunyan Song

    Kalpana Sharma, Vikash

    Varun, Rohit Kumar, Vikrant

    Jain

    16:45~ An IMS based Inter-Working A Static Java Birthmark A3RP : Anonymous and

  • 8/3/2019 ISA2008 Conference Program

    18/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    17:00

    Solution for Multimedia

    Service in a Converged

    Network

    Based on Operand Stack

    Behaviors

    Authenticated Ad Hoc Routing

    Protocol

    Zhongwen ZhuHeewan Park, Hyun-il Lim,

    Seokwoo Choi, Taisook Han

    Jung Ha Paik, Bum Han Kim,

    Dong Hoon Lee

    17:00~

    17:15

    OPTIMAL REQUANTIZERSELECTION FOR MPEG-4

    VIDEO

    A Unified Threat Model forAssessing Threat in Web

    Applications

    Secure authentication onWiMAX with Neural

    Cryptography

    Anand B. Deshpande, Hemant

    V. KamatXiaohong Li, Ke He Dong Hu, YuYan Wang

    17:15~

    17:30

    Video customization system

    using Mpeg standards

    Implicit Detection of Hidden

    Processes with a

    Local-Booted Virtual Machine

    Strategic Planning for

    Information Security and

    Assurance

    Svetlana Kim, Yong-Ik YoonYan Wen, Jinjing Zhao,

    Huaimin WangDaniel Port

    17:30~

    17:45

    Genetic Algorithm for ShortestDriving Time in Intelligent

    Transportation Systems

    Windows Registry and Hiding

    Suspects Secret in Registry

    Catalog of Metrics for

    Assessing Security Risks ofSoftware throughout the

    Software Development Life

    Cycle

    Chu-Hsing Lin, Jung-Chun

    Liu, Jui-Ling Yu, Chia-Jen LiYoungsoo Kim, Dowon Hong

    Khalid Sultan, Abdeslam

    En_Nouaary, Abdelwahab

    Hamou-Lhadj

  • 8/3/2019 ISA2008 Conference Program

    19/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    April 25th, 2008Registration Open 08:30 ~

    09:00~

    11:00

    Technical SessionSession 14 Session 15 Session 16

    ISA 2008 General ISA 2008 General AMSE + SPPCWai Chi Fang Byeongho Kang Byoung-soo Koh

    Pado Hall Bada Hall TaeJongDae Hall

    09:00~

    09:15

    Live Forensic Analysis of a

    Compromised Linux System

    Using LECT (Linux Evidence

    Collection Tool)

    Design and Implementation

    for EPC System Method to

    Authentication and

    Cryptography

    A Traffic Analysis of

    Authentication Methods for

    Proxy Mobile IPv6

    Joonho Choi, Antonio Savoldi,

    Paolo Gubian, Seohkee Lee,Sangjin Lee

    Dae-jung Kim, Jeong-jai Kim,

    Seung-min Lee, Moon-seogJun

    Jong-Hyouk Lee, Tai-Myoung

    Chung

    09:15~

    09:30

    A Novel Reputation Model for

    Mobile Agent-Based

    E-Commerce Systems

    Cryptographic key

    management for SCADA

    systems - issues and

    perspectives

    EXCEPTION-AWARE DIGITAL

    RIGHTS MANAGEMENT

    ARCHITECTURE

    EXPERIMENTATION

    Zaobin Gan, Yijie LiLudovic Pietre-Cambacedes,

    Pascal Sitbon

    Jean-Henry Morin, Michel

    Pawlak

    09:30~

    09:45

    A Rapid and Efficient

    Pre-deployment Key Scheme

    for Secure Data

    Transmissions in SensorNetworks Using Lagrange

    Interpolation Polynomial

    Smart Card-Based

    Three-Party Key Exchange

    without Server's Assistance

    An Authentication Mechanism

    of Digital Contents in

    Pervasive ComputingEnvironment

    Hua-Yi Lin, De-Jun Pan,

    Zhi-Ren Qiu

    Yong Hun Kim, Taek Young

    Youn, Young Ho Park, Seok

    Hee Hong

    Eun-Gyeom Jang, Yong-Rak

    Choi

    09:45~

    10:00

    An Organizational Framework

    for Building Secure Software

    Anomaly Detection Using

    LibSVM Training Tools

    A Study on an Effective

    Group Management Scheme

    for Secure Multicast

    Transmission in MIPv6

    Abdelwahab Hamou-Lhadj, Chu-Hsing Lin, Jung-Chun Hoon Ko, Yong-Jun Lee,

  • 8/3/2019 ISA2008 Conference Program

    20/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Abdelkrim Hamou-Lhadj Liu, Chia-Han HoKyung-Sang Sung, Hae-Seok

    Oh and Yongtae Shin

    10:00~

    10:15

    Detection of Hidden

    Information in Forensic Tools

    E-commerce and E-commerce

    Fraud in Saudi Arabia

    Security Engineering in IT

    Governance for University

    Information System

    Yeog Kim, Jewan Bang,Sangjin Lee, Jongin Lim

    Saleh Alfuraih Ho-Yeol Kwon

    10:15~

    10:30

    Deciding Optimal Entropic

    Thresholds to Calibrate the

    Detection Mechanism for

    Variable Rate DDoS Attacks

    in ISP Domain

    Implementation and Automatic

    Testing for Security

    Enhancement of Linux Based

    on Least Privilege

    Performance Analysis of

    STBC Based on STTC

    System

    Anjali Sardana, Ramesh JoshiGaoshou Zhai, Jie Zeng,

    Miaoxia Ma, Liang Zhang

    Chulgyu Kang, Changheon

    Oh

    10:30~

    10:45

    CRYPTEX Model for Software

    Source code

    S3PR: Secure Serverless

    Search Protocols for RFID

    Attribute-based Signature

    Scheme

    ByungRae Cha

    Sheikh Ahamed, FarzanaRahman, Endadul Hoque,

    Fahim Kawsar, Tatsuo

    Nakajima

    Guo Shanqing

    10:45~

    11:00

    A Group Rekeying Scheme

    for Location-aware Sensor

    Networks

    Maximizing Return on Security

    Safeguard Investment with

    Constraint Satisfaction

    MIMO-OFDM for the Better

    Quality Link of Wireless

    Network

    Subir Biswas, Syed Afzal,

    Young-hun Park, Dong-kyoo

    Kim

    Taek Lee, Dohoon Kim, Hoh

    In

    Long Bora, Heau Jo Kang,

    Yoon Ho Kim

    11:00~

    12:00

    Invited Speaking - TaeJongDae HallDr. Byeongho Kang

    Incremental learning method in traffic anomaly detection systems

    12:00~

    13:00Lunch Time

    13:00~

    15:30Technical Session

  • 8/3/2019 ISA2008 Conference Program

    21/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    Session 20 Session 21 Session 22

    ISA 2008 General ISA 2008 General ESRPIHangbae Chang Hai Jin Sang-Soo Yeo

    Pado Hall Bada Hall TaeJongDae Hall

    13:00~

    13:15

    Cyber Criminal Activity

    Analysis Models using Markov

    Chain for Digital Forensics

    Integrated Access Permission:Secure and Simple Policy

    Description by Integration of

    File Access Vector Permission

    Incorporating Security

    Requirements Engineering into

    the Rational Unified Process

    Do Hoon Kim, Hoh InTakuto Yamaguchi, Yuichi

    Nakamura, Toshihiro TabataNancy R. Mead

    13:15~

    13:30

    Password Generation of OTP

    System using Fingerprint

    Features

    Design and Evaluation of a

    Bayesian-filter-based Image

    Spam Filtering Method

    Privacy Preserving

    Collaborative Social Network

    ByungRae Cha, ChulWon KimMasahiro Uemura, Toshihiro

    TabataGary Blosser

    13:30~

    13:45

    Authenticated Group KeyDistribution for Unreliable

    Sensor Networks

    Research on SoftwareDependability Testing Profile

    in Internet Environment

    Privacy Preserving SQL

    Queries

    Hwaseong LeeChangjie Ma, Jing Zhao,

    Guochang Gu, Xiaoyun MaHyun-A Park

    13:45~

    14:00

    Design and Implementation of

    a FAT File System for

    Reduced Cluster Switching

    Overhead

    A Contemporary Technique to

    Guarantee Quality of Service

    (QoS) for Heterogeneous

    Data Traffic

    Network Intrusion Detection

    using Cost-distribution based

    Outlier Detection Scheme

    Moonsoo Choi, Heemin Park,

    Jaewook JeonCALDUWEL NEWTON P Komsit Prakobphol

    14:00~

    14:15

    Towards Optimal Software

    Rejuvenation in Wireless

    Sensor Networks using

    Self-Regenerative Components

    Anonymous and Traceable

    Authentication Scheme using

    Smart Cards

    Privacy Preserving in Jointing

    Recommender Systems

    Sazia Parvin, Dong Seong

    Kim, Jong Sou Park

    Seil Kim, Ji Young Chun,

    Dong Hoon LeeChia-Lung Hsieh

    14:15~

    14:30

    Foot Step Based Person

    Identification Using Histogram

    Similarity and Wavelet

    Decomposition

    Correlating Multi-Step Attack

    and Constructing Attack

    Scenarios Based on Attack

    Pattern Modeling

    Security Applications in

    Dynamic Evolution Systems

  • 8/3/2019 ISA2008 Conference Program

    22/25

  • 8/3/2019 ISA2008 Conference Program

    23/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    2. Conferenc Chiar

    3. Program Chair

    4. President of SERSC

    5. Best Papers Award

    17:30~21:00 Conference Dinner - TaeJongDae Hall

  • 8/3/2019 ISA2008 Conference Program

    24/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    April 26th, 2008Registration Open 08:30 ~

    09:00~

    10:00

    Invited Speaking - TaeJongDae HallDr. Belur V. DasarathyMulti-Source Information Fusion - An Overview in the Context of Information

    Security and Assurance

    10:00~

    12:00

    Technical Session

    Session 26 Session 27

    ISA 2008 General ISA 2008 GeneralLaurence T. Yang Jianhua Ma

    Pado Hall Bada Hall

    10:00~

    10:15

    Security Research on WiMAX with Neural

    Cryptography

    A Comparative Study of RFID Solutions for

    Security and Privacy: POP vs. Previous

    Solutions

    Dong Hu Krishan Sabaragamu Koralalage, Jingde Cheng

    10:15~

    10:30Towards a Security Cockpit

    A Security Engineering Environment Based on

    ISO/IEC Standards:

    Providing Standard, Formal, and Consistent

    Supports for Design,

    Development, Operation, and Maintenance of

    Secure Information Systems

    Nguyen Pham, Loic Baud, Patrick BellotJingde Cheng, Yuichi Goto, Shoichi Morimoto,

    Daisuke Horie

    10:30~

    10:45

    A Model of sharing based multi-agent to

    support adaptive service in ubiquitous

    environment

    Memory-Efficient Fuzzy Fingerprint Vault based

    on the Geometric Hashing

    Hyogun Yoon, Malrey LeeSungju Lee, Daesung Moon, Hanna Choi,

    Yongwha Chung

    10:45~

    11:00

    Teaching Computer Security using Xen in a

    Virtual Environment

    Towards Reliable Trust Management based on

    Structural Trust Scopes of Distributed Roles

    Dong Hu Gang Yin, Ning Zhou, Huaimin Wang

    11:00~ Analyzing the Secure and Energy Efficient An Abnormal Area Scanning for Scalable and

  • 8/3/2019 ISA2008 Conference Program

    25/25

    The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)

    11:15Transmissions of Compressed Fingerprint

    Images using Encryption and WatermarkingEnergy-Efficient SensorNet Fault Management

    Seungwoo Hong, Hakjae Kim, Sungju Lee,

    Yongwha ChungHayoung Oh, Kijoon Chae

    12:00~

    Conference Tour

    Pusan City Tour with Lunch (Half Day Tour)

    - Please visit tour desk : About $60 USD -