Personal tools
You are here: Home Program SAM'12: Wednesday, July 18, 2012 Schedule
Important Date
July 16-19, 2012
22 joint conferences

« September 2015 »
Su Mo Tu We Th Fr Sa
Current Event
Click Here

Past Events
Click Here

Click Here

Click Here

Click Here

Click Here

Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events


SAM'12: Wednesday, July 18, 2012 Schedule

Last modified 2012-06-29 00:51

To select a different schedule CLICK HERE

6:45am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)

                  Chair: Dr. Kathy Liszka, University of Akron, USA
                  July 18, 2012 (Wednesday); 08:00am - 10:40am
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  Security in the Cloud: A Stake Holder's Perspective
                  Vivek Shandilya and Sajjan Shiva
                  University of Memphis, Memphis, TN, USA

08:20 - 08:40am:  Design and Analysis of Message Categorization Method - Towards
                  Security Support System Preventing Human Errors
                  Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
                  Information Security Laboratory, KDDI R&D Laboratories Inc.,
                  Fujimino, Saitama, Japan

08:40 - 09:00am:  Identifying Illegal Digital Images: An Image Watermark Approach to
                  Preventing the Spread of Pornography
                  Mark Wilson, Qingzhong Liu, and Lei Chen
                  Sam Houston State University, Huntsville, Texas, USA

09:00 - 09:20am:  Cloud Computing Security Using DOSBAD: Denial of Service Bandwidth
                  Biswajit Panja, Dayton Paul, Priyanka Meharia, Alex Henke
                  University of Michigan-Flint, Flint, Michigan, USA;
                  Eastern Michigan University, Ypsilanti, Michigan, USA

09:20 - 09:40am:  Electronic Identity Management Infrastructure For Trustworthy Services
                  in E-Government and E-Commerce
                  Polzonetti A., Marcantoni F., Falcioni D.
                  School of Science and Technology University of Camerino, Italy

09:40 - 10:00am:  An Overview of Laws And Standards For Health Information Security
                  and Privacy
                  Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang
                  North Carolina A&T State University, Greensboro, North Carolina, USA

10:00 - 10:20am:  Designing and Deploying a Secured VO for a Wine Geo-traceability
                  Francois Barrere, Romain Laborde, Abdelmalek Benzekri
                  Laborde, Benzekri, IRIT Laboratory, Paul Sabatier University,
                  Toulouse cedex, France

10:20 - 10:40am:  BREAK

10:40 - 11:00am:  FREE SLOT

                  Chair: Dr. Michael Grimaila, Air Force Institute of Technology, USA
                  July 18, 2012 (Wednesday); 11:00am - 12:20pm
                  (LOCATION: Ballroom 6)

11:00 - 11:20am:  Secure Management of Certificates for Industrial Control Systems
                  Sebastian Obermeier, Ragnar Schierholz, Hadeli Hadeli, Robert R. Enderlein,
                  Ana Hristova, Thomas Locher
                  ABB Corporate Research, Industrial Software Systems, Baden, Switzerland

11:20 - 11:40am:  Information Security Analysis Using Game Theory and Simulation
                  Bob G. Schlicher and Robert K. Abercrombie
                  Oak Ridge National Laboratory, Oak Ridge, TN, USA

11:40 - 12:00pm:  The New Old Discipline of Cyber Security Engineering
                  Thomas Fuhrman
                  Herndon, Virginia, USA

12:00 - 12:20pm:  A Survey of Cyberspace Mission Assurance Within United States Air Force
                  Communications Squadrons
                  Mickey Evans, Michael R. Grimaila, and Robert F. Mills
                  Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA

12:20 - 01:20pm:  LUNCH (On Your Own)

                  Co-Chairs: Prof. Hyung-Woo Lee, Hanshin University, Republic of Korea;
                             Dr. Lamine M. Aouad, Centre of Cybercrime Investigation,
                             University College Dublin, Ireland;
                             Dr. Vahan Markarov, State Eng. University of Armenia, Armenia.
                  July 18, 2012 (Wednesday); 01:20pm - 04:00pm
                  (LOCATION: Ballroom 6)

01:20 - 01:40pm:  FREE SLOT

01:40 - 02:00pm:  Android Forensics: a Physical Approach
                  Lamine M. Aouad and Tahar M. Kechadi
                  Centre of Cybercrime Investigation, University College Dublin, Ireland

02:00 - 02:20pm:  Facial Image and Voice Data Based One-Time Password (FV-OTP) Mechanism
                  for e-Financial Authentication System on a Smart Phone
                  You Joung Ham, Won-Bin Choi, Hyung-Woo Lee
                  Hanshin University, Yangsan-dong, Osan, Gyyunggi Province, South Korea

02:20 - 02:40pm:  A Study of the Graphical User Interfaces for Biometric Authentication
                  Hiroshi Dozono, Takayuki Inoue, and Masanori Nakakuni
                  Saga University, Japan; Fukuoka University, Japan

02:40 - 03:00pm:  Securing Sensitive Data Stored on Smartphones: Using Face Recognition
                  to Unlock Mobile Devices
                  Mark Wilson and Lei Chen
                  Sam Houston State University, Huntsville, Texas, USA

03:00 - 03:20pm:  BREAK

03:20 - 03:40pm:  An Efficient Acceleration of Digital Fonensics Search Using GPGPU
                  Chung-han Chen and Fan Wu
                  Tuskegee University, Tuskegee, Alabama, USA

03:40 - 04:00pm:  Utilization of Fingerprint System in The Mobile E-Government
                  KyoungYul Bae, Jongwon Kim, Hyun Byun
                  Sangmyung University, Republic of Korea

                  Chair: Dr. Levent Ertaul, California State University East Bay, USA;
                         Dana Isa Al Tehmazi, Bahrain Internet Exchange and Ahlia
                         University, Kingdom Of Bahrain.
                  July 18, 2012 (Wednesday); 04:00pm - 06:00pm
                  (LOCATION: Ballroom 6)

04:00 - 04:20pm:  Enabling Searchable Dynamic Data Management for Group Collaboration
                  in Cloud Storages
                  Fu-Kuo Tseng and Rong-Jaye Chen
                  National Chiao Tung University, Hsinchu, Taiwan

04:20 - 04:40pm:  Signature as Public Key Structured Cryptosystem and its Application
                  Kenichi Arai and Hiroyuki Okazaki
                  Tokyo University of Science, Japan; Shinshu University, Japan

04:40 - 05:00pm:  End-to-End Encrypting Android Phone Calls
                  Ian Burns, Kasimir Gabert, Jun Zheng
                  New Mexico Institute of Mining and Technology, New Mexico, USA

05:00 - 05:20pm:  Optimization Schemes for Privacy Key Management Protocol at WIMAX
                  Marjan Abdeyazdan, Vahid Arjmand, Morteza Doorandish, Mohsen Mosavi
                  Islamic Azad Universiy, Mahshahr, Iran

05:20 - 05:40pm:  Reconfigurable Steganographic System with Hidden Double Layered
                  G. Margarov, V. Markarov, A. Khachaturov
                  State Engineering University of Armenia, Yerevan, Armenia

05:40 - 06:00pm:  Global QoS Framework for Cloud Security: A Paradigm Shift Toward a
                  New Trust Concept
                  Nabil El Kadhi and Dana Al Tehmazi
                  Ahlia University, Bahrain

                  (Please see the lists at the begining of this booklet)

To select a different schedule CLICK HERE
All tracks of WORLDCOMP have received high citations
Click Here for details

Click Here for details

WORLDCOMP'12 Exhibition
Click Here for details

2012 Co-Sponsors
Bioinformatics & Computational Biology Program
George Mason University, USA

Biomedical Cybernetics Laboratory
HST of Harvard University & MIT, USA

Minnesota Supercomputing Institute
University of Minnesota, USA

Center for Cyber Defense, NCAT

Argonne's Leadership Computing Facility of Argonne National Laboratory
Illinois, USA

The Center for Advanced Studies in Identity Sciences
(CASIS: NC A&T;, Carnegie Mellon, Clemson, UNC Wilmington

Knowledge Management & Intelligent System Center (KMIS)
University of Siegen, Germany

Intelligent Cyberspace Engineering Lab., ICEL
Texas A&M; University, Texas, USA
UMIT, Institute of Bioinformatics and Translational Research

Hawkeye Radiology Informatics
Department of Radiology, College of Medicine, University of Iowa, USA

The International Council on Medical and Care Compunetics
US Chapter of World Academy of Science

Supercomputer Software Department (SSD)
Institute of Computational Mathematics & Mathematical Geophysics, Russian Academy of Sciences

International Society of Intelligent Biological Medicine

Medical Image HPC & Informatics Lab (MiHi Lab)
University of Iowa, USA

High Performance Computing for Nanotechnology (HPCNano)

Manx Telecom

Computer Science Research, Education, and Applications Press;

World Academy of Biomedical Sciences and Technologies

Super Micro Computer, Inc.,
San Jose, California, USA

Intel Corporation

Altera Corporation

Hodges Health

Leading Knowledge

Science Publication


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)