Personal tools
  •  
You are here: Home Program SAM'10: July 14, 2010 Schedule

SAM'10: July 14, 2010 Schedule

Last modified 2010-06-29 19:59

To select a different schedule CLICK HERE


6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)


SESSION 7-SAM:    MOBILE COMPUTING
                  Co-Chairs: Prof. Victor Clincy* and Dr. Nabil El Kadhi**
                  *Kennesaw State University, Georgia, USA
                  **ECCE Department Chairman, Ahlia University, Bahrain
                  July 14, 2010 (Wednesday); 08:00am - 09:00am
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  A Low-energy Consuming and Component-based Security Management
                  Architecture for Mobile Devices
                  Michel Kamel, Karima Boudaoud, Michel Riveill
                  University of Nice-Sophia Antipolis, France

08:20 - 08:40am:  An Agile Approach for Mobile Applications Security
                  Sofien Beji and Nabil El Kadhi
                  RIADI Laboratory, Ahlia University, Bahrain

08:40 - 09:00am:  A VoIP Security Framework for Mobile Devices
                  Alessandro Brawerman and Paulo Seleme Correa
                  Positivo University, Curitiba, PR, Brazil; Unibrasil, Curitiba, Brazil


SESSION 8-SAM:    SPECIAL TRACK ON APPLIED CRYPTOLOGY & NETWORK SECURITY (STACNS'10)
                  Chair: Prof. Kevin Daimi, University of Detroit Mercy, Michigan, USA
                  July 14, 2010 (Wednesday); 09:00am - 09:40am
                  (LOCATION: Ballroom 6)

09:00 - 09:20am:  An Approach to Secure E-Visit Systems
                  Kevin Daimi and Jinnan Song
                  University of Detroit Mercy, Detroit, Michigan, USA

09:20 - 09:40am:  A Java Implementation of the Elliptic Curve Integrated Encryption Scheme
                  V. Gayoso Martinez, L. Hernandez Encinas, C. Sanchez Avila
                  Institute of Applied Physics, CSIC, Madrid, Spain;
                  Polytechnic University, Avda. Complutense, Madrid, Spain


SESSION 9-SAM:    INFORMATION SECURITY & EDUCATION
                  Co-Chairs: Prof. Gevorg Margarov and Prof. Donara Gabrielyan;
                  State Engineering Univ. of Armenia & Mesrop Mashtots Univ.,
                  Stepanakert, Armenia
                  July 14, 2010 (Wednesday); 09:40am - 10:20am
                  (LOCATION: Ballroom 6)

09:40 - 10:00am:  Digital Image Steganography Using Matrix Addition
                  Gevorg Margarov and Vahan Markarov
                  State Engineering University of Armenia (Polytechnic), Armenia

10:00 - 10:20am:  Object Recognition on the Securing Area
                  Robert Hakobyan, Hovhannes Hovsepyan 
                  State Engineering University of Armenia, Yerevan, Armenia

10:20 - 10:40am:  BREAK


SESSION 10-SAM:   SECURITY POLICIES & RELATED ISSUES + NOVEL DEVICES
                  Co-Chairs: Dr. Jack K. Horner* and Dr. Asoke Nath**
                  **JKH Consulting, LLC, Los Alamos, New Mexico, USA;
                  **St. Xaviers College (Autonomous), West Bengal,India
                  July 14, 2010 (Wednesday); 10:40am - 12:40pm
                  (LOCATION: Ballroom 6)

10:40 - 11:00am:  General Context-Aware Role-Based Access Control System
                  Kang-hak Han, Hyunsu Jang, Young Ik Eom
                  Sungkyunkwan University, Suwon Republic of Korea

11:00 - 11:20am:  An Analysis of Security Policy Specification Techniques
                  Luay A. Wahsheh
                  Norfolk State University, Norfolk, Virginia, USA

11:20 - 11:40am:  Cyber Defense Architecture for Campus Intranet
                  Dinesh K. Saini and Wail M. Omar
                  Sohar University, Sultanate of Oman

11:40 - 12:00pm:  A Phylogenetic Approach to Analyzing IP-Address Artifacts of
                  Cyber-Attacks
                  Jack K. Horner
                  Los Alamos, New Mexico, USA

12:00 - 12:20pm:  A Security Measure Selection Scheme with Consideration of
                  Potential Lawsuits
                  Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara,
                  Ryoichi Sasaki, Masakatsu Nishigaki
                  Shizuoka University, Japan;
                  NTT Information Sharing Platform Laboratories, Japan;
                  Soka University, Tokyo, Japan; Tokyo Denki University, Japan;
                  Japan Science Technology and Agency, CREST, Japan

12:20 - 12:40pm:  Combining Smart Card Services with a Secure Memory Token
                  Asad M. Ali, Mehdi Asnaashari, H. Karen Lu
                  Gemalto, Inc.;   Lexar Media

12:40 - 01:20pm:  LUNCH (On Your Own)


SESSION 11-SAM:   SPECIAL TRACK ON SECURITY & INFORMATION ASSURANCE EDUCATION (STSIAE'10)
                  Chair: Prof. Kevin Daimi, University of Detroit Mercy, Michigan, USA
                  July 14, 2010 (Wednesday); 01:20pm - 02:20pm
                  (LOCATION: Ballroom 6)

01:20 - 01:40pm:  An Interdisciplinary Minor in Computer and Network Security
                  Kevin Daimi, Nizar Al Holou, and Utayba Mohammed
                  University of Detroit Mercy, Detroit, Michigan, USA

01:40 - 02:00pm:  Designing a Course on Jini-Based Vehicle Network Security
                  Rami Baroody and Nizar Al Holou
                  University of Detroit Mercy, Detroit, Michigan, USA

02:00 - 02:20pm:  Development of Capstone Projects on Secure Communications for Engineers
                  V. Gayoso Martinez, A. Hernandez Encinas, L. Hernandez Encinas,
                  A. Queiruga Dios, I. Visus Ruiz
                  Applied Physics Institute (CSIC), Madrid, Spain;
                  E.T.S.I.I. of Bejar, University of Salamanca, Spain


SESSION 12-SAM:   PROTOCOLS, ALGORITHMS & CORRESPONDING THEORIES
                  Chair: Dr. Dharmalingam Ramalingam, Knowledge Oasis Muscat, Oman
                  July 14, 2010 (Wednesday); 02:20pm - 06:00pm
                  (LOCATION: Ballroom 6)

02:20 - 02:40pm:  Behavioral Obfuscation in Malware and its Mitigation via
                  Signature Generalization
                  Arnur Tokhtabayev, Victor Skormin, Andrey Dolgikh
                  Binghamton University, New York, USA

02:40 - 03:00pm:  Ontological Approach to the Business Continuity Management
                  System Development
                  Andrzej Bialas
                  Institute of Innovative Technologies EMAG, Poland

03:00 - 03:20pm:  BREAK

03:20 - 03:40pm:  Blind Audio Watermarking Based on Neighbouring Energy Feature
                  Xiaodong Meng and Nandita Bhattacharjee
                  Monash University, Australia

03:40 - 04:00pm:  Reversible Data Hiding Using Characteristics of Original Contents
                  Hsiang-Cheh Huang and Wai-Chi Fang
                  National University of Kaohsiung, Kaohsiung, Taiwan, R.O.C.;
                  National Chiao Tung University, Hsinchu, Taiwan, R.O.C.

04:00 - 04:20pm:  TLS Timings on a Bare PC
                  Ali Emdadi, Ramesh K. Karne, Alexander L. Wijesinha
                  Towson University, Maryland, USA

04:20 - 04:40pm:  A Statistical Approach for Anomaly-Based Network Intrusion
                  Detection Using Logistic Regression
                  Abrar Qureshi, Kamel Rekab, Carlos E. Otero
                  University of Virginia at Wise, Virginia, USA;
                  University of Missouri, Kansas City, USA

04:40 - 05:00pm:  Modeling NIDS Evasion With Genetic Programming
                  Sergio Pastrana, Agustin Orfila, Arturo Ribagorda
                  IT Security Group, Carlos III University of Madrid, Spain

05:00 - 05:20pm:  Resource Evaluation of Positive and Negative Selection
                  Suhair H. Amer and John A. Hamilton, Jr.
                  Southeast Missouri State University, Missouri, USA;
                  Auburn University, Alabama, USA

05:20 - 05:40pm:  Learning-based Threshold Estimation Model for Detection of
                  Botnet Malicious Activities
                  Do-Hoon Kim, Hoh Peter In, Hyun-Cheol Jeong
                  Korea University, Seoul, Korea;
                  Korea Internet & Security Agency, Seoul, Korea

05:40 - 06:00pm:  Detecting Network Faults With Filtering
                  Mo Adda, Adamantini Peratikou, Djazia F. Ghefir
                  Universite Abou Bekr Belkaid Tlemcen, Algeria;
                  University of Portsmouth, United Kingdom


06:00 - 09:00pm:  KEYNOTES & INVITED PRESENTATIONS + TUTORIALS
                  (Please see the lists at the begining of this booklet)


To select a different schedule CLICK HERE


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)