2008 International Conference on Information Science and Security (ICISS 2008)

10-12 Jan. 2008

Filter Results

Displaying Results 1 - 25 of 46
  • 2008 International Conference on Information Science and Security - Cover

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (278 KB)
    Freely Available from IEEE
  • 2008 International Conference on Information Science and Security - Title

    Publication Year: 2008, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • 2008 International Conference on Information Science and Security - Copyright

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 2008 International Conference on Information Science and Security - TOC

    Publication Year: 2008, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s):ix - xi
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks

    Publication Year: 2008, Page(s):3 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    The access scheduling on the control channels in TDMA wireless mesh networks is studied in this paper. The problem is to assign time-slots for each node in the network to access the control channels so that it is guaranteed that each node can broadcast the control packet to any one-hop neighbor in one scheduling cycle. The objective is to minimize the total number of different time-slots in the sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Particle Swarm Optimization Approach for Scheduling Flow-Shops with Multiprocessor Tasks

    Publication Year: 2008, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Particle swarm optimization (PSO) technique is employed in many optimization and search problems due to its simplicity and ability to tackle these problems successfully. This paper shows application of PSO in scheduling hybrid flow-shops with multiprocessor tasks. This scheduling problem is often encountered in computing and industrial applications. In order to improve the performance of PSO, hybr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dangers of Applying Web 2.0 Technologies in E-commerce Solutions

    Publication Year: 2008, Page(s):17 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Nowadays the E-commerce concept got widespread wide spread occurrence, today it is not only Web stores, but also various kinds of informational services and advertisement turnover. By growing of varieties sites competition grows too and Web technologies, that allows broadening functionality of Web applications and becoming more attractive, are evolve too. Now Web 2.0 concept is on everybody lips, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic Approach to Information Security in Organizations

    Publication Year: 2008, Page(s):26 - 31
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    This paper is about the strategy for organizational information security. Strategy has been argued important however got little highlight comparing to other fields in information security, even from academia. We formed concept of information security strategy in organizations, developed classification framework for them, and identified important factors influencing their effective implementation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm to Cluster Orthologous Proteins across Multiple Genomes

    Publication Year: 2008, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (923 KB) | HTML iconHTML

    In GOLD (genomes online database), the re It has been a successful technique, for researches on genome evolution and for functional annotation of newly sequenced genomes, to construct an OPCs(orthologous protein clusters) with the best reciprocal BLAST hits from multiple complete-genomes. It, however, needs time-labor processes to make the OPCs by hand and biological analysis. In order to reduce t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Oriented Batch Processing of Individual Rekeying

    Publication Year: 2008, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1937 KB) | HTML iconHTML

    For a long time multicast security researches have been going on. In multicast security the group key must be changed whenever users join or leave. We called it 'rekeying'. There are so far two main schemes of rekeying. One is individual rekeying and the other is periodic rekeying. However the two schemes have so serious weakness in some environment that they might not be suitable for scalable and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach to Search a Node in MANET

    Publication Year: 2008, Page(s):44 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Traditional sensor network environment have making the group and optimization method between nodes. But it is a not enough in MANET environment that consists of many wireless devices and various wired or wireless protocols. So, we propose a Novel Approach to Search a node in MANET based on TORA. We show our proposed scheme's architecture and algorithm. Our proposed scheme shows more efficient to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Efficiency Elevation Method of IT Security System Evaluation via Process Improvement

    Publication Year: 2008, Page(s):49 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    As IT industries grow rapidly, many kinds of problems refuted to information security have gained force. (Demands for information security products such as firewall, Intrusion (Detection System have grown and the reliability and the safety of information security products is gathering strength. The evaluation for information security products is putting in operation, but developers have a difficul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restricted Path Flooding Scheme in Distributed P2P Overlay Networks

    Publication Year: 2008, Page(s):58 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    In P2P overlay network, peers are able to directly share and exchange information without the help of a server. This results in a prompt and secure sharing of network resources and data handling. However, flooding algorithm that is used in distributed P2P network generated query message excessively. Our objective in this paper is to proposes a presents a restricted path flooding algorithm that can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of Flash Cryptographic File System Based on YAFFS

    Publication Year: 2008, Page(s):62 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    As the amount of flash memory being used in embedded device is increased and embedded devices become more important in many computing environments, embedded file system security becomes more important issue. Moreover embedded devices can be easily stolen or lost because of its high portability. If the lost embedded device has very important information, there's no means to protect it except data e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Next Hop Selection Scheme for Ad Hoc Wireless Networks

    Publication Year: 2008, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    In ad hoc wireless network, the position-based routing scheme has been proposed for the purpose of reducing control signaling overhead in networks and establishing the shortest, multi-hop routing path. In spite of several benefits, however, there are still some problems such as connectivity, reliability and security in the process of route discovery. In this paper, we propose an enhanced next hop ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm

    Publication Year: 2008, Page(s):72 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Intrusion detection systems are the basis of system protection from network attacks. However, intrusions are increasingly taking multi-stage procedures to attack a system, and cannot be detected by existing single stage intrusion detection systems. This paper proposes a multi-stage intrusion detection system architecture using hidden Markov model algorithm. This system considers every stage used b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New BESA Algorithm Development and Design for Network Security in Multimedia Communication

    Publication Year: 2008, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    New BESA cryptographic algorithm is suitable network environment and wire/wireless communication network, on implement easy, security rate preservation, scalable and reconfigurable. Though proposed algorithm strengthens security vulnerability of TCP/IP protocol and keep security about many user as that have authentication function in network environment, there is important purpose. So that new BES... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol

    Publication Year: 2008, Page(s):87 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as online negotiation, online shopping and electronic voting. Recently, we have improved a deniable authentication scheme proposed by Chou et al. du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Based Dynamic Adaptation of Intelligent Robots Using Enterprise Service Bus

    Publication Year: 2008, Page(s):94 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1404 KB) | HTML iconHTML

    Intelligent robots get data of the current situation from sensors and perform knowledgeable services. Intelligent robots must dynamically collaborate with environment, discover new services and reconfigure themselves by using the services for unforeseen situation. Therefore, dynamic adaptation is prerequisite for intelligent robots. In this paper, we propose an agent based dynamic adaptation frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surface Approximation Based on Two Types of Geometric Features

    Publication Year: 2008, Page(s):98 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1103 KB) | HTML iconHTML

    The complex models, in 3D computer graphics, can provide a convincing level of realism but rather cause problems in real-time applications focusing on real-time interactivity. Therefore, it is useful to have various simplified versions of the model according to the performance of the system. In this paper, we present a surface approximation algorithm based on two types of geometric features, which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating Symmetric and Asymmetric Ciphers with Register File Extension for Multi-word and Long-word Operation

    Publication Year: 2008, Page(s):102 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    In this paper, we propose a new register file architecture called the register file extension for multi-word and long-word operation (RFEMLO) to accelerate both symmetric and asymmetric cryptographic algorithms. Based on the idea that most of cryptographic algorithms heavily use multi-word or long-word operations, RFEMLO allows multiple contiguous registers to be specified as a single operand. RFE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EMCEM: An Efficient Multimedia Content Encryption Scheme for Mobile Handheld Devices

    Publication Year: 2008, Page(s):108 - 114
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Since many people consume multimedia content (music, movie etc.) on mobile devices, mobile DRM becomes important, which controls digital content usage under wireless environment. In a typical DRM model, a block cipher is usually used to encrypt multimedia content because of its reasonable security and performance. However, encrypting multimedia content using a block cipher in mobile environment re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Based Hybrid Managing Mechanism for Context-aware Service Compatibility

    Publication Year: 2008, Page(s):115 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    It is expected that the intelligent management system will be able to provide intelligent building services based on context-awareness mechanism, which consists of a sensor platform, a context-aware framework and an intelligent agent. The sensor platform collects raw data and sends them to a context-aware framework which perceives the residents and a building's context. The intelligent agent trigg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.