547-048
|
Artificial
Immune using Multi-Level Negative Selection Approach to Anomaly Detection
A.A.A. Youssif, A.Z. Ghalwash, and S.A. Mohamed (Egypt)
|
Abstract
|
|
547-085
|
Reinforcement
of Privacy in 802.16 MAC Common Part Sublayer using the Principle
of Circularity
R. Bhakthavathsalam (India)
|
Abstract
|
|
547-094
|
An MSLS-EMM for Enforcing Confidentiality in Malicious Environments
B. Wang and J. Alves-Foss (USA)
|
Abstract
|
|
547-095
|
A Classification
of Security Patterns for the Transactions Between a Requester, an Intermediary,
and a Web-Service
J. Muñoz Arteaga, R. Mendoza González,
F.J. Álvarez (Mexico), and M. Vargas Martín (Canada)
|
Abstract
|
|
547-097
|
Security Vulnerability Categories in Major Software Systems
O.H. Alhazmi, S.-W. Woo, and Y.K. Malaiya (USA)
|
Abstract
|
|
547-802
|
ARP and ICMP Weaknesses: Impact and Network Performance Analysis of a Novel Attack Strategy
A. Anand, R. Rishi, and M. Kumar (India)
|
Abstract
|
|
547-803
|
STRBAC - An Approach Towards Spatio-Temporal Role-based Access Control
M. Kumar and R.E. Newman (USA)
|
Abstract
|
|
547-804
|
Experimental Evaluation of Network Security Through a Hierarchical Quantitative Metrics Model
F. El-Hassan, A. Matrawy, N. Seddigh, and B. Nandy (Canada)
|
Abstract
|
|
547-805
|
Securing
a Linux-based Multi-User Web Server
M. Prandini (Italy)
|
Abstract
|
|
What are Digital Object Identifers?
The topics of interest include, but are not limited to:
Communication Security -
Access control;
Authentication;
Cryptographic Protocols and Applications;
Digital Signatures;
Disaster Protocols ;
Hash Functions;
Warning Systems;
Network Security -
Computer/Network Disaster Recovery;
Global Security Architectures and Infrastructures;
Hacking and Intrusion Detection;
Secure Deletion;
Secure Email;
Spam
Viruses and Worms;
Web Security;
WiFi Spying/Sniffing;
Wireless Privacy;
Wireless Security;
Virtual Private Networks;
Information Security -
Biometrics;
Digital Rights Management;
Digitally Embedded Signatures;
DNA, Fingerprint, Iris, and Retina Scanning;
Identify Theft;
Information Hiding;
Legal and Regulatory Issues in Communication;
Operating System Security;
Plagiarism;
Privacy and Confidentiality;
Software Security;
Spyware;
Standards; and
Watermarking.