Personal tools
  •  
You are here: Home Program SAM'10: July 13, 2010 Schedule

SAM'10: July 13, 2010 Schedule

Last modified 2010-06-29 19:58

To select a different schedule CLICK HERE


6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)


SESSION 2-SAM:    APPLICATIONS AND NOVEL METHODOLOGIES
                  Chair: Prof. Susan Lincke, University of Wisconsin-Parkside, Wisconsin, USA
                  July 13, 2010 (Tuesday); 08:00am - 10:20am
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  A Framework for Smart Trusted Indicators for Browsers (STIB)
                  Jude Desti and Hongmei Chi
                  Florida A&M University, Florida, USA

08:20 - 08:40am:  A First Step Towards Automated Permission-enforcement Analysis
                  of the Android Framework
                  Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
                  KDDI R&D Laboratories, Inc., Japan

08:40 - 09:00am:  Mapping of the Traffics of IP-Packets on 2-dimensional Plane
                  Using Pareto Learning SOM
                  Hiroshi Dozono, Takeru Kabashima, Masanori Nakakuni
                  Saga University, Japan;  Fukuoka University, Japan

09:00 - 09:20am:  All About Malware - Malicious Codes
                  Hossein Rouhani Zeidanloo
                  Universiti Teknology Malaysia, Malaysia

09:20 - 09:40am:  Laser Printer Source Forensics For Arbitrary Chinese Characters
                  Xiangwei Kong, Xin'gang You, Bo Wang, Shize Shang, Linjie Shen
                  Dalian University of Technology, Dalian, P. R. China;
                  Beijing Institute of Electronic Technology & Application, P. R. China

09:40 - 10:00am:  Development Document Framework of IT Security Products for CC
                  Hee-Bong Choi, Keon-Woo Kang, Hac-Yun Na, Il-Jun Kim
                  The Attached Institute of ETRI, Korea

10:00 - 10:20am:  Computer Ethics - Review of Global Perspective
                  Meysam Namayandeh, Hamed Taherdoost, Neda Jalaliyoon
                  Universiti Teknologi Malaysia, Malaysia

10:20 - 10:40am:  BREAK


SESSION 3-SAM:    CRYPTOGRAPHY + KEY MANAGEMENT STRATEGIES
                  Co-Chairs: Dr. Karen Lu* and Prof. Xiaowen Zhang**
                  *Gemalto, Inc., USA / **The City University of New York, USA
                  July 13, 2010 (Tuesday); 10:40am - 12:40pm
                  (LOCATION: Ballroom 6)

10:40 - 11:00am:  Applying Hash Functions in the Latin Square Based Secret Sharing Schemes
                  Chi Sing Chum and Xiaowen Zhang
                  College of Staten Island, City University of New York, New York, USA

11:00 - 11:20am:  Node Base Interpretative Key Management Framework
                  Saman Shojae Chaeikar and Mazdak Zamani
                  Centre for Advanced Software Engineering, Universiti Technologi
                  Malaysia, Malaysia

11:20 - 11:40am:  A New Scheme for Hash Function Construction
                  Chi Sing Chum and Xiaowen Zhang
                  College of Staten Island, City University of New York, New York, USA

11:40 - 12:00pm:  A Quantum Key Distribution Protocol
                  P. K. Lala
                  Texas A&M University-Texarkana, Texas, USA

12:00 - 12:20pm:  Password Hardening Using Keystroke Dynamics
                  Ansab Ijaz, Arslan Javed, Saad Aman Chaudhry, Syed Annas Shah
                  GIK Institute of Engineering Sciences and Technology, Swabi, Pakistan

12:20 - 12:40pm:  Symmetric Key Cryptography Using Random Key Generator
                  Meheboob Alam Mallik, Saima Ghosh, Asoke Nath
                  St. Xavier's College, India

12:40 - 01:20pm:  LUNCH (On Your Own)


SESSION 4-SAM:    NETWORK & SOFTWARE PROTECTION STRATEGIES + DATA/INFORMATION SECURITY
                  + POLICY ISSUES
                  Co-Chairs: Dr. Duke Hutchings, Elon University, USA &
                             Dr. Karen Lu, Gemalto, Inc., USA
                  July 13, 2010 (Tuesday); 01:20pm - 03:00pm
                  (LOCATION: Ballroom 6)

01:20 - 01:40pm:  Protecting Resource-Constrained Network Devices from
                  Denial-of-Service Attacks
                  H. Karen Lu
                  Gemalto, Inc., Austin, Texas, USA

01:40 - 02:00pm:  Outsourcing Your Data Warehouse and Business Intelligence
                  Activities; Is your Data Safe?
                  Errol A. Blake, Victor Clincy, Godwin Fumey-Nassah
                  Kennesaw State University, Kennesaw, Georgia, USA

02:00 - 02:20pm:  Governance, Risk and Compliance Equilibrium Model for Optimizing
                  Enterprise Information Security
                  Arun N. Sivashankarappa and Dharmalingam Ramalingam
                  Middle East College of Information Technology, Sultanate of Oman;
                  Knowledge Oasis Muscat, Muscat, Sultanate of Oman

02:20 - 02:40pm:  Formal Approach for Concurrent Systems Verification
                  Mahjoub Langar, Mohamed Mejri, Kamel Adi
                  Laval University, Quebec, Canada;
                  University of Quebec in Outaouais, Canada

02:40 - 03:00pm:  Working Towards a Primary Binary Analysis System
                  Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao
                  National Institute of Information & Communications Tech., Tokyo, Japan


SESSION 5-SAM:    CYBERSECURITY EDUCATION
                  Chair: Prof. George Markowsky, Professor & Chair of CS;
                  University of Maine, Orono, USA
                  July 13, 2010 (Tuesday); 03:00pm - 06:00pm
                  (LOCATION: Ballroom 6)

03:00 - 03:20pm:  The Need for Interdisciplinary Programs on Cyber Security of
                  Industrial Control Systems
                  Joe Weiss
                  Applied Control Solutions, LLC, Cupertino, California, USA

03:20 - 03:40pm:  Consumer Guide to Online Cybersecurity Resources
                  George Markowsky and Linda Markowsky
                  University of Maine, Orono, Maine, USA

03:40 - 04:00pm:  An SELinux Sourcebook for Cybersecurity Educators
                  Linda Markowsky
                  University of Maine, Orono, Maine, USA

04:00 - 04:20pm:  A Re-examination of Network Address Translation Security
                  Bruce Hartpence and Daryl Johnson
                  Networking, Security and System Administration Department, GCCIS,
                  Rochester Institute of Technology, Rochester, New York, USA

04:20 - 04:40pm:  The Potential Pitfalls And Security Risks Of IPv6
                  Michael Kozma, Jeff Scaparra, Aaron Doty, Matthew Simmons
                  SPAWAR Systems Center - Atlantic Advance Cyber Concepts Division,
                  Washington Navy Yard, DC, USA

04:40 - 05:00pm:  High School Cyber Defense Competitions - Lessons from the Trenches
                  Raymond Albert, Joanne Wallingford, George Markowsky
                  Natural & Behavioral Sciences Division, University of Maine, USA

05:00 - 05:20pm:  Security Attacks And Defenses In Sensor Networks
                  David Pearson, Sumita Mishra, Yin Pan
                  Department of Networking, Security & Systems Administration,
                  Rochester Institute of Technology, Rochester, New York, USA

05:20 - 05:40pm:  Keyloggers in Cybersecurity Education
                  Christopher Wood and Rajendra K. Raj
                  Rochester Institute of Technology, Rochester, New York, USA

05:40 - 06:00pm:  One Individual's, Three Perspectives of the Collegiate Cyber Defense
                  Competition
                  Jeff Scaparra
                  Alexandria, Virginia, USA


SESSION 6-SAM:    DIGITAL FORENSICS
                  Chair: Prof. Craig Valli and Dr. Patricia Williams;
                  Edith Cowan University, Australia
                  July 13, 2010 (Tuesday); 06:00pm - 08:00pm
                  (LOCATION: Ballroom 6)

06:00 - 06:20pm:  The 2010 IDN Homograph Attack Mitigation Survey
                  Peter Hannay and Christopher Bolan
                  Edith Cowan University, Australia

06:20 - 06:40pm:  Developing VoIP Router Honeypots
                  Craig Valli and Mohammed Al Lawati
                  Edith Cowan University, Australia

06:40 - 07:00pm:  Using Traffic Analysis to Identify Tor Usage - A Proposed Study
                  John Barker, Peter Hannay, and Christopher Bolan
                  Edith Cowan University, Australia

07:00 - 07:20pm:  Forensic Data Recovery on the 8GB Fifth Generation iPod Nano
                  David Cooper, Damon Pollard, Christopher Bolan
                  Edith Cowan University, Australia

07:20 - 07:40pm:  Geotagging Where Cyberspace Comes to Your Place
                  Craig Valli and Peter Hannay
                  Edith Cowan University, Australia

07:40 - 08:00pm:  FREE SLOT


06:00 - 09:00pm:  KEYNOTES & INVITED PRESENTATIONS + TUTORIALS
                  (Please see the lists at the begining of this booklet)


To select a different schedule CLICK HERE


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)