The Community for Technology Leaders
Information Assurance and Security, International Symposium on (2007)
Manchester, United Kingdom
Aug. 29, 2007 to Aug. 31, 2007
ISBN: 0-7695-2876-7
TABLE OF CONTENTS
Introduction

IAS 2007 Organisation (PDF)

pp. xiii-xiv

Keynote Speech (PDF)

pp. xv
E-Commerce Security

Secure M-commerce Transactions: A Third Party Based Signature Protocol (Abstract)

Ning Zhang , University of Mancester, UK
Lisha He , University of Mancester, UK
Ian Rogers , University of Mancester, UK
Lirong He , University of Mancester, UK
pp. 3-8

Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card (Abstract)

Deepak Phatak , Indian Institute of Technology, India
Satish Devane , Ramrao Adik Institute of Technology, India
Madhumita Chatterjee , Ramrao Adik Institute of Technology, India
pp. 9-14

Certified Email Delivery with Offline TTP (Abstract)

Jie Ling , Guangdong University of Technology, China
Hao Wang , Guangdong University of Technology, China
Xiang Xu , State University of New York at Stony Brook, USA
Yuyi Ou , Guangdong University of Technology, China
Lu Liang , Guangdong University of Technology, China
pp. 15-20

An Effective and Secure Buyer-Seller Watermarking Protocol (Abstract)

Sherif Hazem Nour El-Din , Information Technology Industry Development Agency, Egypt
Ibrahim M. Ibrahim , Information Technology Industry Development Agency, Egypt
Abdel Fatah A. Hegazy , Arab Academy for Science and Technology and Maritime Transportation, Egypt
pp. 21-28
Network Security

A Secure Authenticated Key Agreement Protocol For Wireless Security (Abstract)

Bachar El-Hassan , Libanese University, Lebanon
Abdallah Mhamed , GET/Institut National des Telecommunications, France
Pierre E. Abi-Char , GET/Institut National des Telecommunications, France
pp. 33-38

Hierarchical Multi-Party Key Agreement for Wireless Networks (Abstract)

Vladimir Oleshchuk , Agder University College, Norway
Sigurd Eskeland , Agder University College, Norway
pp. 39-43

Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol (Abstract)

David Llewellyn-Jones , Liverpool John Moores University, UK
Qi Shi , Liverpool John Moores University, UK
Madjid Merabti , Liverpool John Moores University, UK
Kashif Kifayat , Liverpool John Moores University, UK
pp. 44-49

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack (Abstract)

Su Mon Bo , University of Hertfordshire, UK
Hannan Xiao , University of Hertfordshire, UK
Aderemi Adereti , University of Hertfordshire, UK
Bruce Christianson , University of Hertfordshire, UK
James A. Malcolm , University of Hertfordshire, UK
pp. 50-55

On Detecting Packets Droppers in MANET: A Novel Low Cost Approach (Abstract)

Robert Askwith , Liverpool John Moores University, UK
Djamel Djenouri , CERIST, Algeria
Tarag Fahad , Liverpool John Moores University, UK
pp. 56-64
Cryptographic Schemes and Applications

Threshold SKI Protocol for ID-based Cryptosystems (Abstract)

Ashutosh Saxena , Infosys Technologies Ltd., India
pp. 65-70

Fuzzy Key Extraction from Fingerprint Biometrics based on Dynamic Quantization Mechanism (Abstract)

Thian Song Ong , Multimedia University, Malaysia
Andrew Beng Jin Teoh , Multimedia University, Malaysia
pp. 71-76

Low-cost Anonymous Timed-Release Encryption (Abstract)

G. Stephanides , University of Macedonia, Greece
K. Chalkias , University of Macedonia, Greece
D. Hristu-Varsakelis , University of Macedonia, Greece
pp. 77-82

Integrating Multi-Modal Circuit Features within an Efficient Encryption System (Abstract)

Evangelos Papoutsis , University of Kent, UK
Klaus McDonald-Maier , University of Essex, UK
Andrew Hopkins , University of Essex, UK
Gareth Howells , University of Kent, UK
pp. 83-88

A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography (Abstract)

Abdallah Mhamed , GET/Institut National des Telecommunications, France
Pierre E. Abi-Char , GET/Institut National des Telecommunications, France
Bachar El-Hassan , Libanese University, Lebanon
pp. 89-94

Inclusion of a Montgomery Multiplier Unit into an Embedded Processor?s Datapath to Speed-up Elliptic Curve Cryptography (Abstract)

G. Castagnini , Dipartimento di Ingegneria dell'Informazione, Italy
E. Martinelli , Dipartimento di Ingegneria dell'Informazione, Italy
S. Bartolini , Dipartimento di Ingegneria dell'Informazione, Italy
pp. 95-100

An LSB Data Hiding Technique Using Prime Numbers (Abstract)

Ajith Abraham , Norwegian University of Science and Technology, Norway
Sandipan Dey , Anshin Software Private Limited, India
Sugata Sanyal , Tata Institute of Fundamental Research, India
pp. 101-108
Authentication and Access Control

Binding Update Authentication Scheme for Mobile IPv6 (Abstract)

Kyung-suk Lhee , Ajou University, Korea
Shoaib Mukhtar , Ajou University, Korea
Irfan Ahmed , Ajou University, Korea
Piao Yanji , Ajou University, Korea
S.W. Yoo , Ajou University, Korea
ManPyo Hong , Ajou University, Korea
Usman Tariq , Ajou University, Korea
pp. 109-114

An Authentication Scheme Using Non-Commutative Semigroups (Abstract)

M. M. Chowdhury , The University of Manchester, UK
pp. 115-118

Function-Based Authorization Constraints Specification and Enforcement (Abstract)

Christoph Meinel , University of Potsdam, Germany
Wei Zhou , University of Potsdam, Germany
pp. 119-124

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations (Abstract)

Rasool Jalili , Sharif University of Technology, Iran
Hassan Takabi , Sharif University of Technology, Iran
Morteza Amini , Sharif University of Technology, Iran
pp. 125-130

Enhancing Role-Based Access Control Model through Fuzzy Relations (Abstract)

Rasool Jalili , Sharif University of Technology, Iran
Morteza Amini , Sharif University of Technology, Iran
Hassan Takabi , Sharif University of Technology, Iran
pp. 131-136

A Theoretical Security Model for Access Control and Security Assurance (Abstract)

Huan Chen , National Chung-Cheng University, Taiwan
Bo-Chao Cheng , National Chung-Cheng University, Taiwan
Ryh-Yuh Tseng , National Chung-Cheng University, Taiwan
pp. 137-142

A Purpose-Based Access Control Model (Abstract)

Naikuo Yang , University of Manchester, UK
Ning Zhang , University of Manchester, UK
Howard Barringer , University of Manchester, UK
pp. 143-148

SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy (Abstract)

James B.D. Joshi , University of Pittsburgh, USA
Yue Zhang , University of Pittsburgh, USA
pp. 149-154

Levels of Authentication Assurance: an Investigation (Abstract)

Aleksandra Nenadic , University of Manchester, UK
Terry Morrow , University of Manchester, UK
Ning Zhang , University of Manchester, UK
Li Yao , University of Manchester, UK
pp. 155-160
Intrusion Prevention

Vulnerability Assessment by Learning Attack Specifications in Graphs (Abstract)

Raul H. C. Lopes , Brunel University, UK
Virginia N. L. Franqueira , University of Twente, The Netherlands
pp. 161-164

Automatic Patch Generation for Buffer Overflow Attacks (Abstract)

Alexey Smirnov , Stony Brook University, USA
Tzi-cker Chiueh , Stony Brook University, USA
pp. 165-170

Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks (Abstract)

Muhammad Sher , Technical University Berlin, Germany
Thomas Magedanz , Technical University Berlin, Germany
pp. 171-176

Cyber Threat Trend Analysis Model Using HMM (Abstract)

Hoh Peter In , Korea University, Korea
Hee Jo Lee , Korea University, Korea
Do Hoon Kim , Korea University, Korea
Taek Lee , Korea University, Korea
Sung-Oh David Jung , Korea University, Korea
pp. 177-182

DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment (Abstract)

Svein Knapskog , Norwegian University of Science and Technology, Norway
Ajith Abraham , Norwegian University of Science and Technology, Norway
Kjetil Haslum , Norwegian University of Science and Technology, Norway
pp. 183-190
Intrusion Detection

Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain (Abstract)

R. C. Joshi , Indian Institute of Technology, India
Anjali Sardana , Indian Institute of Technology, India
Krishan Kumar , Indian Institute of Technology, India
pp. 191-196

IP protection: Detecting Email based breaches of confidence (Abstract)

Ahmet Kondoz , University of Surrey, UK
Lee Gillam , University of Surrey, UK
Neil Cooke , University of Surrey and CESG, GCHQ, UK
pp. 197-202

Building Trustworthy Intrusion Detection through VM Introspection (Abstract)

Fabrizio Baiardi , Universita di Pisa, Italy
Daniele Sgandurra , Universita di Pisa, Italy
pp. 209-214

A Security Model for Detecting Suspicious Patterns in Physical Environment (Abstract)

Zhuang Yan , University of Macau
Simon Fong , University of Macau
pp. 221-226

Detection of Web Defacements by means of Genetic Programming (Abstract)

Alberto Bartoli , University of Trieste, Italy
Cyril Fillon , University of Trieste, Italy
Eric Medvet , University of Trieste, Italy
pp. 227-234
Security Analysis

Team Edit Automata for Testing Security Property (Abstract)

Aiman Hanna , Concordia University, Canada
Mourad Debbabi , Concordia University, Canada
Zhenrong Yang , Concordia University, Canada
pp. 235-240

Analysing the Security Threats against Network Convergence Architectures (Abstract)

Linda Doyle , University of Dublin, Ireland
Donal O'Mahony , University of Dublin, Ireland
Stephen Toner , University of Dublin, Ireland
Robert McAdoo , University of Dublin, Ireland
Patroklos Argyroudis , University of Dublin, Ireland
pp. 241-246

Modelling Quality of Protection in Outsourced Business Processes (Abstract)

Artsiom Yautsiukhin , University of Trento, Italy
Fabio Massacci , University of Trento, Italy
pp. 247-252

Modeling Security Protocols as Games (Abstract)

Mohamed Saleh , Concordia University, Canada
Mourad Debbabi , Concordia University, Canada
pp. 253-260
Data Security and Privacy

A Secure Storage Service for the gLite Middleware (Abstract)

Diego Scardaci , INFN Catania, UNICO S.R.L., Italy
Giordano Scuderi , INFN Catania, UNICO S.R.L., Italy
pp. 261-266

FPGA/ASIC based Cryptographic Object Store System (Abstract)

Lingfang Zeng , Huazhong University of Science and Technology, China
Lanxiang Chen , Huazhong University of Science and Technology, China
Zhongying Niu , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
pp. 267-272

An Architecture for Privacy Preserving Collaborative Filtering on Web Portals (Abstract)

Waseem Ahmad , University of Illinois, USA
Ashfaq Khokhar , University of Illinois, USA
pp. 273-278

Enforcing Privacy by Means of an Ontology Driven XACML Framework (Abstract)

Dhiah el Diehn I. Abou-Tair , University of Siegen, Germany
Stefan Berlik , University of Siegen, Germany
Udo Kelter , University of Siegen, Germany
pp. 279-284

Addressing privacy issues in CardSpace (Abstract)

Chris J. Mitchell , University of London, UK
Waleed A. Alrodhan , University of London, UK
pp. 285-291

Second-LSB-Dependent Robust Watermarking for Relational Database (Abstract)

Xiangrong Xiao , Hunan University, China
Minggang Chen , Hunan University, China
Xingming Sun , Hunan University, China
pp. 292-300
Risk and Trust Management

Operational risk: acceptability criteria (Abstract)

J. Robert (Bob) G. Wood , University of Manchester, UK
Daniel Gideon Dresner , The National Computing Centre, UK
pp. 301-306

HPRS: A Hybrid P2P Reputation System using File and Peer Rating (Abstract)

Varun Ramachandran , Sri Venkateswara College of Engineering, India
Srinivasan T. , Indian Institute of Technology Kharagpur, India
Arun Vedachalam , Sri Venkateswara College of Engineering, India
S. K. Ghosh , Indian Institute of Technology Kharagpur, India
pp. 307-312

Resource Classification Based Negotiation in Web Services (Abstract)

Diala Abi Haidar , France Telecom R&D Caen, France; ENST Bretagne, France
Herv? Debar , France Telecom R&D Caen, France
Nora Cuppens , ENST Bretagne, France
Fr?d?ric Cuppens , ENST Bretagne, France
pp. 313-318

Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance (Abstract)

Elvis Papalilo , University of Marburg, Germany
Bernd Freisleben , University of Marburg, Germany
pp. 319-324

Dynamic Risk Mitigation in Computing Infrastructures (Abstract)

Nicholas Bambos , Stanford University, USA
R. Ann Miura-Ko , Stanford University, USA
pp. 325-328

Risk management in coalition networks (Abstract)

Wim Mees , Royal Military Academy, Belgium
pp. 329-336
Security Requirements and Policies

On the Definition and Policies of Confidentiality (Abstract)

Gerardo Schneider , University of Oslo, Norway
Johs Hansen Hammer , NAV, Norway
pp. 337-342

CCARCH: Architecting Common Criteria Security Requirements (Abstract)

Hadar Ziv , University of California, Irvine, USA
Jose Romero-Mariona , University of California, Irvine, USA
Debra J. Richardson , University of California, Irvine, USA
pp. 349-356
Agent and System Security

Organized Anonymous Agents (Abstract)

Frances Brazier , VU University, The Netherlands
Martijn Warnier , VU University, The Netherlands
pp. 357-362

Comparing the Trust and Security Models of Mobile Agents (Abstract)

Michail Fragkakis , University of Piraeus, Greece
Nikolaos Alexandris , University of Piraeus, Greece
pp. 363-368

Program Fragmentation as a Metamorphic Software Protection (Abstract)

Robert W. Bennington , Air Force Research Laboratory
Bobby D. Birrer , Air Force Institute of Technology
Richard A. Raines , Air Force Institute of Technology
Barry E. Mullins , Air Force Institute of Technology
Rusty O. Baldwin , Air Force Institute of Technology
pp. 369-374

Accurate Application-Specific Sandboxing for Win32/Intel Binaries (Abstract)

Tzi-cker Chiueh , Stony Brook University
Lap-chung Lam , Stony Brook University
Wei Li , Stony Brook University
pp. 375-382
Workshop on Computational Forensics

Computational Forensics: Towards Hybrid-Intelligent Crime Investigation (Abstract)

Katrin Franke , Gjovik University College, Norway
Sargur N. Srihari , University at Buffalo, USA
pp. 383-386

Shoeprint Image Retrieval Based on Local Image Features (Abstract)

M. Gueham , Queen's University Belfast, UK
H. Su, D. Crookes , Queen's University Belfast, UK
A. Bouridane , Queen's University Belfast, UK
pp. 387-392

Statistical Disk Cluster Classification for File Carving (Abstract)

Cor J. Veenman , University of Amsterdam, the Netherlands; Netherlands Forensic Institute, Netherlands
pp. 393-398

Application of Language Models to Suspect Prioritisation and Suspect Likelihood in Serial Crimes (Abstract)

David Canter , Centre for Investigative Psychology, UK
Donna Youngs , Centre for Investigative Psychology, UK
Richard Bache , University of Strathclyde, UK
Fabio Crestani , University of Strathclyde, UK
pp. 399-404

Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance (Abstract)

Slobodan Petrovic , Gjovik University College, Norway
Katrin Franke , Gjovik University College, Norway
pp. 405-410

Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation (Abstract)

Daniel Ramos , Universidad Autonoma de Madrid, Spain
Joaquin Gonzalez-Rodriguez , Universidad Autonoma de Madrid, Spain
Colin Aitken , University of Edinburgh, UK
Janina Zieba-Palus , Institute of Forensic Research, Poland
Grzegorz Zadora , Institute of Forensic Research, Poland
pp. 411-416

Study of structural features of handwritten grapheme ?th? for writer identification (Abstract)

Graham Leedham , University of New South Wales Asia, Singapore
Vladimir Pervouchine , University of New South Wales Asia, Singapore
pp. 417-422

Generative Models for Fingerprint Individuality using Ridge Types (Abstract)

Harish Srinivasan , University at Buffalo, USA
Gang Fang , University at Buffalo, USA
Sargur N. Srihari , University at Buffalo, USA
pp. 423-428

Craniofacial Superimposition in Forensic Identification using Genetic Algorithms (Abstract)

Lucia Ballerini , European Centre for Soft Computing, Spain
Sergio Damas , European Centre for Soft Computing, Spain; University of Granada, Spain
Jose Santamar?a , University of Cadiz, Spain
Oscar Cordon , European Centre for Soft Computing, Spain
Miguel Botella , University of Granada, Spain
Inmaculada Aleman , University of Granada, Spain
pp. 429-434

The Influence of Frame Length on Speaker Identification Performance (Abstract)

Mario Refice , Politecnico di Bari, Italy
Donato Impedovo , Politecnico di Bari, Italy
pp. 435-438

On Periodic Properties of Interpolation and Their Application To Image Authentication (Abstract)

Babak Mahdian , Academy of Sciences of the Czech Republic
Stanislav Saic , Academy of Sciences of the Czech Republic
pp. 439-446
Workshop on Data Hiding for Information and Multimedia Security

Detection of Hidden Information in Webpages Based on Randomness (Abstract)

Gang Luo , Hunan University, China
Junwei Huang , Hunan University, China
Huajun Huang , Hunan University, China
Xingming Sun , Hunan University, China
pp. 447-452

A Weighted Stego Image Detector for Sequential LSB Replacement (Abstract)

Andrew D. Ker , Oxford University Computing Laboratory, England
pp. 453-456

A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols (Abstract)

Geong Sen Poh , University of London, UK
Keith M. Martin , University of London, UK
pp. 457-461

An Analysis of Database Watermarking Security (Abstract)

Julien Lafaye , Conservatoire National des Arts et Metiers, France
pp. 462-467

A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity (Abstract)

K. Duraiswamy , K.S. Rangasamy College of Technology, India
M. Venkatesan , K.S. Rangasamy College of Technology, India
P. Meenakshi Devi , K.S. Rangasamy College of Technology, India
K. Thiagarajah , PSNA College of Engg. & Technology, India
pp. 468-471

Metrics-based Evaluation of Slicing Obfuscations (Abstract)

Anirban Majumdar , The University of Auckland, New Zealand
Stephen Drape , The University of Auckland, New Zealand
Clark Thomborson , The University of Auckland, New Zealand
pp. 472-477

Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain (Abstract)

Hong-Jia Zhao , Peking University, China
Chang-Tsun Li , University of Warwick, UK
Yan Zhu , Peking University, China
pp. 478-483

A novel anti-collusion coding scheme tailored to track linear collusions (Abstract)

Dimitrios Hatzinakos , University of Toronto, Canada
Kannan Karthik , University of Toronto, Canada
pp. 484-489

Research on Steganalysis for Text Steganography Based on Font Format (Abstract)

Lingyun Xiang , Hunan University, China
Xingming Sun , Hunan University, China
Can Gan , Hunan University, China
Gang Luo , Hunan University, China
pp. 490-495

Protection of Mammograms Using Blind Steganography and Watermarking (Abstract)

Chia-Hung Wei , University of Warwick, UK
Yue Li , University of Warwick, UK
Chang-Tsun Li , University of Warwick, UK
pp. 496-500
Author Index

Author Index (PDF)

pp. 501
105 ms
(Ver )