Program
There are a number of other sessions (not listed as part of SAM'12 in this schedule) that are of potential interest to SAM'12 participants (sessions belonging to other joint conferences of WORLDCOMP.) Therefore, you are encouraged to also check the schedules of other joint conferences. In particular, sessions in BIOCOMP'12, FECS'12, ICAI'12, ICOMP'12, ICWN'12, and IKE'12, discuss topics that are within the scope of SAM; these have been scheduled so that selected SAM'12 attendees can also participate in them.
Note that each conference is divided into a number of topical sessions. These sessions are not necessarily scheduled in the same room/location. Therefore, conference attendees are to check the location of the session(s) they wish to attend; The conference room numbers (Locations) appear in this document.
July 15 | |
---|---|
03:00 - 09:00pm | REGISTRATION (Second Floor, Conference Lobby; 1-5) |
July 16 | |
6:30am - 5:00pm | REGISTRATION (Second Floor, Conference Lobby: 1-5) |
08:30 - 08:45am |
Congress Opening Remarks - July 16, Monday Professor Hamid R. Arabnia (Chair, Steering Committee & Coordinator) University of Georgia, Georgia, USA (LOCATION: Monte Carlo Pavilion) |
08:50 - 09:45am |
Keynote Lecture 1 - July 16, Monday Teaching Software Engineering for Software as a Service using Massive Open Online Courses Professor David A. Patterson University of California at Berkeley, California, USA Member, National Academy of Engineering Member, National of Academy of Sciences Fellow of IEEE, ACM, and AAAS Shared (with John Hennessy) the IEEE John von Neumann Medal (LOCATION: Monte Carlo Pavilion) |
09:55 - 10:50am |
Keynote Lecture 2 - July 16, Monday Crowdsourcing, Human Computation, and Collective Intelligence Professor Haym Hirsh Rutgers University, New Jersey, USA Former Director (2006-2010) of Division of Information and Intelligent Systems, National Science Foundation, USA Visiting Scholar (2010-2011) at MIT's Center for Collective Intelligence, USA Prof. Hirsh received his PhD in 1989 from Stanford University. (LOCATION: Monte Carlo Pavilion) |
11:00 - 11:55am |
Keynote Lecture 3 - July 16, Monday ECL and Distributed Machine Learning with the HPCC Systems Platform Dr. Flavio Villanustre Vice-President of Technology Architecture and Product, HPCC Systems (Past positions and professions: Director of Infrastructure at LexisNexis; and also a neurosurgeon.) (LOCATION: Monte Carlo Pavilion) |
12:00 - 01:00pm | LUNCH (On Your Own) |
SESSION 1-SAM NETWORK SECURITY Chair: Dr. Gregory Vert, Texas A&M University, USA July 16, 2012 (Monday) 01:00pm - 02:20pm (LOCATION: Ballroom 6) |
|
01:00 - 01:20pm |
Environment Feature Map for Wireless Device Localization T. Kaiser, P. Card, K. Ferens University of Manitoba, Winnipeg, Manitoba, Canada Seccuris Inc., Winnipeg, MB, Canada |
01:20 - 01:40pm |
Peer-to-Peer Attacks and Defenses Yu Yang and Lan Yang California State Polytechnic University, Pomona, California, USA |
01:40 - 02:00pm |
The Systems for Detecting Port Scanner in 3G WCDMA Mobile Networks Sekwon Kim, Joohyung Oh, and Chaetae Im Advanced Operation Technology Team, Korea Internet & Security Agency IT Venture Tower, Seoul, South Korea |
02:00 - 02:20pm |
Peer to Peer File Sharing: Security Concerns, Unwanted Traffic Detection and Filtering Leonardo Carvajal and Lei Chen Sam Houston State University, Huntsville, Texas, USA |
SESSION 2-SAM COMPUTER AND INFORMATION SECURITY + ASSURANCE, SECURITY, & MANAGEMENT Chair: Dr. Kathy Liszka, University of Akron, USA July 16, 2012 (Monday) 02:20pm - 06:00pm (LOCATION: Ballroom 6) |
|
02:20 - 02:40pm |
A Theoretical Model for Probabilistically Based Detection and Mitigation of Malware Using Self Organizing Taxonomies Greg Vert, Anitha Chennamaneni, and SS Iyengar Texas A&M Central Texas, Killeen, Texas, USA Florida International University, Miami, Florida, USA |
02:40 - 03:00pm |
Identifying Rootkit Infections Using a New Windows Hidden-driver-based Rootkit Woei-Jiunn Tsaur and Lo-Yao Yeh Da-Yeh University, Changhua, Taiwan, R.O.C. National Center for High-Performance Computing, Tainan Taiwan, R.O.C. |
03:00 - 03:20pm |
Incorporating Soft Computing Techniques into Anomaly Intrusion Detection Systems Yingbing Yu Austin Peay State University, USA |
03:20 - 03:40pm |
BLAST Your Way Through Malware: Malware Analysis Assisted by Bioinformatics Tools Jay Pedersen, Dhundy Bastola, Ken Dick, Robin Gandhi, William Mahoney University of Nebraska at Omaha, Omaha, Nebraska, USA |
03:40 - 04:00pm |
Evaluating Intrusion Detection and Prevention Systems Using Tomahawk and Wireshark David Mudzingwa and Rajeev Agrawal North Carolina A&T State University, Greensboro, North Carolina, USA |
04:00 - 04:20pm |
Towards Effective Integrated Access Control Lists in Internet Networks Kamal A. Ahmat and Ammar Elnour City University of New York, New York, USA University of Sydney, NSW, Australia |
04:20 - 04:40pm |
Polymorphic Worms Detection Using A Supervised Machine Learning Technique Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier University of Cape Town, Rondebosch, South Africa University of Khartoum, Khartoum, Sudan |
04:40 - 05:00pm |
Firewall Access Control: Static and Dynamic Aspects Vladimir Zaborovsky and Vladimir Muliukha Telematics Department, State Polytechnical University, Saint-Petersburg, Russia |
05:00 - 05:20pm |
Application of Criterion-Based Multilayer Access Control to XML Documents Leon Pan University of the Fraser Valley, Abbotsford, BC, Canada |
05:20 - 05:40pm |
Weaknesses of EU Countries Cyber Strategies Kimberly Lukin University of Turku, Turku, Finland |
05:40 - 06:00pm |
Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems Guillermo A Francia III, David Thornton, Joshua Dawson Jacksonville State University, N Jacksonville, Alabama, USA |
06:00 - 09:00pm |
TUTORIALS + INVITED PRESENTATIONS (Partial overlap with session 2-SAM) (Please see the lists at the beginning of this booklet) |
09:10 - 11:30pm |
CONFERENCE RECEPTION DINNER / SOCIAL July 16 - Monday; 09:10 - 11:30pm (LOCATION: Ballrooms 1-5) |
July 17 | |
6:45am - 5:00pm | REGISTRATION (Second Floor, Conference Lobby: 1-5) |
SESSION 3-SAM CYBERSECURITY + SECURITY EDUCATION Co-Chairs: Prof. George Markowsky and Dr. Linda Markowsky University of Maine, Orono, Maine, USA July 17, 2012 (Tuesday) 08:00am - 03:00pm (LOCATION: Ballroom 6) |
|
08:00 - 08:20am |
Implementation Progress, Student Perceptions, and Refinement of a Virtual Information Security Laboratory Cory Cavanagh and Raymond Albert University of Maine at Fort Kent, Maine, USA |
08:20 - 08:40am |
On Conducting Cyber Security Labs from the Cloud Nick Flower and Kevin Amorin Northeastern University, Boston, MA, USA |
08:40 - 09:00am |
Effectiveness of Cybersecurity Competitions Ronald S. Cheung, Joseph P. Cohen, Henry Z. Lo, Fabio Elia, and Veronica Carrillo-Marquez University of Massachusetts Boston, MA, USA |
09:00 - 09:20am |
Who's That Knocking At Your Cybercastle's Gate? George Markowsky and Linda Markowsky University of Maine, Orono, Maine, USA |
09:20 - 09:40am |
Developing Small Team-based Cyber Security Exercises Brandon Mauer, William Stackpole, Daryl Johnson Rochester Institute of Technology, Rochester, New York, USA |
09:40 - 10:00am |
Employing Entropy in the Detection and Monitoring of Network Covert Channels Chaim Sanders, Jacob Valletta, Bo Yuan, Daryl Johnson, Peter Lutz Networking, Security & Systems Administration, Rochester Institute of Technology, New York, USA |
10:00 - 10:20am |
NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra Rochester Institute of Technology, Rochester, New York, USA |
10:20 - 10:40am | BREAK |
10:40 - 11:00am |
Toward a More Perfect Scoring System for the Northeast Collegiate Cyber Defense Competions (NECCDC) George Markowsky and Linda Markowsky University of Maine, Orono, Maine, USA |
11:00 - 11:20am |
UPnP Port Manipulation as a Covert Channel Steve Monette, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
11:20 - 11:40am |
A Multi-Disciplined Security Engineering Education Approach William D. Casper and Stephen M. Papa Lockheed Martin, Southern Methodist University, Texas, USA |
11:40 - 12:00pm |
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole, Daryl Johnson Rochester Institute of Technology, New York, USA |
12:00 - 12:20pm |
A Covert Channel in the TTL Field of DNS Packets Christopher Hoffman, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
12:20 - 01:20pm |
A Statistical Approach to Reduce Malware Inside an Information System in Banking Sector Gustavo A Valencia Zapata, Juan C Salazar Uribe Universidad Nacional de Colombia, Escuela de Ciencias Estadisticas, Medellin, Colombia |
12:40 - 01:20pm | LUNCH (On Your Own) |
01:20 - 01:40pm |
Audio Steganography Using High Frequency Noise Introduction David Wheeler, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
01:40 - 02:00pm |
Webpage Source Based Covert Channel Tarun Madiraju, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
02:00 - 02:20pm |
A Covert Channel Over Transport Layer Source Ports James R. F. Gimbe, Daryl Johnson, Peter Lutz, Bo Yuan Rochester Institute of Technology, New York, USA |
02:20 - 02:40pm |
Covert Channel in the BitTorrent Tracker Protocol Joseph Desimone, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
02:40 - 03:00pm |
A Physical Channel in a Digital World Michael D. Deffenbaugh, Daryl Johnson, Bo Yuan, Peter Lutz Rochester Institute of Technology, New York, USA |
03:00 - 03:20pm | BREAK |
SESSION 4-SAM SECURITY APPLICATIONS + ABUSE PREVENTION METHODS + SOFTWARE AND TOOLS Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA July 17, 2012 (Tuesday) 03:20pm - 06:00pm (LOCATION: Ballroom 6) |
|
03:20 - 03:40pm |
Infrared Technology Pinpoints Energy Loss in Buildings Timmy Nguyen and Leonidas Deligiannidis Wentworth Institute of Technology, Boston, MA, USA |
03:40 - 04:00pm |
Software Similarity and Metamorphic Detection Mausami Mungale and Mark Stamp San Jose State University, San Jose, California, USA |
04:00 - 04:20pm |
Cyber Semantic Account Management - User Behavior Modeling, Visualization and Monitoring Keith Shapiro and Tony Stirtzinge Securboration, Inc., Melbourne, Florida, USA |
04:20 - 04:40pm |
Vulnerability Assessment in Cloud Computing Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran University of North Texas, Denton, Texas, USA |
04:40 - 05:00pm |
A Deception Framework for Survivability Against Next Generation Cyber Attacks Ruchika Mehresh and Shambhu Upadhyaya University at Buffalo, Buffalo, New York, USA |
05:00 - 05:20pm |
Methods for Restricting Access in a Web Application Grant Miller and Nader Nassar International Business Machines (IBM), Boulder, Colorado, USA International Business Machines (IBM), Somers, New York, USA |
05:20 - 05:40pm |
A Bayesian Network Analysis of System Failure in the Presence of Low-Probability External Correlating Events Jack K. Horner Independent Researcher, USA |
05:40 - 06:00pm |
Tackling Internet Abuse in Great Britain: Towards a Framework for Classifying Severities of Flame Trolling Jonathan Bishop Electronic Law for Internet Empowerment Group Centre for Research into Online Communities and E-Learning Systems, Brussels, Belgium |
POSTER/DISCUSSION SESSION A-SAM July 17, 2012 (Tuesday) 06:00 - 06:30pm (LOCATION: Hallways of Ballrooms 1-5) |
|
|
|
06:00 - 09:00pm |
TUTORIALS + INVITED PRESENTATIONS (Please see the lists at the beginning of this booklet) |
July 18 | |
6:45am - 5:00pm | REGISTRATION (Second Floor, Conference Lobby: 1-5) |
SESSION 5-SAM SECURITY APPLICATIONS + HARDWARE SECURITY Chair: Dr. Kathy Liszka, University of Akron, USA July 18, 2012 (Wednesday) 08:00am - 10:40am (LOCATION: Ballroom 6) |
|
08:00 - 08:20am |
Security in the Cloud: A Stake Holder's Perspective Vivek Shandilya and Sajjan Shiva University of Memphis, Memphis, TN, USA |
08:20 - 08:40am |
Design and Analysis of Message Categorization Method - Towards Security Support System Preventing Human Errors Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake Information Security Laboratory, KDDI R&D Laboratories Inc., Fujimino, Saitama, Japan |
08:40 - 09:00am |
Identifying Illegal Digital Images: An Image Watermark Approach to Preventing the Spread of Pornography Mark Wilson, Qingzhong Liu, and Lei Chen Sam Houston State University, Huntsville, Texas, USA |
09:00 - 09:20am |
Cloud Computing Security Using DOSBAD: Denial of Service Bandwidth Allowance Biswajit Panja, Dayton Paul, Priyanka Meharia, Alex Henke University of Michigan-Flint, Flint, Michigan, USA Eastern Michigan University, Ypsilanti, Michigan, USA |
09:20 - 09:40am |
Electronic Identity Management Infrastructure For Trustworthy Services in E-Government and E-Commerce Polzonetti A., Marcantoni F., Falcioni D. School of Science and Technology University of Camerino, Italy |
09:40 - 10:00am |
An Overview of Laws And Standards For Health Information Security and Privacy Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang North Carolina A&T State University, Greensboro, North Carolina, USA |
10:00 - 10:20am |
Design and Low Power VLSI Implementation of Triple-DES Algorithm Alexandra Camacho, Isaac Sanchez, Eugene John and Ram Krishnan University of Texas at San Antonio, San Antonio, Texas, USA |
10:20 - 10:40am |
Designing and Deploying a Secured VO for a Wine Geo-traceability Application Francois Barrere, Romain Laborde, Abdelmalek Benzekri Laborde, Benzekri, IRIT Laboratory, Paul Sabatier University, Toulouse cedex, France |
10:40 - 11:00am | BREAK |
SESSION 6-SAM SPECIAL TRACK ON MISSION ASSURANCE AND CRITICAL INFRASTRUCTURE PROTECTION Chair: Dr. Michael Grimaila, Air Force Institute of Technology, USA July 18, 2012 (Wednesday) 11:00am - 12:20pm (LOCATION: Ballroom 6) |
|
11:00 - 11:20am |
Secure Management of Certificates for Industrial Control Systems Sebastian Obermeier, Ragnar Schierholz, Hadeli Hadeli, Robert R. Enderlein, Ana Hristova, Thomas Locher ABB Corporate Research, Industrial Software Systems, Baden, Switzerland |
11:20 - 11:40am |
Information Security Analysis Using Game Theory and Simulation Bob G. Schlicher and Robert K. Abercrombie Oak Ridge National Laboratory, Oak Ridge, TN, USA |
11:40 - 12:00pm |
The New Old Discipline of Cyber Security Engineering Thomas Fuhrman Herndon, Virginia, USA |
12:00 - 12:20pm |
A Survey of Cyberspace Mission Assurance Within United States Air Force Communications Squadrons Mickey Evans, Michael R. Grimaila, and Robert F. Mills Air Force Institute of Technology, AFIT/ENV, WPAFB, Ohio, USA |
12:20 - 01:20pm | LUNCH (On Your Own) |
SESSION 7-SAM BIOMETRICS AND FORENSICS Co-Chairs: Prof. Hyung-Woo Lee, Hanshin University, Republic of Korea and Dr. Lamine M. Aouad, Centre of Cybercrime Investigation, University College Dublin, Ireland July 18, 2012 (Wednesday) 01:20pm - 04:00pm (LOCATION: Ballroom 6) |
|
01:20 - 01:40pm | FREE SLOT |
01:40 - 02:00pm |
Android Forensics: a Physical Approach Lamine M. Aouad and Tahar M. Kechadi Centre of Cybercrime Investigation, University College, Dublin, Ireland |
02:00 - 02:20pm |
Facial Image and Voice Data Based One-Time Password (FV-OTP) Mechanism for e-Financial Authentication System on a Smart Phone You Joung Ham, Won-Bin Choi, Hyung-Woo Lee Hanshin University, Yangsan-dong, Osan, Gyyunggi Province, South Korea |
02:20 - 02:40pm |
A Study of the Graphical User Interfaces for Biometric Authentication System Hiroshi Dozono, Takayuki Inoue, and Masanori Nakakuni Saga University, Japan; Fukuoka University, Japan |
02:40 - 03:00pm |
Securing Sensitive Data Stored on Smartphones: Using Face Recognition to Unlock Mobile Devices Mark Wilson and Lei Chen Sam Houston State University, Huntsville, Texas, USA |
03:00 - 03:20pm | BREAK |
03:20 - 03:40pm |
An Efficient Acceleration of Digital Fonensics Search Using GPGPU Chung-han Chen and Fan Wu Tuskegee University, Tuskegee, Alabama, USA |
03:40 - 04:00pm |
Utilization of Fingerprint System in The Mobile E-Government KyoungYul Bae, Jongwon Kim, Hyun Byun Sangmyung University, Republic of Korea |
SESSION 8-SAM CRYPTOGRAPHIC TECHNOLOGIES + INFORMATION ASSURANCE & SECURITY Chair: Dr. Levent Ertaul, California State University East Bay, USA July 18, 2012 (Wednesday) 04:00pm - 06:00pm (LOCATION: Ballroom 6) |
|
04:00 - 04:20pm |
Enabling Searchable Dynamic Data Management for Group Collaboration in Cloud Storages Fu-Kuo Tseng and Rong-Jaye Chen National Chiao Tung University, Hsinchu, Taiwan |
04:20 - 04:40pm |
Signature as Public Key Structured Cryptosystem and its Application Kenichi Arai and Hiroyuki Okazaki Tokyo University of Science, Japan; Shinshu University, Japan |
04:40 - 05:00pm |
End-to-End Encrypting Android Phone Calls Ian Burns, Kasimir Gabert, Jun Zheng New Mexico Institute of Mining and Technology, New Mexico, USA |
05:00 - 05:20pm |
Optimization Schemes for Privacy Key Management Protocol at WIMAX Network Marjan Abdeyazdan, Vahid Arjmand, Morteza Doorandish, Mohsen Mosavi Islamic Azad Universiy, Mahshahr, Iran |
05:20 - 05:40pm |
Reconfigurable Steganographic System with Hidden Double Layered Authentication G. Margarov, V. Markarov, A. Khachaturov State Engineering University of Armenia, Yerevan, Armenia |
05:40 - 06:00pm |
Global QoS Framework for Cloud Security: A Paradigm Shift Toward a New Trust Concept Nabil El Kadhi and Dana Al Tehmazi Ahlia University, Bahrain |
06:00 - 09:00pm |
TUTORIALS + INVITED PRESENTATIONS (Please see the lists at the beginning of this booklet) |
July 19 | |
6:45am - 5:00pm | REGISTRATION (Second Floor, Conference Lobby: 1-5) |
SESSION 9-SAM SECURITY SYSTEMS AND MANAGEMENT Co-Chairs: Amir Aryanpour, University of Bedfordshire, UK July 19, 2012 (Thursday) 08:00am - 11:20am (LOCATION: Ballroom 6) |
|
08:00 - 08:20am |
IRS: An Issue Resolution System for Cyber Attack Classification and Management Chris B. Simmons, Sajjan Shiva, Vinhthuy Phan, Vivek Shandilya, Lakisha Simmons University of Memphis, Memphis, TN, USA Indiana State University, Terre Haute, Indiana, USA |
08:20 - 08:40am |
CamInSens - An Intelligent in-situ Security System for Public Spaces David d'Angelo, Carsten Grenz, Colin Kuntzsch, Manfred Bogen Fraunhofer IAIS, Schloss Birlinghoven, Sankt Augustin, Germany Leibniz University Hannover, Hannover, Germany |
08:40 - 09:00am |
Implementation of a Web Application for Evaluation of Web Application Security Scanners L. Ertaul and Y. Martirosyan California State University, East Bay, Hayward, California, USA |
09:00 - 09:20am |
Toward Design an Interoperability Framework for Security Policy Languages Amir Aryanpour, Song Y. Yan, Scott Davies, Andrew Harmel-law University of Bedfordshire, UK; Technology Services, Capgemini, UK |
09:20 - 09:40am |
Extention of Account Managment Method With Blind Signature Scheme Ryu Watanabe and Yutaka Miyake KDDI R&D Laboratories, Inc., Fujimino, Saitama, Japan |
09:40 - 10:00am |
Combating Social Engineering a DoD Perspective Nathaniel D. Amsden and Lei Chen Sam Houston State University, Huntsville, Texas, USA |
10:00 - 10:20am |
ISO 27001 Gap Analysis - Case Study Ibrahim AL-Mayahi and Sa'ad P. Mansoor Bangor University, Bangor, UK |
10:20 - 10:40am | BREAK |
10:40 - 11:00am |
Zachman Framework, the Owner's Perspective and Security Levent Ertaul and V. Rathod California State University, East Bay, Hayward, California, USA |
11:00 - 11:20am |
Analytical impact of the Security Techniques on Information System for Decision Making Tejpreet Singh, Parminder Singh Nandha, Kanwaljit Singh Khalsa College of Engg. & Tech., Punjab, India CQ University Australia, Australia Amritsar College of Engg. & Tech., India |
SESSION 10-SAM SECURITY APPLICATIONS + ABUSE PREVENTION METHODS + SOFTWARE & TOOLS Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA July 19, 2012 (Thursday) 11:20am - 12:20pm (LOCATION: Ballroom 6) |
|
11:20 - 11:40am |
A Conceptual Framework for Securing Digital I&C Systems in Nuclear Power Plants Jung-Woon Lee, Jae-Gu Song, Cheol-Kwon Lee, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy Research Institute, Daejeon, Republic of Korea |
11:40 - 12:00pm |
Sterilization of Stego-images Through Histogram Normalization Goutam Paul and Imon Mukherjee Jadavpur University, Kolkata, India St. Thomas College of Engineering Technology, Kolkata, India |
12:00 - 01:00pm | LUNCH (On Your Own) |
SESSION 11-SAM SECURITY APPLICATIONS AND ALGORITHMS Chair: Dr. Nizar Al Holou, University of Detroit Mercy, USA July 19, 2012 (Thursday) 01:00pm - 03:00pm (LOCATION: Ballroom 6) |
|
01:00 - 01:20pm |
Security Concerns and Disruption Potentials Posed by a Compromised AMI Network: Risks to the Bulk Power System Mohammed M. Olama, James Nutaro, Vladimir Protopopescu, Robert Coop Computational Sciences & Engineering Division, Oak Ridge National Laboratory, Tennessee, USA University of Tennessee, Knoxville, Tennessee, USA |
01:20 - 01:40pm |
Practical Security in E-Mail Applications Franziskus Kiefer, Alexander Wiesmaier, Christian Fritz Technische Universitat Darmstadt, Darmstadt, Germany AGT Group (R&D) GmbH, Darmstadt, Germany |
01:40 - 02:00pm |
A Method For Engineering Secure Control Systems With Application To Critical Infrastructures James Nutaro, Ike Patterson, Glenn Allgood, Teja Kuruganti, David Fugate Oak Ridge National Laboratory, Tennessee, USA |
02:00 - 02:20pm |
Clustering Online Social Network Communities Using Genetic Algorithms Dipankar Dasgupta, Mustafa H. Hajeer, Alka Singh, Sugata Sanyal University of Memphis, Memphis, Tennessee, USA |
02:20 - 02:40pm |
Securing Your Containers: An Exercise in Secure High Performance Virtual Containers Adam Miller and Lei Chen Sam Houston State University, Huntsville, Texas, USA |
02:40 - 03:00pm | FREE SLOT |
03:00 - 03:20pm | BREAK |
SESSION 12-SAM (CONCURRENT SESSION WITH PART OF SESSION 14-SAM) INFORMATION ASSURANCE, SECURITY, AND MANAGEMENT Co-Chairs: TBA July 19, 2012 (Thursday) 03:20pm - 04:40pm (LOCATION: Ballroom 6) |
|
03:20 - 03:40pm |
A Multi-Attribute Evaluation of Information Security Controls in Organizations Using Grey Systems Theory Abdel Ejnioui, Angel R. Otero, Carlos E. Otero, Abrar A. Qureshi University of South Florida Polytechnic, Lakeland, Florida, USA Nova Southeastern University, Fort Lauderdale, Florida, USA The University of Virginia's College at Wise, Virginia, USA |
03:40 - 04:00pm |
Management - An Achilles Heel of Information Assurance Security: A Case Study of Verizon's Data Breach Reports Pedro A. Diaz-Gomez, Alfonso Valencia Rodriguez and Luis E. Gomez H. Cameron University, Lawton, Oklahoma, USA Universidad Piloto de Colombia, Colombia |
04:00 - 04:20pm |
Impact Evaluation and Prediction Model for Clustering Social Groups Yanping Zhao, BaoShan Bu, Senlin Luo Beijing Institute of Technology, Beijing, P. R. China |
04:20 - 04:40pm |
EC- RBAC Model: Secured Access Control Model for Exigent Scenarios in Defense Systems Syed Amanullah Quadri and Abdullah S Al Ghamd Kingdom of Saudi Arabia, Saudi Arabia |
SESSION 13-SAM SPECIAL TRACK ON MOBILE AND EMBEDDED SYSTEM SECURITY Co-Chairs: Dr. Christopher Bolan, SECAU - Security Research Group, Edith Cowan University, Western Australia July 19, 2012 (Thursday) 04:40pm - ... (LOCATION: Platinum Room) |
|
Note: We anticipate a large number of speaker no-shows for this track (probably over 80%) due to potential delay in obtaining US visa, non registration, late papers, ... In cases of no-shows, the presentations can be moved up to close time gaps in the session. Each talk is 15 to 20 minutes long and there is a BREAK at 3:00pm for 20 minutes. | |
|
|
SESSION 14-SAM (CONCURRENT SESSION WITH SESSIONS 12-SAM AND 13-SAM) TOPICS IN SECURITY AND MANAGEMENT + LATE PAPERS Co-Chairs: Dr. Sergey Morozov, University of Detroit Mercy, USA July 19, 2012 (Thursday) 02:20pm - ... (LOCATION: Ballroom 7) |
|
Note: We anticipate a large number of speaker no-shows for this track (probably over 80%) due to potential delay in obtaining US visa, non registration, late papers, ... In cases of no-shows, the presentations can be moved up to close time gaps in the session. Each talk is 15 to 20 minutes long and there is a BREAK at 3:00pm for 20 minutes. | |
|