The Community for Technology Leaders
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (2007)
Valencia, Spain
Oct. 14, 2007 to Oct. 20, 2007
ISBN: 0-7695-2989-5
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. viii
SECUR 1 (SECMAN)

Evaluating a New Reputation Algorithm With Consideration For Fairness (Abstract)

Adam Wierzbicki , Polish-Japanese Institute of Information Technology
pp. 1-6

Four security certification levels for IT Managers and Staff in the Public Sector (Abstract)

Olegas Vasilecas , Vilnius Gediminas Technical University, Sauletekio al. 11, Vilnius, Lithuania
Sergejus Sosunovas , Vilnius Gediminas Technical University, Sauletekio al. 11, Vilnius, Lithuania
pp. 7-11

A Survey of User-centric Identity Management Technologies (Abstract)

Jean-Marc Seigneur , University of applied sciences of Geneva, University of Geneva
Tewfiq El Maliki , University of applied sciences of Geneva, University of Geneva
pp. 12-17

SemID: Combining Semantics with Identity Management (Abstract)

Josef Noll , UniK-University Graduate Center, Kjeller, Norway
Mohammad M. R. Chowdhury , UniK-University Graduate Center, Kjeller, Norway.
Juan Miguel Gomez , Universidad Carlos III de Madrid
Angel Garc?a Crespo , Universidad Carlos III de Madrid
pp. 18-23
SECUR 2 (SYSSEC and THREATS)

Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections (Abstract)

Marga Nacher , Polytechnic University of Valencia
Juan Carlos Cano , Polytechnic University of Valencia
Pietro Manzoni , Polytechnic University of Valencia
Carlos T. Calafate , Polytechnic University of Valencia
pp. 24-29

Trustworthily Forwarding Sensor Networks Information to the Internet (Abstract)

Olivier Powell , Patras University, Greece
Luminita Moraru , University of Geneva, Switzerland
Jean-Marc Seigneur , University of Geneva, Switzerland
pp. 30-35

A Formal Approach to prevent Attacks on Mobile Agent Systems (Abstract)

Mohamed Mosbah , Laboratory LaBRI UMR CNRS 5800 Bordeaux, France
Monia Loulou , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
Mohamed Tounsi , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
Ahmed Hadj Kacem , Laboratory MIRACL FSEG, B.P. 1088, 3018 Sfax, Tunisia
Mohamed Jmaiel , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
pp. 42-47
SECUR 3 (INFOSEC 1)

Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms (Abstract)

Zorana Bankovic , Universidad Polit?cnica de Madrid
Octavio Nieto-Taladriz , Universidad Polit?cnica de Madrid
Atta Badii , University of Reading, UK
Slobodan Bojanic , Universidad Polit?cnica de Madrid
pp. 48-53

A Scheme for Protecting the Information Leakage Via Portable Devices (Abstract)

Masaru Takesue , Hosei University, Tokyo 184-8584 Japan
pp. 54-59

A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation (Abstract)

Ahmed M. Darwish , Cairo University, Giza, Egypt
Samir I. Shaheen , Cairo University, Giza, Egypt
Noura A. Saleh , National Telecommunications Institute, Nasr City, Cairo, Egypt.
Hoda N. Boghdady , National Telecommunications Institute, Nasr City, Cairo, Egypt.
pp. 60-65

Classification of Privacy Enhancing Technologies on Life-cycle of Information (Abstract)

Hyangjin Lee , Hanyang University
Yeonjung Kang , Hanyang University
Junghwan Song , Hanyang University
Kilsoo Chun , Hanyang University
pp. 66-70

Chaos-Based Cryptography: End of the Road? (Abstract)

Octavian Dranga , James Cook University
Florin Dragan , Politehnica University Timisoara, Romania
Daniel Iercan , Politehnica University Timisoara, Romania
Ovidiu Banias , Politehnica University Timisoara, Romania
Daniel-Ioan Curiac , Politehnica University Timisoara, Romania
pp. 71-76
SECUR 4 (INFOSEC 2, PRODAM and SECTECH)

Long-term storage and management of encrypted biomedical data in real scenarios (Abstract)

D. Segrelles , Universidad Polit?cnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
E. Torres , Universidad Polit?cnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
I. Blanquer , Universidad Polit?cnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
V. Hernandez , Universidad Polit?cnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
pp. 77-82

Semantically supported Authentication and Privacy in Social Networks (Abstract)

Gyorgy K?lm? , UniK, University Graduate Center, Kjeller, Norway
Josef Noll , UniK, University Graduate Center, Kjeller, Norway
Juan Miguel Gomez , Universidad Carlos III de Madrid, Spain
Mohammad M.R. Chowdhury , UniK, University Graduate Center, Kjeller, Norway
pp. 83-88

SECUAREA: Security in physical and logical areas (Abstract)

Francisco Bonilla , Universidad Polit?cnica de Madrid
Lourdes L?pez , Universidad Polit?cnica de Madrid
Jos?-Fern?n Mart?nez , Universidad Polit?cnica de Madrid
Luis Redondo , Universidad Polit?cnica de Madrid
Manuel Ramiro , Universidad Polit?cnica de Madrid
Ferm?n Bret? , Universidad Polit?cnica de Madrid
Vicente Hern?ndez , Universidad Polit?cnica de Madrid
pp. 95-100
SECUR 5 (ARCH 1 and SECHOME)

Robust sensor self-initialization: Whispering to avoid intruders (Abstract)

Carlos Ribeiro , INESC-ID / IST Carlos DOT Ribeiro AT INESC-ID DOT PT
pp. 101-106

Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services (Abstract)

Pascal van Eck , University of Twente
Damiano Bolzoni , University of Twente
Xiaomeng Su , Telenor ASA, Snar?yveien 30, Norway
pp. 107-114

Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System (Abstract)

Jacques Saraydaryan , CITI INSA-Lyon - ARES INRIA Project, France
Stephane Ubeda , CITI INSA-Lyon - ARES INRIA Project, France
Veronique Legrand , CITI INSA-Lyon - ARES INRIA Project, France
pp. 115-121

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments (Abstract)

Jorge Belenguer , Polytechnic University of Valencia
Carlos T. Calafate , Polytechnic University of Valencia
pp. 122-127

Dynamic environment evaluation for reliable AmI applications based on untrusted sensor (Abstract)

Octavio Nieto-Taladriz , Universidad Politecnica de Madrid
Alvaro Araujo , Universidad Politecnica de Madrid
Pedro Malagon , Universidad Polit?ecnica de Madrid
Juan Carlos Vallejo , Universidad Politecnica de Madrid
Jose M. Moya , Universidad Politecnica de Madrid
pp. 128-131
SECUR 6 (ARCH 2)

Distributed Identity Management Model for Digital Ecosystems (Abstract)

Hristo , University of Malaga
Luigi Telesca , CREATE-NET, Treno, Italy
Mihaela Ion , CREATE-NET, Treno, Italy
pp. 132-138

Security made easy: Achieving user-friendly communication protection in ad-hoc situations (Abstract)

Julian Schutte , Fraunhofer Institute for Secure Information Technology
Jens Heider , Fraunhofer Institute for Secure Information Technology
pp. 139-144

Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware (Abstract)

Vuka?sin Pejovic , Universidad Polit?ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
Slobodan Bojanic , Universidad Polit?ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
Carlos Carreras , Universidad Polit?ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
pp. 145-150

Migrating a HoneyDepot to Hardware (Abstract)

Jelena Popovic , University of Belgrade, Serbia
Octavio Nieto-Taladriz , Universidad Polit?ecnica de Madrid, Madrid
Vuka?sin Pejovic , Universidad Polit?ecnica de Madrid, Madrid
Ivana Kova?cevic , University of Belgrade, Serbia
Slobodan Bojanic , Universidad Polit?ecnica de Madrid, Madrid
Corado Leita , Institut Eurecom, Cedex, France
pp. 151-156
SECUR 7 (ARCH 3)

Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local Addresses (Abstract)

Raquel Lacuesta Gilaberte , Zaragoza University, Spain
Lourdes Pe?alver Herrero , Valencia Polytechnic University, Spain
pp. 157-162

Route Investigation for Secure Routing in Mobile Ad-hoc Networks (Abstract)

Han-Shik Kim , Korea University
Sangheon Pack , Korea University
Chul-Hee Kang , Korea University
Byung-Seok Kang , Korea University
pp. 163-168

A Proposal to Improve IKEv2 negotiation (Abstract)

Pekka Loula , Tampere University of Technology/Pori
Lari Iso-Anttila , Tampere University of Technology/Pori
Jorma Ylinen , Tampere University of Technology/Pori
pp. 169-174

Temporal Verification in Secure Group Communication System Design (Abstract)

T. Villemur , LAAS-CNRS University of Toulouse
P. de Saqui-Sannes , ENSICA, France
B. Fontan , ENSICA, France
S. Mota , LAAS-CNRS University of Toulouse
pp. 175-180

Towards a Comprehensive View of Secure Software Engineering (Abstract)

Lamia Labed , University of Manouba, Tunisia
Mehrez Essafi , University of Manouba, Tunisia
Henda Ben Ghezala , University of Manouba, Tunisia
pp. 181-186
SECUR 8 (ARCH 4)

A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems (Abstract)

Mohamed Mosbah , Universit? de Bordeaux, LaBRI, France
ADEL Bouhoula , Sup?COM Cit? Technologique des Communications, Tunisia
H?di HAMDI , Universit? de Bordeaux, LaBRI, France
pp. 187-192

Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles (Abstract)

Samuel Galice , INRIA ARES/CITI, INSA-Lyon, France
Stephane Frenot , INRIA ARES/CITI, INSA-Lyon, France
Stephane Ubeda , INRIA ARES/CITI, INSA-Lyon, France
Pierre Parrend , INRIA ARES/CITI, INSA-Lyon, France
pp. 193-200

Formal Verification of Business Workflows and Role Based Access Control Systems (Abstract)

Arnaud Dury , Computer Research Institute of Montreal (CRIM)
Volkmar Lotz , SAP Labs France
Alexandre Petrenko , Computer Research Institute of Montreal (CRIM)
Sergiy Boroday , Computer Research Institute of Montreal (CRIM)
pp. 201-210

A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions (Abstract)

Haiyong Chen , Tsinghua University, Beijing, China
Kwok-Yan Lam , Tsinghua University, Beijing, China
Hongwei Sun , Tsinghua University, Beijing, China
pp. 211-215

AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment (Abstract)

Sekpon Juntapremjitt , Whitehat Certified Co.,Ltd., Bangkok
Piyawit Manpanpanich , Thai Digital ID Co.,Ltd., Bangkok
Somchart Fugkeaw , Thai Digital ID Co.,Ltd., Bangkok
pp. 216-221
Author Index

Author Index (PDF)

pp. 222
88 ms
(Ver 3.1 (10032016))