Third International Symposium on Information … International Symposium on Information Assurance...

74
IAS 2007 Third International Symposium on Information Assurance and Security 29-31 August 2007 Manchester, United Kingdom Edited by Ning Zhang, University of Manchester, UK Ajith Abraham, Norwegian University of Science and Technology, Norway Qi Shi, Liverpool John Moores University, UK Johnson Thomas, Oklahoma State University, USA IAS 2007 IAS 2007 Information Information Sessions Sessions Paper by Author Paper by Author Search Search Getting Started Getting Started Sponsored by ICST (International Communication Sciences and Technology Association) Create-Net (Center of REsearch and Telecommunication Experimentations for NETworked Communities) Published by Conference Publishing Services (CPS)

Transcript of Third International Symposium on Information … International Symposium on Information Assurance...

Page 1: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

IAS 2007 Third International Symposium

on Information Assurance and Security

29-31 August 2007 Manchester, United Kingdom

Edited by

Ning Zhang, University of Manchester,

UK

Ajith Abraham, Norwegian University of Science and Technology,

Norway

Qi Shi, Liverpool John Moores

University, UK

Johnson Thomas, Oklahoma State University, USA

IAS 2007 IAS 2007 InformationInformation

SessionsSessions

Paper by AuthorPaper by Author

SearchSearch

Getting StartedGetting Started

Sponsored by ICST (International Communication

Sciences and Technology Association)

Create-Net (Center of REsearch and Telecommunication Experimentations

for NETworked Communities)

Published by

Conference Publishing Services

(CPS)

Page 2: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Conference Information

Third International Symposium on InformationAssurance and Security

q Chairs’ Welcome Message

q IAS 2007 Organisation

q Keynote Speech

q Tutorial 1 - Abstract

q Tutorial 2 - Abstract

q Title Page (Book version)

q Copyright Page (Book version)

q Table of Contents (Book version)

q Author Index (Book version)

q Roster Page (Book version)

Page 3: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Sessions

q E-Commerce Security

q Network Security

q Cryptographic Schemes and Applications

q Authentication and Access Control

q Intrusion Prevention

q Intrusion Detection

q Security Analysis

q Data Security and Privacy

q Risk and Trust Management

q Security Requirements and Policies

q Agent and System Security

q Workshop on Computational Forensics

q Workshop on Data Hiding for Information and Multimedia Security

Page 4: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

E-Commerce Security

q Secure M-Commerce Transactions: A Third Party Based Signature ProtocolLisha He, Ning Zhang, Lirong He, and Ian Rogers

q Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart CardSatish Devane, Madhumita Chatterjee, and Deepak Phatak

q Certified Email Delivery with Offline TTPHao Wang, Yuyi Ou, Jie Ling, Lu Liang, and Xiang Xu

q An Effective and Secure Buyer-Seller Watermarking ProtocolIbrahim M. Ibrahim, Sherif Hazem Nour El-Din, and Abdel Fatah A. Hegazy

Page 5: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Network Security

q Towards an Autonomic Security System for Mobile Ad Hoc NetworksMohamad Aljnidi and Jean Leneutre

q A Secure Authenticated Key Agreement Protocol for Wireless SecurityPierre E. Abi-Char, Abdallah Mhamed, and Bachar El-Hassan

q Hierarchical Multi-party Key Agreement for Wireless NetworksSigurd Eskeland and Vladimir Oleshchuk

q Applying Secure Data Aggregation Techniques for a Structure and DensityIndependent Group Based Key Management Protocol

Kashif Kifayat, Madjid Merabti, Qi Shi, and David Llewellyn-Jones

q A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, and Bruce Christianson

q On Detecting Packets Droppers in MANET: A Novel Low Cost ApproachTarag Fahad, Djamel Djenouri, and Robert Askwith

Page 6: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Cryptographic Schemes and Applications

q Threshold SKI Protocol for ID-Based CryptosystemsAshutosh Saxena

q Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic QuantizationMechanism

Thian Song Ong and Andrew Beng Jin Teoh

q Low-Cost Anonymous Timed-Release EncryptionD. Hristu-Varsakelis, K. Chalkias, and G. Stephanides

q Integrating Multi-modal Circuit Features within an Efficient Encryption SystemEvangelos Papoutsis, Gareth Howells, Andrew Hopkins, and Klaus McDonald-Maier

q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography

Pierre E. Abi-Char, Abdallah Mhamed, and Bachar El-Hassan

q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapathto Speed-Up Elliptic Curve Cryptography

S. Bartolini, G. Castagnini, and E. Martinelli

q An LSB Data Hiding Technique Using Prime NumbersSandipan Dey, Ajith Abraham, and Sugata Sanyal

Page 7: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Authentication and Access Control

q Binding Update Authentication Scheme for Mobile IPv6Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee , S.W. Yoo, Piao Yanji,and ManPyo Hong

q An Authentication Scheme Using Non-commutative SemigroupsM. M. Chowdhury

q Function-Based Authorization Constraints Specification and EnforcementWei Zhou and Christoph Meinel

q Separation of Duty in Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, and Rasool Jalili

q Enhancing Role-Based Access Control Model through Fuzzy RelationsHassan Takabi, Morteza Amini, and Rasool Jalili

q A Theoretical Security Model for Access Control and Security AssuranceBo-Chao Cheng, Huan Chen, and Ryh-Yuh Tseng

q A Purpose-Based Access Control ModelNaikuo Yang, Howard Barringer, and Ning Zhang

q SARBAC07: A Scoped Administration Model for RBAC with Hybrid HierarchyYue Zhang and James B.D. Joshi

Page 8: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

q Levels of Authentication Assurance: An InvestigationAleksandra Nenadic, Ning Zhang, Li Yao, and Terry Morrow

Page 9: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Intrusion Prevention

q Vulnerability Assessment by Learning Attack Specifications in GraphsVirginia N. L. Franqueira, and Raul H. C. Lopes

q Automatic Patch Generation for Buffer Overflow AttacksAlexey Smirnov and Tzi-cker Chiueh

q Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from TimeIndependent Attacks

Muhammad Sher and Thomas Magedanz

q Cyber Threat Trend Analysis Model Using HMMDo Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, and Hee Jo Lee

q DIPS: A Framework for Distributed Intrusion Prediction and Prevention UsingHidden Markov Models and Online Fuzzy Risk Assessment

Kjetil Haslum, Ajith Abraham, and Svein Knapskog

Page 10: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Intrusion Detection

q Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISPDomain

Anjali Sardana, Krishan Kumar, and R. C. Joshi

q IP Protection: Detecting Email Based Breaches of ConfidenceNeil Cooke, Lee Gillam, and Ahmet Kondoz

q Non-stationary Markov Models and Anomaly Propagation Analysis in IDSArnur G. Tokhtabayev and Victor A. Skormin

q Building Trustworthy Intrusion Detection through VM IntrospectionFabrizio Baiardi and Daniele Sgandurra

q Early DoS Attack Detection Using Smoothened Time-Series and Wavelet AnalysisPravin Shinde and Srinivas Guntupalli

q A Security Model for Detecting Suspicious Patterns in Physical EnvironmentSimon Fong and Zhuang Yan

q Detection of Web Defacements by Means of Genetic ProgrammingEric Medvet, Cyril Fillon, and Alberto Bartoli

Page 11: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Security Analysis

q Team Edit Automata for Testing Security PropertyZhenrong Yang, Aiman Hanna, and Mourad Debbabi

q Analysing the Security Threats against Network Convergence ArchitecturesPatroklos Argyroudis, Robert McAdoo, Stephen Toner, Linda Doyle, and Donal O’Mahony

q Modelling Quality of Protection in Outsourced Business ProcessesFabio Massacci and Artsiom Yautsiukhin

q Modeling Security Protocols as GamesMohamed Saleh and Mourad Debbabi

Page 12: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Data Security and Privacy

q A Secure Storage Service for the gLite MiddlewareDiego Scardaci and Giordano Scuderi

q FPGA/ASIC Based Cryptographic Object Store SystemDan Feng, Lanxiang Chen, Lingfang Zeng, and Zhongying Niu

q An Architecture for Privacy Preserving Collaborative Filtering on Web PortalsWaseem Ahmad and Ashfaq Khokhar

q Enforcing Privacy by Means of an Ontology Driven XACML FrameworkDhiah el Diehn I. Abou-Tair, Stefan Berlik, and Udo Kelter

q Addressing Privacy Issues in CardSpaceWaleed A. Alrodhan and Chris J. Mitchell

q Second-LSB-Dependent Robust Watermarking for Relational DatabaseXiangrong Xiao, Xingming Sun, and Minggang Chen

Page 13: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Risk and Trust Management

q Operational Risk: Acceptability CriteriaDaniel Gideon Dresner and J. Robert (Bob) G. Wood

q HPRS: A Hybrid P2P Reputation System Using File and Peer RatingSrinivasan T., Varun Ramachandran, Arun Vedachalam, and S. K. Ghosh

q Resource Classification Based Negotiation in Web ServicesDiala Abi Haidar, Nora Cuppens, Frédéric Cuppens, and Hervé Debar

q Managing Behaviour Trust in Grids Using Statistical Methods of Quality AssuranceElvis Papalilo and Bernd Freisleben

q Dynamic Risk Mitigation in Computing InfrastructuresR. Ann Miura-Ko and Nicholas Bambos

q Risk Management in Coalition NetworksWim Mees

Page 14: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Security Requirements and Policies

q On the Definition and Policies of ConfidentialityJohs Hansen Hammer and Gerardo Schneider

q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux

Pravin Shinde, Priyanka Sharma, and Srinivas Guntupalli

q CCARCH: Architecting Common Criteria Security RequirementsJose Romero-Mariona, Hadar Ziv, and Debra J. Richardson

Page 15: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Agent and System Security

q Organized Anonymous AgentsMartijn Warnier and Frances Brazier

q Comparing the Trust and Security Models of Mobile AgentsMichail Fragkakis and Nikolaos Alexandris

q Program Fragmentation as a Metamorphic Software ProtectionBobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, and Robert W. Bennington

q Accurate Application-Specific Sandboxing for Win32/Intel BinariesWei Li, Lap-chung Lam, and Tzi-cker Chiueh

Page 16: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Workshop on Computational Forensics

q Computational Forensics: Towards Hybrid-Intelligent Crime InvestigationKatrin Franke and Sargur N. Srihari

q Shoeprint Image Retrieval Based on Local Image FeaturesH. Su, D. Crookes, A. Bouridane, and M. Gueham

q Statistical Disk Cluster Classification for File CarvingCor J. Veenman

q Application of Language Models to Suspect Prioritisation and Suspect Likelihoodin Serial Crimes

Richard Bache, Fabio Crestani, David Canter, and Donna Youngs

q Improving the Efficiency of Digital Forensic Search by Means of the ConstrainedEdit Distance

Slobodan Petrovi and Katrin Franke

q Information-Theoretical Comparison of Likelihood Ratio Methods of ForensicEvidence Evaluation

Daniel Ramos, Joaquin Gonzalez-Rodriguez, Grzegorz Zadora, Janina Zieba-Palus,and Colin Aitken

Page 17: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

q Study of Structural Features of Handwritten Grapheme 'th' for Writer IdentificationVladimir Pervouchine and Graham Leedham

q Generative Models for Fingerprint Individuality Using Ridge TypesGang Fang, Sargur N. Srihari, and Harish Srinivasan

q Craniofacial Superimposition in Forensic Identification Using Genetic AlgorithmsLucia Ballerini, Oscar Cordon, Sergio Damas, Jose Santamaría, Inmaculada Aleman,and Miguel Botella

q The Influence of Frame Length on Speaker Identification PerformanceDonato Impedovo and Mario Refice

q On Periodic Properties of Interpolation and Their Application to ImageAuthentication

Babak Mahdian and Stanislav Saic

Page 18: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

Workshop on Data Hiding for Information and Multimedia Security

q Detection of Hidden Information in Webpages Based on RandomnessJunwei Huang, Xingming Sun, Huajun Huang, and Gang Luo

q A Weighted Stego Image Detector for Sequential LSB ReplacementAndrew D. Ker

q A Framework for Design and Analysis of Asymmetric Fingerprinting ProtocolsGeong Sen Poh and Keith M. Martin

q An Analysis of Database Watermarking SecurityJulien Lafaye

q A New Data Hiding Scheme with Quality Control for Binary Images Using BlockParity

M. Venkatesan, P. Meenakshi Devi, K. Duraiswamy, and K. Thiagarajah

q Metrics-Based Evaluation of Slicing ObfuscationsAnirban Majumdar, Stephen Drape, and Clark Thomborson

q Structural Digital Signature and Semi-fragile Fingerprinting for ImageAuthentication in Wavelet Domain

Yan Zhu, Chang-Tsun Li, and Hong-Jia Zhao

Page 19: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Session

q A Novel Anti-collusion Coding Scheme Tailored to Track Linear CollusionsKannan Karthik and Dimitrios Hatzinakos

q Research on Steganalysis for Text Steganography Based on Font FormatLingyun Xiang, Xingming Sun, Gang Luo, and Can Gan

q Protection of Mammograms Using Blind Steganography and WatermarkingYue Li, Chang-Tsun Li, and Chia-Hung Wei

Page 20: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Aq Abi-Char, Pierre E.

q Abou-Tair, Dhiah el Diehn I.

q Abraham, Ajith

q Adereti, Aderemi

q Ahmad, Waseem

q Ahmed, Irfan

q Aitken, Colin

q Aleman, Inmaculada

q Alexandris, Nikolaos

q Aljnidi, Mohamad

q Alrodhan, Waleed A.

q Amini, Morteza

q Argyroudis, Patroklos

q Askwith, Robert

Bq Bache, Richard

q Baiardi, Fabrizio

q Baldwin, Rusty O.

q Ballerini, Lucia

q Bambos, Nicholas

q Barringer, Howard

q Bartoli, Alberto

q Bartolini, S.

q Bennington, Robert W.

q Berlik, Stefan

q Birrer, Bobby D.

q Bo, Su Mon

q Botella, Miguel

q Bouridane, A.

q Brazier, Frances

Page 21: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Cq Canter, David

q Castagnini, G.

q Chalkias, K.

q Chatterjee, Madhumita

q Chen, Huan

q Chen, Lanxiang

q Chen, Minggang

q Cheng, Bo-Chao

q Chiueh, Tzi-cker

q Chowdhury, M. M.

q Christianson, Bruce

q Cooke, Neil

q Cordon, Oscar

q Crestani, Fabio

q Crookes, D.

q Cuppens, Frédéric

q Cuppens, Nora

Dq Damas, Sergio

q Debar, Hervé

q Debbabi, Mourad

q Devane, Satish

q Devi, P. Meenakshi

q Dey, Sandipan

q Djenouri, Djamel

q Doyle, Linda

q Drape, Stephen

q Dresner, Daniel Gideon

q Duraiswamy, K.

Page 22: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Eq El-Din, Sherif Hazem Nour

q El-Hassan, Bachar

q Eskeland, Sigurd

Fq Fahad, Tarag

q Fang, Gang

q Feng, Dan

q Fillon, Cyril

q Fong, Simon

q Fragkakis, Michail

q Franke, Katrin

q Franqueira, Virginia N. L.

q Freisleben, Bernd

Gq Gan, Can

q Ghosh, S. K.

q Gillam, Lee

q Gonzalez-Rodriguez, Joaquin

q Gueham, M.

q Guntupalli, Srinivas

Hq Haidar, Diala Abi

q Hammer, Johs Hansen

q Hanna, Aiman

q Haslum, Kjetil

q Hatzinakos, Dimitrios

q He, Lirong

q He, Lisha

Page 23: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

q Hegazy, Abdel Fatah A.

q Hong, ManPyo

q Hopkins, Andrew

q Howells, Gareth

q Hristu-Varsakelis, D.

q Huang, Huajun

q Huang, Junwei

Iq Ibrahim, Ibrahim M.

q Impedovo, Donato

q In, Hoh Peter

Jq Jalili, Rasool

q Joshi, James B.D.

q Joshi, R. C.

q Jung, Sung-Oh David

Kq Karthik, Kannan

q Kelter, Udo

q Ker, Andrew D.

q Khokhar, Ashfaq

q Kifayat, Kashif

q Kim, Do Hoon

q Knapskog, Svein

q Kondoz, Ahmet

q Kumar, Krishan

Lq Lafaye, Julien

q Lam, Lap-chung

q Lee, Hee Jo

Page 24: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

q Lee, Taek

q Leedham, Graham

q Leneutre, Jean

q Lhee, Kyung-suk

q Li, Chang-Tsun

q Li, Wei

q Li, Yue

q Liang, Lu

q Ling, Jie

q Llewellyn-Jones, David

q Lopes, Raul H. C.

q Luo, Gang

Mq Magedanz, Thomas

q Mahdian, Babak

q Majumdar, Anirban

q Malcolm, James A.

q Martin, Keith M.

q Martinelli, E.

q Massacci, Fabio

q McAdoo, Robert

q McDonald-Maier, Klaus

q Medvet, Eric

q Mees, Wim

q Meinel, Christoph

q Merabti, Madjid

q Mhamed, Abdallah

q Mitchell, Chris J.

q Miura-Ko, R. Ann

q Morrow, Terry

q Mukhtar, Shoaib

q Mullins, Barry E.

Page 25: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Nq Nenadic, Aleksandra

q Niu, Zhongying

Oq O’Mahony, Donal

q Oleshchuk, Vladimir

q Ong, Thian Song

q Ou, Yuyi

Pq Papalilo, Elvis

q Papoutsis, Evangelos

q Pervouchine, Vladimir

q Petrovi, Slobodan

q Phatak, Deepak

q Poh, Geong Sen

Rq Raines, Richard A.

q Ramachandran, Varun

q Ramos, Daniel

q Refice, Mario

q Richardson, Debra J.

q Rogers, Ian

q Romero-Mariona, Jose

Sq Saic, Stanislav

q Saleh, Mohamed

q Santamaría, Jose

q Sanyal, Sugata

q Sardana, Anjali

Page 26: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

q Saxena, Ashutosh

q Scardaci, Diego

q Schneider, Gerardo

q Scuderi, Giordano

q Sgandurra, Daniele

q Sharma, Priyanka

q Sher, Muhammad

q Shi, Qi

q Shinde, Pravin

q Skormin, Victor A.

q Smirnov, Alexey

q Srihari, Sargur N.

q Srinivasan, Harish

q Stephanides, G.

q Su, H.

q Sun, Xingming

Tq T., Srinivasan

q Takabi, Hassan

q Tariq, Usman

q Teoh, Andrew Beng Jin

q Thiagarajah, K.

q Thomborson, Clark

q Tokhtabayev, Arnur G.

q Toner, Stephen

q Tseng, Ryh-Yuh

Vq Vedachalam, Arun

q Veenman, Cor J.

q Venkatesan, M.

Page 27: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Wq Wang, Hao

q Warnier, Martijn

q Wei, Chia-Hung

q Wood, J. Robert (Bob) G.

Xq Xiang, Lingyun

q Xiao, Hannan

q Xiao, Xiangrong

q Xu, Xiang

Yq Yan, Zhuang

q Yang, Naikuo

q Yang, Zhenrong

q Yanji, Piao

q Yao, Li

q Yautsiukhin, Artsiom

q Yoo, S.W.

q Youngs, Donna

Zq Zadora, Grzegorz

q Zeng, Lingfang

q Zhang, Ning

q Zhang, Yue

q Zhao, Hong-Jia

q Zhou, Wei

q Zhu, Yan

q Zieba-Palus, Janina

q Ziv, Hadar

Page 28: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Abi-Char, Pierre E.q A Secure Authenticated Key Agreement Protocol for Wireless Security

q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography

Abou-Tair, Dhiah el Diehn I.q Enforcing Privacy by Means of an Ontology Driven XACML Framework

Abraham, Ajithq An LSB Data Hiding Technique Using Prime Numbers

q DIPS: A Framework for Distributed Intrusion Prediction and Prevention UsingHidden Markov Models and Online Fuzzy Risk Assessment

Adereti, Aderemiq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols

under Security Attack

Page 29: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Ahmad, Waseemq An Architecture for Privacy Preserving Collaborative Filtering on Web Portals

Ahmed, Irfanq Binding Update Authentication Scheme for Mobile IPv6

Aitken, Colinq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic

Evidence Evaluation

Aleman, Inmaculadaq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Alexandris, Nikolaosq Comparing the Trust and Security Models of Mobile Agents

Page 30: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Aljnidi, Mohamadq Towards an Autonomic Security System for Mobile Ad Hoc Networks

Alrodhan, Waleed A.q Addressing Privacy Issues in CardSpace

Amini, Mortezaq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

q Enhancing Role-Based Access Control Model through Fuzzy Relations

Argyroudis, Patroklosq Analysing the Security Threats against Network Convergence Architectures

Askwith, Robertq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach

Page 31: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Bache, Richardq Application of Language Models to Suspect Prioritisation and Suspect Likelihood

in Serial Crimes

Baiardi, Fabrizioq Building Trustworthy Intrusion Detection through VM Introspection

Baldwin, Rusty O.q Program Fragmentation as a Metamorphic Software Protection

Ballerini, Luciaq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Bambos, Nicholasq Dynamic Risk Mitigation in Computing Infrastructures

Page 32: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Barringer, Howardq A Purpose-Based Access Control Model

Bartoli, Albertoq Detection of Web Defacements by Means of Genetic Programming

Bartolini, S.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath

to Speed-Up Elliptic Curve Cryptography

Bennington, Robert W.q Program Fragmentation as a Metamorphic Software Protection

Berlik, Stefanq Enforcing Privacy by Means of an Ontology Driven XACML Framework

Page 33: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Birrer, Bobby D.q Program Fragmentation as a Metamorphic Software Protection

Bo, Su Monq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols

under Security Attack

Botella, Miguelq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Bouridane, A.q Shoeprint Image Retrieval Based on Local Image Features

Brazier, Francesq Organized Anonymous Agents

Page 34: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Canter, Davidq Application of Language Models to Suspect Prioritisation and Suspect Likelihood

in Serial Crimes

Castagnini, G.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath

to Speed-Up Elliptic Curve Cryptography

Chalkias, K.q Low-Cost Anonymous Timed-Release Encryption

Chatterjee, Madhumitaq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Page 35: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Chen, Huanq A Theoretical Security Model for Access Control and Security Assurance

Chen, Lanxiangq FPGA/ASIC Based Cryptographic Object Store System

Chen, Minggangq Second-LSB-Dependent Robust Watermarking for Relational Database

Cheng, Bo-Chaoq A Theoretical Security Model for Access Control and Security Assurance

Chiueh, Tzi-ckerq Automatic Patch Generation for Buffer Overflow Attacks

q Accurate Application-Specific Sandboxing for Win32/Intel Binaries

Page 36: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Chowdhury, M. M.q An Authentication Scheme Using Non-commutative Semigroups

Christianson, Bruceq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols

under Security Attack

Cooke, Neilq IP Protection: Detecting Email Based Breaches of Confidence

Cordon, Oscarq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Crestani, Fabioq Application of Language Models to Suspect Prioritisation and Suspect Likelihood

in Serial Crimes

Page 37: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Crookes, D.q Shoeprint Image Retrieval Based on Local Image Features

Cuppens, Frédéricq Resource Classification Based Negotiation in Web Services

Cuppens, Noraq Resource Classification Based Negotiation in Web Services

Damas, Sergioq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Debar, Hervéq Resource Classification Based Negotiation in Web Services

Page 38: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Debbabi, Mouradq Team Edit Automata for Testing Security Property

q Modeling Security Protocols as Games

Devane, Satishq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Devi, P. Meenakshiq A New Data Hiding Scheme with Quality Control for Binary Images Using Block

Parity

Dey, Sandipanq An LSB Data Hiding Technique Using Prime Numbers

Page 39: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Djenouri, Djamelq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach

Doyle, Lindaq Analysing the Security Threats against Network Convergence Architectures

Drape, Stephenq Metrics-Based Evaluation of Slicing Obfuscations

Dresner, Daniel Gideonq Operational Risk: Acceptability Criteria

Duraiswamy, K.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block

Parity

Page 40: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

El-Din, Sherif Hazem Nourq An Effective and Secure Buyer-Seller Watermarking Protocol

El-Hassan, Bacharq A Secure Authenticated Key Agreement Protocol for Wireless Security

q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography

Eskeland, Sigurdq Hierarchical Multi-party Key Agreement for Wireless Networks

Fahad, Taragq On Detecting Packets Droppers in MANET: A Novel Low Cost Approach

Page 41: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Fang, Gangq Generative Models for Fingerprint Individuality Using Ridge Types

Feng, Danq FPGA/ASIC Based Cryptographic Object Store System

Fillon, Cyrilq Detection of Web Defacements by Means of Genetic Programming

Fong, Simonq A Security Model for Detecting Suspicious Patterns in Physical Environment

Fragkakis, Michailq Comparing the Trust and Security Models of Mobile Agents

Page 42: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Franke, Katrinq Computational Forensics: Towards Hybrid-Intelligent Crime Investigation

q Improving the Efficiency of Digital Forensic Search by Means of the ConstrainedEdit Distance

Franqueira, Virginia N. L.q Vulnerability Assessment by Learning Attack Specifications in Graphs

Freisleben, Berndq Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance

Gan, Canq Research on Steganalysis for Text Steganography Based on Font Format

Page 43: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Ghosh, S. K.q HPRS: A Hybrid P2P Reputation System Using File and Peer Rating

Gillam, Leeq IP Protection: Detecting Email Based Breaches of Confidence

Gonzalez-Rodriguez, Joaquinq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic

Evidence Evaluation

Gueham, M.q Shoeprint Image Retrieval Based on Local Image Features

Guntupalli, Srinivasq Early DoS Attack Detection Using Smoothened Time-Series and Wavelet Analysis

Page 44: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux

Haidar, Diala Abiq Resource Classification Based Negotiation in Web Services

Hammer, Johs Hansenq On the Definition and Policies of Confidentiality

Hanna, Aimanq Team Edit Automata for Testing Security Property

Haslum, Kjetilq DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using

Hidden Markov Models and Online Fuzzy Risk Assessment

Page 45: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Hatzinakos, Dimitriosq A Novel Anti-collusion Coding Scheme Tailored to Track Linear Collusions

He, Lirongq Secure M-Commerce Transactions: A Third Party Based Signature Protocol

He, Lishaq Secure M-Commerce Transactions: A Third Party Based Signature Protocol

Hegazy, Abdel Fatah A.q An Effective and Secure Buyer-Seller Watermarking Protocol

Hong, ManPyoq Binding Update Authentication Scheme for Mobile IPv6

Page 46: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Hopkins, Andrewq Integrating Multi-modal Circuit Features within an Efficient Encryption System

Howells, Garethq Integrating Multi-modal Circuit Features within an Efficient Encryption System

Hristu-Varsakelis, D.q Low-Cost Anonymous Timed-Release Encryption

Huang, Huajunq Detection of Hidden Information in Webpages Based on Randomness

Huang, Junweiq Detection of Hidden Information in Webpages Based on Randomness

Page 47: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Ibrahim, Ibrahim M.q An Effective and Secure Buyer-Seller Watermarking Protocol

Impedovo, Donatoq The Influence of Frame Length on Speaker Identification Performance

In, Hoh Peterq Cyber Threat Trend Analysis Model Using HMM

Jalili, Rasoolq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

q Enhancing Role-Based Access Control Model through Fuzzy Relations

Joshi, James B.D.q SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy

Page 48: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Joshi, R. C.q Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP

Domain

Jung, Sung-Oh Davidq Cyber Threat Trend Analysis Model Using HMM

Karthik, Kannanq A Novel Anti-collusion Coding Scheme Tailored to Track Linear Collusions

Kelter, Udoq Enforcing Privacy by Means of an Ontology Driven XACML Framework

Ker, Andrew D.q A Weighted Stego Image Detector for Sequential LSB Replacement

Page 49: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Khokhar, Ashfaqq An Architecture for Privacy Preserving Collaborative Filtering on Web Portals

Kifayat, Kashifq Applying Secure Data Aggregation Techniques for a Structure and Density

Independent Group Based Key Management Protocol

Kim, Do Hoonq Cyber Threat Trend Analysis Model Using HMM

Knapskog, Sveinq DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using

Hidden Markov Models and Online Fuzzy Risk Assessment

Page 50: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Kondoz, Ahmetq IP Protection: Detecting Email Based Breaches of Confidence

Kumar, Krishanq Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP

Domain

Lafaye, Julienq An Analysis of Database Watermarking Security

Lam, Lap-chungq Accurate Application-Specific Sandboxing for Win32/Intel Binaries

Lee, Hee Joq Cyber Threat Trend Analysis Model Using HMM

Page 51: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Lee, Taekq Cyber Threat Trend Analysis Model Using HMM

Leedham, Grahamq Study of Structural Features of Handwritten Grapheme 'th' for Writer Identification

Leneutre, Jeanq Towards an Autonomic Security System for Mobile Ad Hoc Networks

Lhee, Kyung-sukq Binding Update Authentication Scheme for Mobile IPv6

Li, Chang-Tsunq Structural Digital Signature and Semi-fragile Fingerprinting for Image

Authentication in Wavelet Domain

q Protection of Mammograms Using Blind Steganography and Watermarking

Page 52: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Li, Weiq Accurate Application-Specific Sandboxing for Win32/Intel Binaries

Li, Yueq Protection of Mammograms Using Blind Steganography and Watermarking

Liang, Luq Certified Email Delivery with Offline TTP

Ling, Jieq Certified Email Delivery with Offline TTP

Llewellyn-Jones, Davidq Applying Secure Data Aggregation Techniques for a Structure and Density

Independent Group Based Key Management Protocol

Page 53: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Lopes, Raul H. C.q Vulnerability Assessment by Learning Attack Specifications in Graphs

Luo, Gangq Detection of Hidden Information in Webpages Based on Randomness

q Research on Steganalysis for Text Steganography Based on Font Format

Magedanz, Thomasq Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time

Independent Attacks

Mahdian, Babakq On Periodic Properties of Interpolation and Their Application to Image

Authentication

Page 54: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Majumdar, Anirbanq Metrics-Based Evaluation of Slicing Obfuscations

Malcolm, James A.q A Performance Comparison of Wireless Ad Hoc Network Routing Protocols

under Security Attack

Martin, Keith M.q A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols

Martinelli, E.q Inclusion of a Montgomery Multiplier Unit into an Embedded Processor’s Datapath

to Speed-Up Elliptic Curve Cryptography

Page 55: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Massacci, Fabioq Modelling Quality of Protection in Outsourced Business Processes

McAdoo, Robertq Analysing the Security Threats against Network Convergence Architectures

McDonald-Maier, Klausq Integrating Multi-modal Circuit Features within an Efficient Encryption System

Medvet, Ericq Detection of Web Defacements by Means of Genetic Programming

Mees, Wimq Risk Management in Coalition Networks

Page 56: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Meinel, Christophq Function-Based Authorization Constraints Specification and Enforcement

Merabti, Madjidq Applying Secure Data Aggregation Techniques for a Structure and Density

Independent Group Based Key Management Protocol

Mhamed, Abdallahq A Secure Authenticated Key Agreement Protocol for Wireless Security

q A Secure Authenticated Key Agreement Protocol Based on Elliptic CurveCryptography

Mitchell, Chris J.q Addressing Privacy Issues in CardSpace

Page 57: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Miura-Ko, R. Annq Dynamic Risk Mitigation in Computing Infrastructures

Morrow, Terryq Levels of Authentication Assurance: An Investigation

Mukhtar, Shoaibq Binding Update Authentication Scheme for Mobile IPv6

Mullins, Barry E.q Program Fragmentation as a Metamorphic Software Protection

Nenadic, Aleksandraq Levels of Authentication Assurance: An Investigation

Page 58: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Niu, Zhongyingq FPGA/ASIC Based Cryptographic Object Store System

O’Mahony, Donalq Analysing the Security Threats against Network Convergence Architectures

Oleshchuk, Vladimirq Hierarchical Multi-party Key Agreement for Wireless Networks

Ong, Thian Songq Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic Quantization

Mechanism

Ou, Yuyiq Certified Email Delivery with Offline TTP

Page 59: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Papalilo, Elvisq Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance

Papoutsis, Evangelosq Integrating Multi-modal Circuit Features within an Efficient Encryption System

Pervouchine, Vladimirq Study of Structural Features of Handwritten Grapheme 'th' for Writer Identification

Petrovi, Slobodanq Improving the Efficiency of Digital Forensic Search by Means of the Constrained

Edit Distance

Phatak, Deepakq Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

Page 60: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Poh, Geong Senq A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols

Raines, Richard A.q Program Fragmentation as a Metamorphic Software Protection

Ramachandran, Varunq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating

Ramos, Danielq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic

Evidence Evaluation

Refice, Marioq The Influence of Frame Length on Speaker Identification Performance

Page 61: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Richardson, Debra J.q CCARCH: Architecting Common Criteria Security Requirements

Rogers, Ianq Secure M-Commerce Transactions: A Third Party Based Signature Protocol

Romero-Mariona, Joseq CCARCH: Architecting Common Criteria Security Requirements

Saic, Stanislavq On Periodic Properties of Interpolation and Their Application to Image

Authentication

Saleh, Mohamedq Modeling Security Protocols as Games

Page 62: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Santamaría, Joseq Craniofacial Superimposition in Forensic Identification Using Genetic Algorithms

Sanyal, Sugataq An LSB Data Hiding Technique Using Prime Numbers

Sardana, Anjaliq Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP

Domain

Saxena, Ashutoshq Threshold SKI Protocol for ID-Based Cryptosystems

Scardaci, Diegoq A Secure Storage Service for the gLite Middleware

Page 63: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Schneider, Gerardoq On the Definition and Policies of Confidentiality

Scuderi, Giordanoq A Secure Storage Service for the gLite Middleware

Sgandurra, Danieleq Building Trustworthy Intrusion Detection through VM Introspection

Sharma, Priyankaq Enhanced Availability and Security by Rate Control Using Extended Policy

Framework in SELinux

Sher, Muhammadq Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time

Independent Attacks

Page 64: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Shi, Qiq Applying Secure Data Aggregation Techniques for a Structure and Density

Independent Group Based Key Management Protocol

Shinde, Pravinq Early DoS Attack Detection Using Smoothened Time-Series and Wavelet Analysis

q Enhanced Availability and Security by Rate Control Using Extended PolicyFramework in SELinux

Skormin, Victor A.q Non-stationary Markov Models and Anomaly Propagation Analysis in IDS

Smirnov, Alexeyq Automatic Patch Generation for Buffer Overflow Attacks

Page 65: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Srihari, Sargur N.q Computational Forensics: Towards Hybrid-Intelligent Crime Investigation

q Generative Models for Fingerprint Individuality Using Ridge Types

Srinivasan, Harishq Generative Models for Fingerprint Individuality Using Ridge Types

Stephanides, G.q Low-Cost Anonymous Timed-Release Encryption

Su, H.q Shoeprint Image Retrieval Based on Local Image Features

Sun, Xingmingq Second-LSB-Dependent Robust Watermarking for Relational Database

q Detection of Hidden Information in Webpages Based on Randomness

Page 66: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

q Research on Steganalysis for Text Steganography Based on Font Format

T., Srinivasanq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating

Takabi, Hassanq Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

q Enhancing Role-Based Access Control Model through Fuzzy Relations

Tariq, Usmanq Binding Update Authentication Scheme for Mobile IPv6

Teoh, Andrew Beng Jinq Fuzzy Key Extraction from Fingerprint Biometrics Based on Dynamic Quantization

Mechanism

Page 67: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Thiagarajah, K.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block

Parity

Thomborson, Clarkq Metrics-Based Evaluation of Slicing Obfuscations

Tokhtabayev, Arnur G.q Non-stationary Markov Models and Anomaly Propagation Analysis in IDS

Toner, Stephenq Analysing the Security Threats against Network Convergence Architectures

Tseng, Ryh-Yuhq A Theoretical Security Model for Access Control and Security Assurance

Page 68: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Vedachalam, Arunq HPRS: A Hybrid P2P Reputation System Using File and Peer Rating

Veenman, Cor J.q Statistical Disk Cluster Classification for File Carving

Venkatesan, M.q A New Data Hiding Scheme with Quality Control for Binary Images Using Block

Parity

Wang, Haoq Certified Email Delivery with Offline TTP

Warnier, Martijnq Organized Anonymous Agents

Page 69: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Wei, Chia-Hungq Protection of Mammograms Using Blind Steganography and Watermarking

Wood, J. Robert (Bob) G.q Operational Risk: Acceptability Criteria

Xiang, Lingyunq Research on Steganalysis for Text Steganography Based on Font Format

Xiao, Hannanq A Performance Comparison of Wireless Ad Hoc Network Routing Protocols

under Security Attack

Xiao, Xiangrongq Second-LSB-Dependent Robust Watermarking for Relational Database

Page 70: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Xu, Xiangq Certified Email Delivery with Offline TTP

Yan, Zhuangq A Security Model for Detecting Suspicious Patterns in Physical Environment

Yang, Naikuoq A Purpose-Based Access Control Model

Yang, Zhenrongq Team Edit Automata for Testing Security Property

Yanji, Piaoq Binding Update Authentication Scheme for Mobile IPv6

Page 71: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Yao, Liq Levels of Authentication Assurance: An Investigation

Yautsiukhin, Artsiomq Modelling Quality of Protection in Outsourced Business Processes

Yoo, S.W.q Binding Update Authentication Scheme for Mobile IPv6

Youngs, Donnaq Application of Language Models to Suspect Prioritisation and Suspect Likelihood

in Serial Crimes

Zadora, Grzegorzq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic

Evidence Evaluation

Page 72: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Zeng, Lingfangq FPGA/ASIC Based Cryptographic Object Store System

Zhang, Ningq Secure M-Commerce Transactions: A Third Party Based Signature Protocol

q A Purpose-Based Access Control Model

q Levels of Authentication Assurance: An Investigation

Zhang, Yueq SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy

Zhao, Hong-Jiaq Structural Digital Signature and Semi-fragile Fingerprinting for Image

Authentication in Wavelet Domain

Page 73: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

Zhou, Weiq Function-Based Authorization Constraints Specification and Enforcement

Zhu, Yanq Structural Digital Signature and Semi-fragile Fingerprinting for Image

Authentication in Wavelet Domain

Zieba-Palus, Janinaq Information-Theoretical Comparison of Likelihood Ratio Methods of Forensic

Evidence Evaluation

Ziv, Hadarq CCARCH: Architecting Common Criteria Security Requirements

Page 74: Third International Symposium on Information … International Symposium on Information Assurance and ... Security System for Mobile Ad Hoc ... Security Threats against Network Convergence

Papers by Author

A B C D E F G

H I J K L M N

O P Q R S T U

V W X Y Z