2008 42nd Annual IEEE International Carnahan Conference on Security Technology

13-16 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 77
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (4940 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (758 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Welcome address

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • Executive Committee Emeritus

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • History note

    Publication Year: 2008, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (117 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents

    Publication Year: 2008, Page(s):vii - x
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Development trends of electronic authentication

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a description of present trends in authentication and authorization methods development not only from the technological point of view but it intends to demonstrate the necessity of these methods solving in compliance with legal regulations. First p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measures against police information leakage utilizing automatic encryption and access control software

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1536 KB) | HTML iconHTML

    National Police Agency (NPA) has developed the automatic encryption and access control software as an information security measure and has been operating it since 2007. This software works as follows: (1) principally prohibits information from being transferred to removable media; (2) encrypts information automatically when information is transferred to removable media; (3) logs the history of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New trends in security of electronic health documentation

    Publication Year: 2008, Page(s):13 - 16
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    Implementation and transmission of health documentation in electronic form stimulate higher requirements for their security. New possibilities of using XML technology for obtaining secured electronic health record are presented in this paper. It means integration of security techniques based on using of language XML. These technologies open new possibilities in encryption and sign of documents (XM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of global numbering plan with active anti-spit capability on VoIP

    Publication Year: 2008, Page(s):17 - 22
    Cited by:  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1007 KB) | HTML iconHTML

    The traditional E.164 codepsilas regularity enables the scoundrel to be possible not after the telecommunication userpsilas permission on easily the segment to userpsilas telephone number. It is difficult to meet the VoIP protection needs for using the packet filtering technology with the network-level gatekeeper defense mechanism. This paper proposed a VoIP access authorization verifying center (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel approach to the security of data hidden in multimedia objects

    Publication Year: 2008, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    The criterion for detecting hidden data in the fractal code of images has been suggested in the article. The approach consisting in estimating steganographic threats of every record in the fractal code has been used. This estimation has been based on the special features of fractal compression. The number of the positively estimated blocks has been used for drawing a general conclusion about the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure quantum packet transmission mechanism for wireless networks

    Publication Year: 2008, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    In the mobile wireless communication network, the network is a dynamic topology. In addition, mobile ad hoc network is a vulnerable network. The message transmitted from source to destination may traverse several intermediate nodes. The sender and receiver need set up a routing path from source to destination. It is a hard problem to build a secure routing path from source to destination because a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient digital image watermarking scheme

    Publication Year: 2008, Page(s):37 - 42
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (915 KB) | HTML iconHTML

    Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in lifting wavelet transform (LWT) due to it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital watermarking in digital images

    Publication Year: 2008, Page(s):43 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    The paper presents some properties of digital image watermarking based on discrete orthogonal transforms (DCT-discrete cosine transform and KLT-Karhunen Loeve Transform). This contribution is focused on the logical describing of watermarking method. In this paper basic analysis for the process of watermark implementation is presented. Comparing of two digital watermarking methods, both based on di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the implementation of access control in EMR

    Publication Year: 2008, Page(s):47 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The Electronic Medical Record (EMR) allows for the distributed collection and searching of healthcare information. However, it usually does not integrate easily into healthcare professionalspsila daily workflows. Barriers to its acceptance include costs such as time and effort, but also relational and educational issues. Access controls are likely to increase the barrier to acceptance, since their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust and secure scheme for image transmission over wireless channels

    Publication Year: 2008, Page(s):51 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (957 KB) | HTML iconHTML

    The great advances in wireless communication networks have led to high desire for a strong digital data transmission. However, illegal data access has become more easy and prevalent in wireless networks. In order to protect valuable data from undesirable readers, data encryption has become a critical issue. However, encryption techniques do not take into account wireless network characteristics su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient speaker verification system using speaker model clustering for T and Z normalizations

    Publication Year: 2008, Page(s):56 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    In speaker verification (SV) systems based on Gaussian mixture model-universal background model (GMM-UBM), normalization is an important component in the decision stage. Many normalization methods including the T- and Z-norms, have been proposed and investigated and these have contributed to state-of-the-art SV systems which have extremely low equal-error rates (EERs). In this paper, we consider a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Based security model for home system

    Publication Year: 2008, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of pattern hiding method of data application in JPEG-files

    Publication Year: 2008, Page(s):69 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (902 KB) | HTML iconHTML

    The method of embedding data into images, which are subject to subsequent JPEG-algorithm processing, has been suggested. The special features of embedding that determine secrecy and stability of confidential data have been considered. On purpose to develop an efficient steganographic method a criterion has been synthesized that has been applied as the goal function for embedding. The procedure of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security recommendations for implementation in distributed healthcare systems

    Publication Year: 2008, Page(s):76 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Healthcare applications involve complex structures of interacting processes and professionals that need to exchange information to provide the care services. In this kind of systems many different professional competencies, ethical and sensibility requirements as well a legal frameworks coexist and because of that the information managed inside the system should not be freely accessed, on the cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information protection from network sniffing of bandwidths sharing

    Publication Year: 2008, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (814 KB) | HTML iconHTML

    Sharing network bandwidth is significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprisepsilas confidential information. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and prote... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Countering ambiguity in exterior intrusion detection

    Publication Year: 2008, Page(s):89 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (502 KB) | HTML iconHTML

    Reliance on sensors for exterior intrusion detection is inherently uncertain because neither the occurrence nor the absence of an alarm has a unique cause. Does ldquoalarmrdquo status indicate that an intruder has been detected, or that current site conditions have satisfied the sensorpsilas alarm criteria, resulting in a nuisance alarm? Does ldquono alarmrdquo mean no intruder is present or non-d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic tamper detection sensor with very low false alarm rate

    Publication Year: 2008, Page(s):94 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3011 KB) | HTML iconHTML

    We describe a device designed to detect interference (vandalism or tampering) by acoustic means. The design employs both a piezoelectric vibration transducer and a common microphone in a novel mechanical arrangement. In contrast to conventional acoustic sensors that simply respond to vibrations above a threshold, this design analyses the outputs of the two to trigger an alarm. The method confers a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.