Personal tools
  •  
You are here: Home Program SAM'12: Thursday, July 19, 2012 Schedule
Important Date
July 16-19, 2012
The WORLDCOMP'12
22 joint conferences


« September 2015 »
Su Mo Tu We Th Fr Sa
12345
6789101112
13141516171819
20212223242526
27282930
Current Event
WORLDCOMP'15
Click Here

Past Events
WORLDCOMP'14
Click Here

WORLDCOMP'13
Click Here

WORLDCOMP'11
Click Here

WORLDCOMP'10
Click Here

WORLDCOMP'09
Click Here

WORLDCOMP'08
Click Here

WORLDCOMP'07 & '06
Click Here

Join Our Mailing List
Sign up to receive email announcements and updates about conferences and future events




 

SAM'12: Thursday, July 19, 2012 Schedule

Last modified 2012-07-08 18:21

To select a different schedule CLICK HERE

SESSION 9-SAM:    SECURITY SYSTEMS AND MANAGEMENT
                  Co-Chairs: Amir Aryanpour, University of Bedfordshire, UK
                  July 19, 2012 (Thursday); 08:00am - 11:20am
                  (LOCATION: Ballroom 6)

08:00 - 08:20am:  IRS: An Issue Resolution System for Cyber Attack Classification
                  and Management
                  Chris B. Simmons, Sajjan Shiva, Vinhthuy Phan, Vivek Shandilya,
                  Lakisha Simmons
                  University of Memphis, Memphis, TN, USA;
                  Indiana State University, Terre Haute, Indiana, USA

08:20 - 08:40am:  CamInSens - An Intelligent in-situ Security System for Public
                  Spaces
                  David d'Angelo, Carsten Grenz, Colin Kuntzsch, Manfred Bogen
                  Fraunhofer IAIS, Schloss Birlinghoven, Sankt Augustin, Germany;
                  Leibniz University Hannover, Hannover, Germany

08:40 - 09:00am:  Implementation of a Web Application for Evaluation of Web
                  Application Security Scanners
                  L. Ertaul and Y. Martirosyan
                  California State University, East Bay, Hayward, California, USA

09:00 - 09:20am:  Toward Design an Interoperability Framework for Security Policy
                  Languages
                  Amir Aryanpour, Song Y. Yan, Scott Davies, Andrew Harmel-law
                  University of Bedfordshire, UK; Technology Services, Capgemini, UK

09:20 - 09:40am:  Extention of Account Managment Method With Blind Signature Scheme
                  Ryu Watanabe and Yutaka Miyake
                  KDDI R&D Laboratories, Inc., Fujimino, Saitama, Japan

09:40 - 10:00am:  Combating Social Engineering a DoD Perspective
                  Nathaniel D. Amsden and Lei Chen
                  Sam Houston State University, Huntsville, Texas, USA

10:00 - 10:20am:  ISO 27001 Gap Analysis - Case Study
                  Ibrahim AL-Mayahi and Sa'ad P. Mansoor
                  Bangor University, Bangor, UK 

10:20 - 10:40am:  BREAK

10:40 - 11:00am:  Zachman Framework, the Owner's Perspective and Security
                  Levent Ertaul and V. Rathod
                  California State University, East Bay, Hayward, California, USA

11:00 - 11:20am:  Analytical impact of the Security Techniques on Information System
                  for Decision Making
                  Tejpreet Singh, Parminder Singh Nandha, Kanwaljit Singh                               
                  Khalsa College of Engg. & Tech., Punjab, India; CQ University
                  Australia, Australia; Amritsar College of Engg. & Tech., India


SESSION 10-SAM:   SECURITY APPLICATIONS + ABUSE PREVENTION METHODS + SOFTWARE & TOOLS
                  Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA
                  July 19, 2012 (Thursday); 11:20am - 12:00pm
                  (LOCATION: Ballroom 6)

11:20 - 11:40am:  A Conceptual Framework for Securing Digital I&C Systems in Nuclear
                  Power Plants
                  Jung-Woon Lee, Jae-Gu Song, Cheol-Kwon Lee, and Dong-Young Lee
                  I&C and HF Research Division, Korea Atomic Energy Research Institute,
                  Daejeon, Republic of Korea

11:40 - 12:00pm:  Sterilization of Stego-images Through Histogram Normalization
                  Goutam Paul and Imon Mukherjee
                  Jadavpur University, Kolkata, India;
                  St. Thomas College of Engineering Technology, Kolkata, India

12:00 - 01:00pm:  LUNCH (On Your Own)


SESSION 11-SAM:   SECURITY APPLICATIONS AND ALGORITHMS
                  Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA
                  July 19, 2012 (Thursday); 01:00pm - 03:00pm
                  (LOCATION: Ballroom 6)

01:00 - 01:20pm:  Security Concerns and Disruption Potentials Posed by a Compromised AMI
                  Network: Risks to the Bulk Power System
                  Mohammed M. Olama, James Nutaro, Vladimir Protopopescu, Robert Coop
                  Computational Sciences & Engineering Division, Oak Ridge National Laboratory,
                  Tennessee, USA; University of Tennessee, Knoxville, Tennessee, USA

01:20 - 01:40pm:  Practical Security in E-Mail Applications
                  Franziskus Kiefer, Alexander Wiesmaier, Christian Fritz
                  Technische Universitat Darmstadt, Darmstadt, Germany;
                  AGT Group (R&D) GmbH, Darmstadt, Germany

01:40 - 02:00pm:  A Method For Engineering Secure Control Systems With Application To
                  Critical Infrastructures
                  James Nutaro, Ike Patterson, Glenn Allgood, Teja Kuruganti, David Fugate
                  Oak Ridge National Laboratory, Tennessee, USA

02:00 - 02:20pm:  Clustering Online Social Network Communities Using Genetic Algorithms
                  Dipankar Dasgupta, Mustafa H. Hajeer, Alka Singh, Sugata Sanyal
                  University of Memphis, Memphis, Tennessee, USA

02:20 - 02:40pm:  Securing Your Containers: An Exercise in Secure High Performance
                  Virtual Containers
                  Adam Miller and Lei Chen
                  Sam Houston State University, Huntsville, Texas, USA

02:40 - 03:00pm:  FREE SLOT

03:00 - 03:20pm:  BREAK


SESSION 12-SAM:   (CONCURRENT SESSION WITH PART OF SESSION 14-SAM)
                  INFORMATION ASSURANCE, SECURITY, AND MANAGEMENT
                  Co-Chairs: Prof. Hiroshi Fujinoki, Dept. of CS, Southern Illinois
                             University Edwardsville, Illinois, USA;
                             Prof. Dipankar Dasgupta; Director, Center for Information
                             Assurance & Prof. of CS, The University of Memphis, USA
                  July 19, 2012 (Thursday); 03:20pm - 04:40pm
                  (LOCATION: Ballroom 6)

03:20 - 03:40pm:  A Multi-Attribute Evaluation of Information Security Controls in
                  Organizations Using Grey Systems Theory
                  Abdel Ejnioui, Angel R. Otero, Carlos E. Otero, Abrar A. Qureshi
                  University of South Florida Polytechnic, Lakeland, Florida, USA;
                  Nova Southeastern University, Fort Lauderdale, Florida, USA;
                  The University of Virginia's College at Wise, Virginia, USA

03:40 - 04:00pm:  Management - An Achilles Heel of Information Assurance Security: A
                  Case Study of Verizon's Data Breach Reports
                  Pedro A. Diaz-Gomez, Alfonso Valencia Rodriguez and Luis E. Gomez H.
                  Cameron University, Lawton, Oklahoma, USA;
                  Universidad Piloto de Colombia, Colombia

04:00 - 04:20pm:  Impact Evaluation and Prediction Model for Clustering Social Groups
                  Yanping Zhao, BaoShan Bu, Senlin Luo
                  Beijing Institute of Technology, Beijing, P. R. China

04:20 - 04:40pm:  EC- RBAC Model: Secured Access Control Model for Exigent Scenarios
                  in Defense Systems
                  Syed Amanullah Quadri and Abdullah S Al Ghamd
                  Kingdom of Saudi Arabia, Saudi Arabia


SESSION 13-SAM:   (CONCURRENT SESSION WITH PART OF SESSION 14-SAM)
                  SPECIAL TRACK ON MOBILE AND EMBEDDED SYSTEM SECURITY
                  Co-Chairs: Dr. Christopher Bolan,
                  SECAU - Security Research Group, Edith Cowan University, Western Australia
                  July 19, 2012 (Thursday); 04:40pm - ...
                  (LOCATION: Platinum Room)

                  Note: We anticipate a large number of speaker no-shows for this track
                  (probably over 80%) due to potential delay in obtaining US visa, non
                  registration, late papers, ... In cases of no-shows, the presentations
                  can be moved up to close time gaps in the session. Each talk is 15 to
                  20 minutes long.

                  O. User Reaction Towards End User License Agreements on Android Smartphones
                     Hamish Cotton and Christopher Bolan
                     SECAU - Security Research Group, Edith Cowan University, Western Australia
                  O. A Proposed Method for Examining Wireless Device Vulnerability to Brute
                     Force Attacks via WPS External Registrar PIN Authentication Design
                     Symon Aked, Christopher Bolan, Murray Brand
                     Edith Cowan University, Perth, Western Australia;
                     SECAU - Security Research Group, Edith Cowan University, Western Australia
                  O. Science or Experience: What is More Relevant?
                     Ken Fowle
                     SECAU - Security Research Group, Edith Cowan University, Western Australia
                  O. The 2011 IDN Homograph Attack Mitigation Survey
                     Peter Hannay and Greg Baatard
                     SECAU - Security Research Group, Edith Cowan University, Western Australia
                  O. An Overview of Cloud Computing and Related Security Concerns
                     Krishnun Sansurooah
                     SECAU - Security Research Group, Edith Cowan University, Western Australia
                  O. Utilising the RFID LOCK Command Against Multiple Targets
                     Christopher Bolan
                     SECAU - Security Research Group, Edith Cowan University, Western Australia


SESSION 14-SAM:   (CONCURRENT SESSION WITH SESSIONS 12-SAM AND 13-SAM)
                  TOPICS IN SECURITY AND MANAGEMENT + LATE PAPERS
                  Co-Chairs: Dr. Sergey Morozov, University of Detroit Mercy, USA
                  July 19, 2012 (Thursday); 02:00pm - ...
                  (LOCATION: Ballroom 7)

                  Note: We anticipate a large number of speaker no-shows for this track
                  (probably over 80%) due to potential delay in obtaining US visa, non
                  registration, late papers, ... In cases of no-shows, the presentations
                  can be moved up to close time gaps in the session. Each talk is 15 to
                  20 minutes long and there is a BREAK at 3:00pm for 20 minutes.

                  O. Novel Weight Based Intra Cluster Group Security and Key Management
                     Applying Rivest-Shamir-Adleman Algorithm
                     Dr. Meera Gandhi, K. Gomathi; Sathyabama University, Chennai, India
                  O. A Steganosis Algorithm With Reversible Wavelets and Conditional Probability
                     E. A. Yfantis, R. Gripentog, J. Baker, R. Young
                     ICIS Laboratory and National Supercomputer Center, University of Nevada,
                     Las Vegas, USA
                  O. Security Authentication Using Improved RBAC Model
                     Hana Do, Sungjin Kim, Hoon Jeong, Eui-In Choi
                     Hannam University, Daejeon, Korea
                  O. Database Security Requirement on Cloud Computing
                     Hana Do, Hoon Jeong, Sungjin Kim, Eui-In Choi
                     Hannam University, Daejeon, Korea
                  O. ZLA: Towards Zero-Leak Private Information in Online E-commerce Transactions
                     Hiroshi Fujinoki, Christopher A. Chelmecki, and David M. Henry
                     Southern Illinois University Edwardsville, Illinois, USA


To select a different schedule CLICK HERE
Announcements
All tracks of WORLDCOMP have received high citations
Click Here for details

Condolences
Click Here for details

WORLDCOMP'12 Exhibition
Click Here for details


2012 Co-Sponsors
Bioinformatics & Computational Biology Program
George Mason University, USA

Biomedical Cybernetics Laboratory
HST of Harvard University & MIT, USA

Minnesota Supercomputing Institute
University of Minnesota, USA

Center for Cyber Defense, NCAT

Argonne's Leadership Computing Facility of Argonne National Laboratory
Illinois, USA

The Center for Advanced Studies in Identity Sciences
(CASIS: NC A&T;, Carnegie Mellon, Clemson, UNC Wilmington

Knowledge Management & Intelligent System Center (KMIS)
University of Siegen, Germany

Intelligent Cyberspace Engineering Lab., ICEL
Texas A&M; University, Texas, USA
UMIT, Institute of Bioinformatics and Translational Research
Austria

Hawkeye Radiology Informatics
Department of Radiology, College of Medicine, University of Iowa, USA

The International Council on Medical and Care Compunetics
US Chapter of World Academy of Science

Supercomputer Software Department (SSD)
Institute of Computational Mathematics & Mathematical Geophysics, Russian Academy of Sciences


International Society of Intelligent Biological Medicine

Medical Image HPC & Informatics Lab (MiHi Lab)
University of Iowa, USA

High Performance Computing for Nanotechnology (HPCNano)

Manx Telecom

Computer Science Research, Education, and Applications Press;

World Academy of Biomedical Sciences and Technologies




Super Micro Computer, Inc.,
San Jose, California, USA


Intel Corporation


Altera Corporation


Hodges Health

Leading Knowledge


Science Publication

 


Administered by UCMSS
Universal Conference Management Systems & Support
San Diego, California, USA
Contact: Kaveh Arbtan

If you can read this text, it means you are not experiencing the Plone design at its best. Plone makes heavy use of CSS, which means it is accessible to any internet browser, but the design needs a standards-compliant browser to look like we intended it. Just so you know ;)