Personal tools
You are here: Home Program SAM'09: July 16, 2009 Schedule
Current Event
Click Here
Other Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'06 & '07
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


SAM'09: July 16, 2009 Schedule

Last modified 2009-06-20 16:18

To select a different schedule CLICK HERE

6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)

                  Co-Chairs: Dr. Alex Hai Wang* and Mouncef Lahlou**
                  *The Pennsylvania State University, USA
                  **Florida International University, Miami, Florida, USA
                  July 16, 2009 (Thursday); 08:00am - 10:00am
                  (LOCATION: Ballroom 8)

08:00 - 08:20am:  Investigation of Computer Security and Ethics Awareness
                  in University Environment
                  Max North, Greg Quinet, Robert Thacker, DeAnthony Perryman,
                  John Crunk, and Sarah North
                  Southern Polytechnic State University 

08:20 - 08:40am:  A Stochastic Model of the Damage Propagation in Database Systems
                  Alex Hai Wang and Su Yan
                  Pennsylvania State University, USA

08:40 - 09:00am:  A Translation Of NIST Security Controls Into DBMS Security
                  Procedures (FISMA Compliance)
                  Michael Pollard, Gejuan Clements, Max M. North, Sarah M. North
                  Southern Polytechnic State University 

09:00 - 09:20am:  Steganographic System with Dynamically Reconfigurable Structure
                  Gevorg Margarov, Vahan Markarov and Ashot Khachaturov
                  State Engineering University of Armenia, Armenia

09:20 - 09:40am:  MLET: A Contribution to the Establishment of Trust Within
                  Virtual Enterprises
                  Michel Kamel, Romain Laborde, Francois Barrere, Abdelmalek Benzekri
                  Universite Paul Sabatier, France

09:40 - 10:00am:  Adaptive Risk-Aware Application-Level Access Control
                  Hassan Rasheed and Randy Y. C. Chow
                  University of Florida, Gainesville, Florida, USA

10:00 - 10:20am:  BREAK

                  Co-Chairs: Drs. Jong Hyuk Park, Changhoon Lee, Yan Zhang, Liudong Xing
                  Kyungnam U. & Korea U. & Simula Research Lab., Norway &
                  University of Massachsetts - Dartmouth, USA
                  July 16, 2009 (Thursday); 10:20am - 11:20am
                  (LOCATION: Ballroom 8)

10:20 - 10:40am:  The Detection and Response Mechanism Against Abnormal IPv6
                  Traffic Attack in Real-Time Network
                  Seung-Hee Oh, Deok Gyu Lee, Jongwook Han, Jong Hyuk Park
                  Convergence Service Security Research Team, ETRI, Korea

10:40 - 11:00am:  Fingerprint Based Secure Authentication Protocol Using OTP
                  in e-Banking
                  Wan S Yi, Woong Go, Soo-kyun Kim, Dongho Won, Jin Kwak
                  Soonchunhyang University, Korea

11:00 - 11:20am:  Security and Efficiency Analyses of Security Mechanisms in
                  e-Passport Systems
                  Wan S. Yi, Dongbum Lee, Min Hong, Dongho Won, Jin Kwak
                  Soonchunhyang University, Korea

                  Chair: Prof. Kevin Daimi, University of Detroit Mercy, Michigan, USA
                  July 16, 2009 (Thursday); 11:20am - 12:40pm
                  (LOCATION: Ballroom 8)

11:20 - 11:40am:  On the Security and Efficiency of Secure Channel Coding
                  Schemes Based on Punctured Codes
                  Ali Akbar Sobhi Afshar, Alireza Sharifi, Taraneh Eghlidos
                  University of Texas, Dallas, Texas, USA & Sharif University
                  of Science and Technology, Iran

11:40 - 12:00pm:  Biometric Fuzzy Extractor Scheme for Iris Templates
                  F. Hernandez A'lvarez, C. Sa'nchez A'vila, L. Herna'ndez Encinas
                  UPM, Spain

12:00 - 12:20pm:  A Study on Multi-Recipient Encryption For Selective Disclosure
                  Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko

12:20 - 12:40pm:  Graphic Multisecret Sharing Schemes with One-Dimensional
                  Cellular Automata
                  R. Dura'n D'iaz, F. Herna'ndez A'lvarez, L. Herna'ndez Encinas

12:40 - 01:20pm:  LUNCH (On Your Own)

                  Co-Chairs: Dr. Huiping Guo* and Dr. S. C. Chiemeke**
                  *California State University at Los Angeles, California, USA
                  **University of Benin, Benin City, Nigeria
                  July 16, 2009 (Thursday); 01:20pm - 02:00pm
                  (LOCATION: Ballroom 8)

01:20 - 01:40pm:  Multiple Watermarking for Relational Data
                  Madhavi Nidamarthy, Huiping Guo
                  California State University at Los Angeles, California, USA

01:40 - 02:00pm:  On the Randomness and Regularity of Reduced EDON-R Compression Function
                  Rune Steinsmo Odegard and Danilo Gligoroski
                  Norwegian University of Science and Technology in Trondheim, Norway

                  Co-Chairs: Dr. Andrew Woodward + Dr. Patricia A. H. Williams
                  Edith Cowan University, Western Australia
                  July 16, 2009 (Thursday); 02:00pm - 04:40pm
                  (LOCATION: Ballroom 8)

02:00 - 02:20pm:  Fun and Games: An Introduction to Console Forensics
                  Peter Hannay
                  Edith Cowan University, Western Australia

02:20 - 02:40pm:  Firewire Forensics in Modern Operating Systems
                  Peter Hannay and Andrew Woodard
                  Edith Cowan University, Western Australia

02:40 - 03:00pm:  What Evidence Do BitTorrent Clients Leave Behind Under Windows 7?
                  Andrew Woodward
                  Edith Cowan University, Western Australia

03:00 - 03:20pm:  BREAK

03:20 - 03:40pm:  The 2008 Analysis of Information Remaining on Disks Purchased
                  on the Second Hand Market in Europe
                  Andy Jones
                  Edith Cowan University, Western Australia

03:40 - 04:00pm:  SCADA - Slowly Circling a Disaster Area
                  Craig Valli and Andrew Woodward
                  Edith Cowan University, Western Australia

04:00 - 04:20pm:  Snort IDS for SCADA Networks
                  Craig Valli
                  Edith Cowan University, Western Australia

04:20 - 04:40pm:  A Lack of Risk Recognition for Medical Information Security
                  in General Practice
                  Patricia A. H. Williams
                  Edith Cowan University, Western Australia

                  (There may be a number of no-shows in this category.)
                  Chair: Prof. Vladimir Zaborovsky, Politechnical University, St. Petersburg, Russia
                  July 16, 2009 (Thursday); 04:40pm - 07:20pm
                  (LOCATION: Ballroom 8)

04:40 - 05:00pm:  Mitigating DNS Amplification Attacks
                  Basheer Al-Duwairi
                  Jordan University of Science and Technology, Jordan

05:00 - 05:20pm:  The Development of a Security Engineering Course at Tuskegee University
                  Muhammad Ali, Deepthi Jangum
                  Tuskegee University, Tuskegee, Alabama, USA

05:20 - 05:40pm:  Specialized Solution for Improvement of Firewall Performance and
                  Conformity to Security Policy
                  Vladimir Zaborovsky, Anton Titov
                  Saint-Petersburg State Polytechnical University, Russia

05:40 - 06:00pm:  Data Protection in Object-Based Storage Devices
                  Zhiqian Xu and Hai Jiang
                  FedEx Corporation, USA & Arkansas State University, USA

06:00 - 06:20pm:  Detection of Specific Semantic Functionalities, Such as
                  Self-Replication Mechanism, in Malware Using Colored Petri Nets
                  Arnur Tokhtabayev, Victor Skormin, Andrey Dolgikh, M. Beisenbi,
                  and M. Kargaldayeva
                  Center for Advanced Inf. Tech., Binghamton University, NY, USA &
                  Eurasian National University, Astana, Kazakhstan

06:20 - 06:40pm:  Accurate and Fast Automated Detection for Zero-Day Polymorphic Worms
                  Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura,
                  Mohsin Hashim, and Izzeldin Amin
                  University of Cape Town, South Africa

06:40 - 07:00pm:  Proposed New Quantum Cryptography System Using Quantum
                  Description techniques for Generated Curves
                  Hala Bahjat AbdulWahab, Abdul Monem S. Rahma, Hilal M. Yousif Al-Bayatti
                  University of Technology, Baghdad, Iraq &
                  Applied Science University, Kingdom of Bahrain

07:00 - 07:20pm:  FREE SLOT

To select a different schedule CLICK HERE

Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)