isa2008 conference program
TRANSCRIPT
-
8/3/2019 ISA2008 Conference Program
1/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Second International Conference on Information International Conference on Information Security
and Assurance (ISA 2008) will be held on April 24th ~ 26th 2008, in Busan, Korea.
ISA 2008 will be the most comprehensive conference focused on the various aspects of advances
in Information Security and Assurance. The concepts of Security and Assurance are emerging
rapidly as an exciting new paradigm to provide reliable and safe life services.
Our Conference provides a chance for academic and industry professionals to discuss recent
progress in the area of Communication and Networking including modeling, simulation and novel
applications associated with the utilization and acceptance of computing devices and systems.
ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks
(IAN 2007, Jeju-island, Korea, December, 2007)
The goal of this conference is to bring together the researchers from academia and industry as
well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of
Information Technology.
Topics of Conference
The main topics include but will not be limited to:
(Excellent surveying works in these areas are welcome, too.)
1) Security Engineering and Its Application
2) Security and Assurance in Operational Area
3) Security and Assurance in Technology Area
4) Security and Assurance in Commercial Area
5) Security and Assurance in Military Area
6) Others
-
8/3/2019 ISA2008 Conference Program
2/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Welcome Message from the Conference Organizers
Welcome to the 2008 International Conference on Information Security and Assurance (ISA 2008).
On behalf of the conference committees, we thank you for your participation, and hope that you
will enjoy the presentations and social programs offered in this conference.
ISA 2008 will be the most comprehensive conference focused on the various aspects of advances
in Information Security and Assurance. The concepts of Security and Assurance are emerging
rapidly as an exciting new paradigm to provide reliable and safe life services.
Our Conference provides a chance for academic and industry professionals to discuss recent
progress in the area of Communication and Networking including modeling, simulation and novel
applications associated with the utilization and acceptance of computing devices and systems.
ISA2008 is a successor of the 1st International Workshop on Information Assurance in Networks
2007, Jeju-island, Korea, December, 2007)The goal of this conference is to bring together the
researchers from academia and industry as well as practitioners to share ideas, problems and
solutions relating to the multifaceted aspects of Information Technology.We are grateful in particular to the following speakers who kindly accepted our invitation and,
in this way, helped to meet the objectives of the conference:
Belur V. Dasarathy Information Fusion Technologies Consultant
Byeongho Kang University of Tasmania
The success of ISA 2008would not have been possible without the huge support from our
sponsors and the work of our chairs, and these are listed in the following pages. Moreover, we
would like to thank the 5th International Workshop, AMSE 2008 chairs and the special sessions
SPPC 2008 and ESRPI 2008 organizers for contributions that have added variety to the topicsrepresented.
With best regards,
Hong-Sub Lee (Soonchunhyang University, Korea)
Tai-hoon Kim (Hannam University, Korea)
Wai Chi Fang (NASA JPL, USA)
Honorary Chair and General Chairs
-
8/3/2019 ISA2008 Conference Program
3/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Welcome Message from the Program Co-chairs
We would like to extend our welcome and express our gratitude to all of the authors of
submitted papers and to all of the attendees, for their contributions and participation.
In ISA 2008, the second international conference, the number of 459 submitted papers it has
attracted is very impressive. The international character of the conference is reflected in the fact
that submissions came from 20 countries.
The submitted abstracts and papers went through a thorough reviewing process. As a result,
122 articles were accepted for the ISA 2008 proceedings published by IEEE, reflecting (but not
limited to) the following areas:
1) Security Engineering and Its Application
- Security Level Definition Criteria and Its Application- Security Requirements Engineering
- Security in System/Software/Product Development Site
- Security in Development Processes
- Security Maturity Model
- Security Evaluation Criteria and Methodology
- New Idea, Theory and Paradigm for Security
- etc
2) Security and Assurance in Operational Area
- Security Policy, Strategy and Management
- Authentication and Identity Management- Security Education and Training
- Personnel Security and Privacy
- Trust Negotiation, Establishment and Management
- Vulnerability, Threat, and Risk Analysis
- etc
3) Security and Assurance in Technology Area
- Agent and Mobile Code Security
- Authorization and Access Control
-
8/3/2019 ISA2008 Conference Program
4/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
- Biometrics Security and Applications
- Computer Forensics
- Cryptographic Protocols
- Data Integrity and Privacy
- Database Security
- Intrusion Detection and Prevention- Distributed System Security
- Key Management and Recovery
- Mobile and Ad hoc network security
- Operating System Security
- Secure Hardware and Software Design
- Smartcards and Chip Security
- RFID, Sensor Network, Ubiquitous Computing Security
- etc
4) Security and Assurance in Commercial Area
- Cell phone, PDA, and Potable Device Security- Biometrics Products and its Applications
- Firewall, IDS, Anti-virus, and other Security Products
- E-Commerce and E-Government Security
- Intellectual Property Protection
- Internet and Web Services Security
- etc
5) Security and Assurance in Military Area
- Information Warfare and Countermeasures
- Cyber-attack and Cyber-terrorism
- Anti-tamper and TEMPEST
- Physical Security and Soldier Security
- E-bomb and Electronic Attack
- Tactical Communication and Network Security
- Sensor-to-shooter/Command Control System Security
- etc
6) Others
-
8/3/2019 ISA2008 Conference Program
5/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Achieving such a high quality of proceedings would have been impossible without the huge
work that was undertaken by the International Program Committee members. We take this
opportunity to thank them for their great support and cooperation.
Sincerely yours,
Deok Gyu Lee (ETRI, Korea)
Kirk P. Arnett (MississippiStateUniversity, U.S.A)
Sajid Hussain (Acadia University, Canada)
Program Chairs
-
8/3/2019 ISA2008 Conference Program
6/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
ISA 2008 is organized by
Honorary Chair:
Hong-Sub Lee (Soonchunhyang University, Korea)
General Co-Chairs:
Tai-hoon Kim (Hannam University, Korea)
Wai Chi Fang (NASA JPL, USA)
Program Co-Chairs:
Deok Gyu Lee (ETRI, Korea)
Kirk P. Arnett (MississippiStateUniversity, USA)
Sajid Hussain (Acadia University, Canada)
Workshop Co-Chairs:
Yan Zhang (Simula Research Laboratory, Norway)
International Advisory Board:
Dianhui Wang (La Trobe University, Australia)
Dominik Slezak (Inforbright, Poland)
Edwin H-M. Sha (University of Texas at Dallas, USA)
Gil-cheol Park (HannamUniversity, Korea)
Haeng-kon Kim (Catholic University of Daegu, Korea)Hai Jin (Huazhong University of Science and Technology, China)
Jong Hyuk Park (Kyungnam University, Korea)
Justin Zhan (Carnegie Mellon University, USA)
Kouichi Sakurai (Kyushu University, Japan)
Kyoil Chung (ETRI, Korea)
Laurence T. Yang (St Francis Xavier University, Canada)
Radu G. Andrei (PluraTech, USA)
Stan Matwin (University of Ottawa, Canada)
Tanya Vladimirova (University of Surrey, UK)
-
8/3/2019 ISA2008 Conference Program
7/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Tony Shan (University of Phoenix, USA)
Tughrul Arslan (Unviersity of Edinburgh, UK)
Publication Co-Chair:
Yong-ik Yoon (Sookmyung Women's University, Korea)
Publicity Co-Chairs:
Antonio Coronato (ICAR-CNR, Italy)
Byung-gyu No (KISA, Korea)
Damien Sauveron (Universit de Limoges/CNRS, France)
Hua Liu (Xerox Corporation, USA)
Kevin Raymond Boyce Butler (Pennsylvania State University, USA)
Seok-soo Kim (Hannam University, Korea)
Soo-Cheol Hwang (Inha Technical College, Korea)
System Management Chair:
Sang-Soo Yeo (Kyushu University, Japan)
-
8/3/2019 ISA2008 Conference Program
8/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Program Committee
Abdelwahab Hamou-Lhadj (Concordia University, Canada)
Ahmet Koltuksuz (Izmir Institute of Technology, Turkey)
Ajay Kumar (Indian Institute of Technology Deihi, India)
Albert Levi (Sabanci university, Turkey)
Andreas Jacobsson (Blekinge Institute of Technology, Sweden)
Arosha Bandara (The Open University, UK)
Audun Josang (QUT, Australia)
Bingyang Zhou (Australian Catholic University, Australia) Bruno Crispo (Faculty of Science,
Netherland)
Carlo Ghezzi (Politecnico di Milano, Italy)
Chantana Chantrapornchai (Silpakorn University, Tailand)
Chengcui Zhang (University of Alabama at Birmingham, UK)
Chin-Laung Lei (National Taiwan University, Taiwan)Chin-Tser Huang (University of South Carolina, USA)
D. Manivannan (University of Kentucky, USA)
Daniel Port (University of Hawaii, USA)
Dharma P. Agrawal (University of Cincinnati, USA)
Edward David Moreno (UEA & BenQ, Manaus, AM, Brazil)
Gerard Damm (Alcatel-Lucent, USA)
Gerald Schaefer (Aston University, UK)
Geyong Min (University of Bradford, UK)
Hakan Duman (British Telecom, UK)
Han-Chieh Chao (National Ilan University I-Lan, Taiwan)Hironori Washizaki (National Institute of Informatics, Japan)
Hongji Yang (De Montfort University, UK)
J. H. Abbawajy (Deakin University, Australia)
Jan deMeer (Brandenburg Technical University, German)
Jari Veijalainen (University of Jyvaskyla, FINLAND)
Javier Garcia Villalba (Complutense University of Madrid, Spain)
Javier Lopez (University of Malaga, Spain)
Jeng-Shyang Pan (National Kaohsiung University of Applied Sciences, Taiwan)
Jiang (Leo) Li (Howard University, USA)
-
8/3/2019 ISA2008 Conference Program
9/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Jonathan I. Maletic (Kent State University, USA)
Jonathan Lee (National Central university, Taiwan)
Jongmoon Baik (ICU, Korea)
Jordi Castell-Roca (Rovira i Virgili University, Spain)
Jordi Forne (University of Catalonia, Spain)
Josef Bigun (Halmstad University, Sweden) Jun Bi (Tsinghua University, China)
Katrin FRANKE (Gjovik University College, Norway)
Kenichi Takahashi (ISIT, Japan)
Kerry Ward (University of Nebraska at Omaha, USA)
Kevin Butler (Pennsylvania State University, USA)
Kiumi Akingbehin (University of Michigan, USA)
Kyung Seok Kim (Chungbuk National University, Korea)
Larbi Esmahi (Athabasca University, Canada)
Luigi Buglione (Atos Origin, Italy)
MalRey LEE (Chonbuk National University, Korea)
Maria Tortorella (Universita' degli studi del sannio, Italy)
Marios Savvides (Carnegie Mellon University, USA)
Martin Drahansky (Brno University of Technology, Czech Republic)
Michael Tunstall (University College Cork, Ireland)
Ning Zhang (University of Manchester, UK)
Nizamettin AYDIN (Bahcesehir University, TURKEY)
Paolo Falcarin (Politecnico di Torino, Italy)
Pierre Dusart (University of Limoges, France)
Pierre-Franois Bonnefoi (University of Limoges, France)
Prabhat K.Mahanti (University of New Brunswick, Canada)
Qi Shi (Liverpool John Moores University, UK)
Rainer Malaka (University of Bremen, German)
Reinhard Schwarz (Fraunhofer IESE, German)
Rob Rittenhouse (McMurry University, USA)
Rodrigo Fernandes de Mello (University of Sao Paulo, Brazil)
Serge Chaumette (University Bordeaux 1, France)
Slobodan Petrovic (Gjovik University College, Norway)
Stan Kurkovsky (Central Connecticut State University, USA)
-
8/3/2019 ISA2008 Conference Program
10/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Stefanos Gritzalis (University of the Aegean, Greece)
Sudhirkumar Barai (Indian Institute of Technology Kharagpur, India)
Thomas M. Gatton (National University, Canada)
Tony Shan (University of Phoenix, USA)
Umberto Villano (Universita' del Sannio, Italy)
Victor Winter (University of Nebraska at Omaha, USA)Vincent Hsu (L1-Identity Solutions, USA)
Yann-Gal Guhneuc (Universit de Montral, Canada)
Yeong Deok Kim (Woosong Univertisy, Korea)
Yoshiaki Hori (Kyushu University, Japan)
Yooyeong Lee (National Institue of Standards and Technology, USA)
-
8/3/2019 ISA2008 Conference Program
11/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Invited Talk
Incremental learning method in traffic anomaly detection systems
Dr. Byeong Ho Kang
Professor, University of Tasmania, Australia
Abstract
Traffic anomaly detection is a standard task for network administration and security systems.
Traffic anomaly is caused by mechanical faults, fraudulent behaviour or human errors. Anomaly
detection is about how to detect the faults or fraud from normal situation (Hodge and Austin,
2004). As people share more information across Internet, many approaches have been proposed to
automate this task.
Many of these approaches attempt to develop a sophisticated model to represent the full range of
normal traffic behaviour. As well as this, the model can be used to identify anomalies. However,
it is not easy to develop such model because it requires large amount of training data and it
does not guarantee that data set covers all normal and abnormal patterns in the domain. In
addition to this, it is more difficult because the domain itself changes rapidly, changing hardware
and software.
In this talk, a different approach using incremental knowledge acquisition method known as
Ripple Down Rules will be introduced as a solution for the development and maintenance of
domain model. RDR assumes that the current model detecting anomaly is always incomplete andshould be updated on the fly. Therefore, human experts should be able to reconstruct or update
the domain model again for newly identified abnormal cases. This seems to be obvious but
traditional expert system studies have shown that this can not be easily done, known as
knowledge acquisition bottleneck. The main problem is how the system can validate and verify
the changes for the new cases.
RDR has been used in various expert system developments and has proven that it can maintain
domain knowledge well regardless of the amount of domain knowledge. It proposed a new
mechanism that ensures the verification and validation process while it is learning a new model.
-
8/3/2019 ISA2008 Conference Program
12/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
The evaluation study shows that it performs as the conventional system does while it provides a
new function, updating a domain model in real time.
About Dr. Byeong Ho Kang
Dr. Byeong Ho Knag is a senior lecturer at the School of Computing, University of Tasmania,Australia and a head of Research and Development of a joint venture company, kmAgent
Pty.Ltd.,Hobart Australia. He received his Ph.D from the University of New South Wales, Sydney
in 1996 and has worked in the Advanced Research Lab. HITACHI, Japan and Hoseo Univerity,
Korea, before he joined the University of Tasmania in 2000. He also has worked in research and
development projects with industries and research organizations, the Smart Internet Collaborative
Research Centre, in Australia, the Asian Office of Aerospace Research Department, US in Japan.
His research includes basic Knowledge Acquisition methods and many applied researches in
Internet systems as well as medical expert systems. His work appears to be one of the few
examples of research that has gone beyond criticizing the dominant assumptions and attempted to
develop and apply different types of systems based on alternate assumptions.
He has been involved in the development of several commercial AI products, an expert system
development tool, an Intelligent Help Desk System, Web based information monitoring and
classification systems, etc. He has been involved in the foundation of several joint venture
companies in Australia and Korea. At present, the Tasmanian State Library is using his Web
monitoring system for the Tasmanian government Web site.
He has published many papers in refereed journals, conference proceedings and book chapters in
these areas and has been involved in many conference and workshops as conference chair or
program committee member. He recently organized the 19th Australian Joint Conference on
Artificial Intelligence 2006 in Hobart, the Pacific Knowledge Acquisition Workshop in China 2006
and in New Zealand 2004.
-
8/3/2019 ISA2008 Conference Program
13/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Invited Talk
Multi-Source Information Fusion
An Overview in the Context of Information Security and Assurance
Dr. Belur V. Dasarathy
Fellow IEEE
Information Fusion Technologies Consultant
Editor-in-Chief, Information Fusion
http://belur.no-ip.com
Abstract
This lecture will offer an introductory overview of the evolving field of Information Fusion with a
view to delineate its role in the context of Information Security and Assurance, the theme of the
conference. The presentation will start with a brief introduction to the field of multi-sensor,
multi-source information fusion and underlying taxonomies touching upon the three facets of
architectures, algorithms, and applications. The Information Security and Assurance Issues have
been addressed in the Information Fusion domain as an intrusion detection problem. Accordingly,
the talk will discuss the role of information fusion in enhancing the performance of intrusion
detection systems as one among the more popular and upcoming application areas.
About Dr. Belur V. Dasarathy
Dr. Belur V. Dasarathy, IEEE Fellow, is an independent consultant serving multiple defense and
commercial clients in the areas of multi-sensor multi-source information fusion, target
discrimination and recognition, pattern recognition, image analysis and other related topics, for the
design and development of automated intelligent decision systems arising in a variety of
strategic/tactical defense-related problems as well as other commercial/ civilian applications. Dr.
Dasarathy has over 175 publications and is the author of three IEEE Computer Society Press
books: Decision Fusion, Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques, and
Image Data Compression: Block Truncation Coding.
-
8/3/2019 ISA2008 Conference Program
14/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
His prior professional affiliations include Distinguished Scientist/Senior Principal Engineer at
Dynetics, Inc.; Senior Technical Manager/Senior System Consultant at Intergraph Corporation;
Computer Scientist at Computer Sciences Corporation; Assistant Professor at Indian Institute of
Science, Visiting Professor at Southern Methodist University, Dallas, Texas; Adjunct Professor at
Univ. of Alabama.
He is the founding (an entrepreneurial accomplishment funded by Elsevier) and current
Editor-in-chief of the International Journal on Information Fusion, published by Elsevier, the very
first journal dedicated to this evolving field. He was one of the key founding members of the
board of directors of the International Society on Information Fusion (ISIF) and served in that
capacity for a couple of years afterwards. He is the organizer and chairman of the annual SPIE
Conferences on Sensor Fusion since 1997 and on data mining, intrusion detection, and network
security since 1999.
He has delivered lectures as keynote invited speaker at very many national and International
Conference including. 2006 IDGA Conference on Night Vision Systems, Washington, DC; 2006
IEEE Intl Conf on Multisensor Fusion and Integration for Intelligent Systems, Germany; 2006
Biologically Inspired Information Fusion, UK; ISSNIP '04 Melbourne, Australia; ICHMI'04,
Bangalore, India; ICCC'04 Vienna, Austria, ICAR 03 Coimbra, Portugal, Fusion Workshop 02 china,
Intl. Conf. on Industrial Technology 2000 - India; SNRAFI 01 - Spain; Workshop on Environmental
Fusion - Sept. 00, Greece, Recpad 00 Portugal; Intl. Conf. on Applications of Pattern Recognition
1998- England, etc., etc.
Dr. Dasarathy was the 1997 IEEE Region 3 Outstanding Engineer, a recipient of the IEEE Third
Millennium Medal, 1996 IEEE Huntsville Section Outstanding Engineer. He was the Chairman of
the First Rocket City Seminar conducted by IEEE Huntsville Section. He was the technical
vice-chair for IEEE Autotestcon 2002. He has organized and chaired special sessions on
Information Fusion and Data Mining at many IEEE sponsored conferences including IEEE Decision
and Control 1998, International Joint Conference on Neural Networks 1999, IGARSS 2000,
IECON-2000, . He has also been on the technical committee of various other IEEE sponsored or
cosponsored conferences on pattern recognition, image processing, International Workshop on
Web-based Support Systems and many other areas too numerous to recall. He was the lead/chair
of data fusion and mining sub-committee under the Intelligent Systems Committee for the IEEE
Industrial Electronics Society.
-
8/3/2019 ISA2008 Conference Program
15/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
April 24th, 2008Registration Open 08:20 ~
09:30~
11:00
Technical SessionSession 1 Session 4 Session 5
MUE 2008 General ISA 2008 General ISA 2008 General Youngsoo Kim Kyung-Hyune Rhee Eun-Jun Yoon
Jinju Hall Pado Hall Bada Hall
09:30~
09:45
Reconfigurable Depth Buffer
Compression Design for 3D
Graphics System
Implementation and Analysis
of New Lightweight
Cryptographic Algorithm
Suitable for Wireless Sensor
Networks
Secure Deniable Authenticated
Key Establishment for Internet
Protocols
Tzung-Rung Jung, Lan-DaVan, Wai-Chi Fang, Teng-Yao
Sheu
Woo Kwon Koo, HwaseongLee, Yong Ho Kim, Dong
Hoon Lee
Meng-Hui Lim, Sanggon Lee,Youngho Park, Sangjae Moon
09:45~
10:00
A Video Sharing Platform with
Data Grid Technology for
Mobile Devices
Integrating Trust and Role for
Secure Interoperation in
Multi-Domain Environment
Combined ANN and
Lagrangian Relaxation Method
for Unit Commitment
Scheduling
Chao-Tung Yang, Chun-Jen
Chen, Chien-Jung Huang,
Hung-Yen Chen
Jianfeng Lu, Ruixuan Li,
Zhengding Lu
Zhen Liu, Ning Tan, Jinsong
Han
10:00~
10:15
A Performance-Effective and
High-Scalable Grid FileSystem
Experimental Evaluation of
Different Intensity Distributionsfor Palmprint Identification
Secure Deniable
Authentication Protocol Basedon ElGamal Cryptography
Chin-Chen Chu, Ching-Hsien
Hsu
Yanqiang Zhang, Zhengding
Qiu, Dongmei Sun
Eun-Jun Yoon, Kee-Young
Yoo
10:15~
10:30
Intelligent security for
inter-space surveillance
applications
SSDR - Reconfigurable
Firewall: Reconfiguration
Model Impact
An Intrusion Detection System
in Mobile AdHoc networks
Geon-Woo Kim, Jong-Wook
Han, Sang-Wook Kim
Fabio Dacencio Pereira,
Edward David Moreno
Ordonez, Cesar Giacomini
Penteado, Fernando Augusto
SaniKommu Madhavi
-
8/3/2019 ISA2008 Conference Program
16/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Garcia Muzzi
10:30~
10:45
FMCS: A File Replication and
Consistency Strategy in Data
Grids
Information leakage via
electromagnetic emanation
and effectiveness of averaging
technique
A Security Protocol Compiler
Generating C Source Codes
Chao-Tung Yang, Chun-PinFu, Chien-Jung Huang,
Ching-Hsien Hsu
Hidema TanakaShinsaku Kiyomoto, Haruki
Ota, Toshiaki Tanaka
10:45~
11:00
Optimized Implementation of
Ray Tracing on Cell
Broadband Engine
A Forward-Secure Signature
with Backward-Secure
Detection
Improvement of a
Fingerprint-Based Remote
User Authentication Scheme
Bo Li, Hai Jin, Zhiyuan Shao,
Yong Li, Xin LiuDai-Rui Lin, Chih-I Wang
Jing Xu, Wentao Zhu,
Dengguo Feng
11:00~
12:00
Invited Speaking - Jinju HallDr. Han-Chieh Chao
Cross-Layer Design in 3G Wireless Networks and Beyond
12:00~
13:00Lunch Time
13:00~
14:00
Invited Speaking - Jinju HallDr. Stephen S. Yau
Development of Adaptive Service-based Systems in Ubiquitous Computing
Environments
14:00~
15:00
Invited Speaking - Jinju HallDr. Hyoung Joong Kim
Multimedia Hashes for Ubiquitous Applications
15:00~
15:30Coffee Break
15:30~
17:45Technical Session
-
8/3/2019 ISA2008 Conference Program
17/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Session 6 Session 9 Session 10
ISA 2008 General ISA 2008 General ISA 2008 GeneralHan-Chieh Chao Yeong-Deok Kim Kee-Young Yoo
Jinju Hall Pado Hall Bada Hall
15:30~
15:45
A new forensic image format
for high capacity disk storage
Breaking a Smart Card basedSecure Password
Authentication Scheme
IDEA: A New Intrusion
Detection Data Source
Sang Su Lee, Tae-Sik Park,
Sang-Uk Shin, Sung-Kyong
Un, Do-Won Hong
Eun-Jun Yoon, Kee-Young
Yoo
William Mahoney, William
Sousan
15:45~
16:00
InvestigatingWireless Sensor
Network Lifetime using a
Realistic Radio
Communication Model
A Survey for Open Shortest
Path First Weight Setting
(OSPFWS) Problem
Incident-driven memory
snapshot for full-virtualized OS
using interruptive debugging
techniques
Michael Mallinson, Sajid
Hussain, Jong Hyuk Park
Ahmed Abo Ghazala, Ayman
El Sayed
Ruo Ando, Youki
Kadobayashi, Youichi Shinoda
16:00~
16:15
UMOST : Ubiquitous
Multimedia Framework for
Context-aware Session
Mobility
Secure Delegation Model
based on SAML in Ubiquitous
Environments
Collaborative Privacy
Management System
YongJu LeeKyu Il Kim, Hae Kyung Lee,
Ung Mo Kim
InJoo Jang, Hyeong Seon
Yoo
16:15~
16:30
IMAGE-BASED MODELING
OF VIRTUAL PAGODA OF
CHINA
Fine Granulation Access
Rights for Information Flow
Control in Object Oriented
Systems
Biometric Handshake Protocol
on Telebiometric System
Mechanism for National
Infrastructure
Wu Guo, Yi Li, Wenhui Li,
Meiying Sun
Allaoua Maamir, Abdelaziz
Fellah, Lina A. Salem
Yong-Nyuo Shin, YongJunLee, Woochang Shin,
Jin-Young Choi
16:30~
16:45
Cognitive Modeling in Medical
Pattern Semantic
Understanding
Improved Impossible
Differential Cryptanalysis of
ARIA
Use of LFSR for Sensor
Network Security: A New
Approach
Lidia Ogiela, Ryszard
Tadeusiewicz, Marek OgielaShenhua Li, Chunyan Song
Kalpana Sharma, Vikash
Varun, Rohit Kumar, Vikrant
Jain
16:45~ An IMS based Inter-Working A Static Java Birthmark A3RP : Anonymous and
-
8/3/2019 ISA2008 Conference Program
18/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
17:00
Solution for Multimedia
Service in a Converged
Network
Based on Operand Stack
Behaviors
Authenticated Ad Hoc Routing
Protocol
Zhongwen ZhuHeewan Park, Hyun-il Lim,
Seokwoo Choi, Taisook Han
Jung Ha Paik, Bum Han Kim,
Dong Hoon Lee
17:00~
17:15
OPTIMAL REQUANTIZERSELECTION FOR MPEG-4
VIDEO
A Unified Threat Model forAssessing Threat in Web
Applications
Secure authentication onWiMAX with Neural
Cryptography
Anand B. Deshpande, Hemant
V. KamatXiaohong Li, Ke He Dong Hu, YuYan Wang
17:15~
17:30
Video customization system
using Mpeg standards
Implicit Detection of Hidden
Processes with a
Local-Booted Virtual Machine
Strategic Planning for
Information Security and
Assurance
Svetlana Kim, Yong-Ik YoonYan Wen, Jinjing Zhao,
Huaimin WangDaniel Port
17:30~
17:45
Genetic Algorithm for ShortestDriving Time in Intelligent
Transportation Systems
Windows Registry and Hiding
Suspects Secret in Registry
Catalog of Metrics for
Assessing Security Risks ofSoftware throughout the
Software Development Life
Cycle
Chu-Hsing Lin, Jung-Chun
Liu, Jui-Ling Yu, Chia-Jen LiYoungsoo Kim, Dowon Hong
Khalid Sultan, Abdeslam
En_Nouaary, Abdelwahab
Hamou-Lhadj
-
8/3/2019 ISA2008 Conference Program
19/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
April 25th, 2008Registration Open 08:30 ~
09:00~
11:00
Technical SessionSession 14 Session 15 Session 16
ISA 2008 General ISA 2008 General AMSE + SPPCWai Chi Fang Byeongho Kang Byoung-soo Koh
Pado Hall Bada Hall TaeJongDae Hall
09:00~
09:15
Live Forensic Analysis of a
Compromised Linux System
Using LECT (Linux Evidence
Collection Tool)
Design and Implementation
for EPC System Method to
Authentication and
Cryptography
A Traffic Analysis of
Authentication Methods for
Proxy Mobile IPv6
Joonho Choi, Antonio Savoldi,
Paolo Gubian, Seohkee Lee,Sangjin Lee
Dae-jung Kim, Jeong-jai Kim,
Seung-min Lee, Moon-seogJun
Jong-Hyouk Lee, Tai-Myoung
Chung
09:15~
09:30
A Novel Reputation Model for
Mobile Agent-Based
E-Commerce Systems
Cryptographic key
management for SCADA
systems - issues and
perspectives
EXCEPTION-AWARE DIGITAL
RIGHTS MANAGEMENT
ARCHITECTURE
EXPERIMENTATION
Zaobin Gan, Yijie LiLudovic Pietre-Cambacedes,
Pascal Sitbon
Jean-Henry Morin, Michel
Pawlak
09:30~
09:45
A Rapid and Efficient
Pre-deployment Key Scheme
for Secure Data
Transmissions in SensorNetworks Using Lagrange
Interpolation Polynomial
Smart Card-Based
Three-Party Key Exchange
without Server's Assistance
An Authentication Mechanism
of Digital Contents in
Pervasive ComputingEnvironment
Hua-Yi Lin, De-Jun Pan,
Zhi-Ren Qiu
Yong Hun Kim, Taek Young
Youn, Young Ho Park, Seok
Hee Hong
Eun-Gyeom Jang, Yong-Rak
Choi
09:45~
10:00
An Organizational Framework
for Building Secure Software
Anomaly Detection Using
LibSVM Training Tools
A Study on an Effective
Group Management Scheme
for Secure Multicast
Transmission in MIPv6
Abdelwahab Hamou-Lhadj, Chu-Hsing Lin, Jung-Chun Hoon Ko, Yong-Jun Lee,
-
8/3/2019 ISA2008 Conference Program
20/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Abdelkrim Hamou-Lhadj Liu, Chia-Han HoKyung-Sang Sung, Hae-Seok
Oh and Yongtae Shin
10:00~
10:15
Detection of Hidden
Information in Forensic Tools
E-commerce and E-commerce
Fraud in Saudi Arabia
Security Engineering in IT
Governance for University
Information System
Yeog Kim, Jewan Bang,Sangjin Lee, Jongin Lim
Saleh Alfuraih Ho-Yeol Kwon
10:15~
10:30
Deciding Optimal Entropic
Thresholds to Calibrate the
Detection Mechanism for
Variable Rate DDoS Attacks
in ISP Domain
Implementation and Automatic
Testing for Security
Enhancement of Linux Based
on Least Privilege
Performance Analysis of
STBC Based on STTC
System
Anjali Sardana, Ramesh JoshiGaoshou Zhai, Jie Zeng,
Miaoxia Ma, Liang Zhang
Chulgyu Kang, Changheon
Oh
10:30~
10:45
CRYPTEX Model for Software
Source code
S3PR: Secure Serverless
Search Protocols for RFID
Attribute-based Signature
Scheme
ByungRae Cha
Sheikh Ahamed, FarzanaRahman, Endadul Hoque,
Fahim Kawsar, Tatsuo
Nakajima
Guo Shanqing
10:45~
11:00
A Group Rekeying Scheme
for Location-aware Sensor
Networks
Maximizing Return on Security
Safeguard Investment with
Constraint Satisfaction
MIMO-OFDM for the Better
Quality Link of Wireless
Network
Subir Biswas, Syed Afzal,
Young-hun Park, Dong-kyoo
Kim
Taek Lee, Dohoon Kim, Hoh
In
Long Bora, Heau Jo Kang,
Yoon Ho Kim
11:00~
12:00
Invited Speaking - TaeJongDae HallDr. Byeongho Kang
Incremental learning method in traffic anomaly detection systems
12:00~
13:00Lunch Time
13:00~
15:30Technical Session
-
8/3/2019 ISA2008 Conference Program
21/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
Session 20 Session 21 Session 22
ISA 2008 General ISA 2008 General ESRPIHangbae Chang Hai Jin Sang-Soo Yeo
Pado Hall Bada Hall TaeJongDae Hall
13:00~
13:15
Cyber Criminal Activity
Analysis Models using Markov
Chain for Digital Forensics
Integrated Access Permission:Secure and Simple Policy
Description by Integration of
File Access Vector Permission
Incorporating Security
Requirements Engineering into
the Rational Unified Process
Do Hoon Kim, Hoh InTakuto Yamaguchi, Yuichi
Nakamura, Toshihiro TabataNancy R. Mead
13:15~
13:30
Password Generation of OTP
System using Fingerprint
Features
Design and Evaluation of a
Bayesian-filter-based Image
Spam Filtering Method
Privacy Preserving
Collaborative Social Network
ByungRae Cha, ChulWon KimMasahiro Uemura, Toshihiro
TabataGary Blosser
13:30~
13:45
Authenticated Group KeyDistribution for Unreliable
Sensor Networks
Research on SoftwareDependability Testing Profile
in Internet Environment
Privacy Preserving SQL
Queries
Hwaseong LeeChangjie Ma, Jing Zhao,
Guochang Gu, Xiaoyun MaHyun-A Park
13:45~
14:00
Design and Implementation of
a FAT File System for
Reduced Cluster Switching
Overhead
A Contemporary Technique to
Guarantee Quality of Service
(QoS) for Heterogeneous
Data Traffic
Network Intrusion Detection
using Cost-distribution based
Outlier Detection Scheme
Moonsoo Choi, Heemin Park,
Jaewook JeonCALDUWEL NEWTON P Komsit Prakobphol
14:00~
14:15
Towards Optimal Software
Rejuvenation in Wireless
Sensor Networks using
Self-Regenerative Components
Anonymous and Traceable
Authentication Scheme using
Smart Cards
Privacy Preserving in Jointing
Recommender Systems
Sazia Parvin, Dong Seong
Kim, Jong Sou Park
Seil Kim, Ji Young Chun,
Dong Hoon LeeChia-Lung Hsieh
14:15~
14:30
Foot Step Based Person
Identification Using Histogram
Similarity and Wavelet
Decomposition
Correlating Multi-Step Attack
and Constructing Attack
Scenarios Based on Attack
Pattern Modeling
Security Applications in
Dynamic Evolution Systems
-
8/3/2019 ISA2008 Conference Program
22/25
-
8/3/2019 ISA2008 Conference Program
23/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
2. Conferenc Chiar
3. Program Chair
4. President of SERSC
5. Best Papers Award
17:30~21:00 Conference Dinner - TaeJongDae Hall
-
8/3/2019 ISA2008 Conference Program
24/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
April 26th, 2008Registration Open 08:30 ~
09:00~
10:00
Invited Speaking - TaeJongDae HallDr. Belur V. DasarathyMulti-Source Information Fusion - An Overview in the Context of Information
Security and Assurance
10:00~
12:00
Technical Session
Session 26 Session 27
ISA 2008 General ISA 2008 GeneralLaurence T. Yang Jianhua Ma
Pado Hall Bada Hall
10:00~
10:15
Security Research on WiMAX with Neural
Cryptography
A Comparative Study of RFID Solutions for
Security and Privacy: POP vs. Previous
Solutions
Dong Hu Krishan Sabaragamu Koralalage, Jingde Cheng
10:15~
10:30Towards a Security Cockpit
A Security Engineering Environment Based on
ISO/IEC Standards:
Providing Standard, Formal, and Consistent
Supports for Design,
Development, Operation, and Maintenance of
Secure Information Systems
Nguyen Pham, Loic Baud, Patrick BellotJingde Cheng, Yuichi Goto, Shoichi Morimoto,
Daisuke Horie
10:30~
10:45
A Model of sharing based multi-agent to
support adaptive service in ubiquitous
environment
Memory-Efficient Fuzzy Fingerprint Vault based
on the Geometric Hashing
Hyogun Yoon, Malrey LeeSungju Lee, Daesung Moon, Hanna Choi,
Yongwha Chung
10:45~
11:00
Teaching Computer Security using Xen in a
Virtual Environment
Towards Reliable Trust Management based on
Structural Trust Scopes of Distributed Roles
Dong Hu Gang Yin, Ning Zhou, Huaimin Wang
11:00~ Analyzing the Secure and Energy Efficient An Abnormal Area Scanning for Scalable and
-
8/3/2019 ISA2008 Conference Program
25/25
The 2nd International Conference on InformationSecurity and Assurance (ISA 2008)
11:15Transmissions of Compressed Fingerprint
Images using Encryption and WatermarkingEnergy-Efficient SensorNet Fault Management
Seungwoo Hong, Hakjae Kim, Sungju Lee,
Yongwha ChungHayoung Oh, Kijoon Chae
12:00~
Conference Tour
Pusan City Tour with Lunch (Half Day Tour)
- Please visit tour desk : About $60 USD -