By Topic

Internet Security (WorldCIS), 2012 World Congress on

Date 10-12 June 2012

Filter Results

Displaying Results 1 - 25 of 59
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Special track: PhD/Doctorate consortium

    Publication Year: 2012, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Tutorial: Introduction to cryptography

    Publication Year: 2012, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (25 KB)

    Summary form only given. The discussion will begin from simple to more efficient and effective symmetric and asymmetric ciphers. The main objective of this tutorial is to explain the workings and implementations of cryptography as a form of security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop 1: E-learning security (ELS-2012)

    Publication Year: 2012, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Workshop 2: The first workshop on intelligent security systems for email management (ISSEM'2012)

    Publication Year: 2012, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Session 1: Information security

    Publication Year: 2012, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Encryption of multimedia medical content using programmable cellular automata

    Publication Year: 2012, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The paper present an encryption system based on a combination of a one-dimensional hybrid cellular automaton (CA) and a programmable cellular automaton (PCA) used for securing of medical data sent over the internet. The experimental results are based on the powerful of cellular automata encryption systems, already validated in my previously works. The method supports both software and hardware imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systems

    Publication Year: 2012, Page(s):17 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    The modern world is populated with so many virtual and physical Identity Access Management Systems (IAMSs) that individuals are required to maintain numerous passwords and login credentials. The tedious task of remembering multiple login credentials can be minimised through the utilisation of an innovative approach of single sign-in mechanisms. During recent times, several systems have been develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using associative memories in coding theory for communication channels

    Publication Year: 2012, Page(s):245 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Our paper presents a solution for designing and implementation of a hardware error correction and detection circuit using associative memories. Associative memories allow the searching of a binary stored value, having as an input data a partial (or modified) amount of this value. This associative memories' property can be used in communication for detecting and correcting the errors encountered in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neuro-cryptanalysis of DES

    Publication Year: 2012, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB) | HTML iconHTML

    In this paper, a new cryptanalytic attack on DES is presented. The proposed attack is a known-plaintext attack based on neural networks. In this attack we trained a neural network to retrieve parts of plaintext from ciphertext without retrieving the key used in encryption. The attack was practically, and successfully, implemented on DES. This attack required an average of 211 plaintext-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The implementation of a full EMV smartcard for a point-of-sale transaction

    Publication Year: 2012, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    This paper examines the changes in the payment card environment as they relate to EMV (named after Europay, MasterCard and Visa). This research shows that if the combined dynamic data authentication (CDA) card variant of the EMV card is deployed in a full EMV environment, given the relevant known vulnerabilities and attacks against the EMV technology, the consequences of unauthorized disclosure of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 2: Network security

    Publication Year: 2012, Page(s): 36
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Smart crawlers for flash-crowd DDoS: The attacker's perspective

    Publication Year: 2012, Page(s):37 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Flash-crowd DDoS attacks - in which the attacking bots aim to appear indistinguishable from the regular visitors to the victim web-site - have only recently been identified in the literature. While generally seen as the most advanced and most potent type of DDoS, flash crowd attacks are only partially understood, and their practical viability is still very much unclear. To the best of our knowledg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment

    Publication Year: 2012, Page(s):45 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker may spoof the identity of legitimate users before implementing more serious attacks. Most of the current Intrusion Detection Systems (IDS) that employ multi-layer approach to help towards mitigating network attacks, offer high detection accuracy rate and low numbers of false alarms. Dempster-Shafer t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing location privacy policies through an AOP-based reference monitor

    Publication Year: 2012, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    Location based services have become more and more popular over the last years and allow the tracking of persons and goods. User of these services often have little control over their private data as it is accessed, processed and stored. This paper presents a privacy enforcement concept that combines a sticky-policy approach with an aspect-oriented programming based reference monitor. We demonstrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DynFire: Dynamic firewalling in heterogeneous environments

    Publication Year: 2012, Page(s):57 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    This paper presents “DynFire,” a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, with particular focus on mobile users and users with restricted rights, such as subcontractors. The basic assumption behind DynFire is that, within a secured network domain separa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: Access control

    Publication Year: 2012, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactions

    Publication Year: 2012, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    Personal computer and server compartmentalization architectures are described to thwart CPU resident malware from accessing and tampering with users' critical credentials and purchase details during online transactions and system logins. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology

    Publication Year: 2012, Page(s):66 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Healthcare information systems collect, store and manage sensitive information about patients and, hence, it is imperative for such systems to provide robust access control mechanisms with a view to thwarting potential security and privacy threats. The access-control requirements in healthcare systems are quite diverse as compared to those of other systems. The existing subject-, role-, object-, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security concept of individual identification in academic environment of CTU in Prague

    Publication Year: 2012, Page(s):71 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Personnel identification is everyday struggle between each individual and security personnel. This is equally important on academic grounds where unauthorized individuals could access university resources and university research. We can assume that every academic individual poses university identification card that can be used for access to restricted areas, computers, library or cafeterias but th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical business security framework to combat malware threat

    Publication Year: 2012, Page(s):77 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Malware threats are continuously growing with sophistication. Though multiple layers of defense are provided at perimeter, network, host, application and data levels, it is still becoming a challenge to address malware related problems. They have grown in number as well as complexity and are responsible for attacks ranging from denial-of-service to compromising online banking accounts. In recent t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 4: Information security

    Publication Year: 2012, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Root cause analysis of session management and broken authentication vulnerabilities

    Publication Year: 2012, Page(s):82 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (66 KB) | HTML iconHTML

    While there are numerous approaches to secure web applications as one of the most prevalent ways to harness the potential of the Internet, attackers almost daily come up with new attempts to exploit various vulnerabilities and compromise data found on the Net. One of the possible venues to attain sustainable solutions is to follow strategic approaches based on detailed analysis and understanding o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.