By Topic

WIAR '2012; National Workshop on Information Assurance Research; Proceedings of

Date 18-18 April 2012

Filter Results

Displaying Results 1 - 10 of 10
  • A Holistic View On The Opportunities and Risks Faced by Saudi Arabia Government in Their Adoption Of The New Law Regulating Electronic Privacy and

    Publication Year: 2012, Page(s):1 - 7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (478 KB)

    The increasing use of personal information in Internet-based applications has created privacy concerns worldwide, especially in the Kingdom of Saudi Arabia where there is no uniform e-Privacy Act. The following research aims to present a holistic view on the opportunities and risks faced by Saudi organizations and citizens in their adoption of the e-Privacy Act. This paper is a response to the req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Approach to Multiple Views Gait Recognition Based on Motion Contours Analysis

    Publication Year: 2012, Page(s):1 - 7
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1166 KB)

    Gait is one of well recognized biometrics that has been widely used for human identification. However, the current gait recognition might have difficulties due to viewing angle being changed. This is because the viewing angle under which the gait signature database was generated may not be the same as the viewing angle when the probe data are obtained. This paper proposes new multi-view gait recog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Tool for Assessing Security-Critical Designs and Programs

    Publication Year: 2012, Page(s):1 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3886 KB)

    This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric Cryptosystem with Renewable Templates

    Publication Year: 2012, Page(s):1 - 5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (798 KB)

    The major challenge of privacy protection of biometric template is improve the security of the biometric template. Biometric cryptosystems were proposed to hide the cryptographic keys as well as provide security protection of biometrics associated with the traditional biometric systems. A fuzzy commitment scheme is an example of such systems. Moreover, the biometric data cannot be canceled or chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Similarity and Dissimilarity: a Novel Approach for the Anomaly Intrusion Detection

    Publication Year: 2012, Page(s):1 - 6
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (610 KB)

    In this paper, we study the anomaly detection problem with the goal of minimizing memory and time complexity. Prior works need to check the whole training database to detect anomalous objects, and hence they are not scalable for large training databases. In this paper, we propose two similarity (resp., dissimilarity) measures. We show that similarity and dissimilarity can be described by one linea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detectable Tampering of JPEG Anti-Forensics

    Publication Year: 2012, Page(s):1 - 4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (453 KB)

    Many forensic techniques recently tried to detect the tampering and manipulation of JPEG compressed images that became a critical problem in image authentication and origin tracking. Some techniques indicated that a knowledgeable attacker can make it very hard to trace the image origin, while others indicated that portions of the compressed image that has been compressed at different quality facto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information security and Management To achievement objectives of professional practice for social work

    Publication Year: 2012, Page(s):1 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (520 KB)

    This study is an attempt to address and analyze the issue of Information security and Management To achievement objectives of professional practice for social work, and that access to the operational mechanisms proposed for how to manage and protect the information needed by it , according to the importance of information in general and the provision and management in the areas of service social a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Off-Line Arabic Signature Verification Using Geometrical Features

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (617 KB)

    In this paper, it has been presented an off-line signature verification scheme using the combination of geometrical and grid features. First, the geometrical features use four border points in the direction of right and left, up and down in addition to two lengths between vertical and horizontal directions. The first two points are connected between left point and the right. The second two points ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Assessment of Code Refactoring Rules

    Publication Year: 2012, Page(s):1 - 10
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1082 KB)

    Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level ref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Importance and Dilemmas of Security Education in Information System

    Publication Year: 2012, Page(s):1 - 5
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (522 KB)

    Today global economy, computer security & computer ethics are the important and challenging issues of any information System. These issues we can solve by creating the awareness of the security and ethics education to our society. This paper is based on the importance of security awareness in the society and there dilemmas. I tried in this paper to solve the challenging problems in which occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.