Advances in Information Security and Its Application

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

  • Jong Hyuk Park
  • Justin Zhan
  • Changhoon Lee
  • Guilin Wang
  • Tai-hoon Kim
  • Sang-Soo Yeo
Conference proceedings ISA 2009

DOI: 10.1007/978-3-642-02633-1

Part of the Communications in Computer and Information Science book series (CCIS, volume 36)

Table of contents (16 papers)

  1. Front Matter
  2. Information Assurance and Its Application

  3. Security Protocol and Its Application

    1. Concurrency and Time in Role-Based Access Control
      Chia-Chu Chiang, Coskun Bayrak
      Pages 37-42
    2. Performance Assessment Method for a Forged Fingerprint Detection Algorithm
      Yong Nyuo Shin, In-Kyung Jun, Hyun Kim, Woochang Shin
      Pages 43-49
    3. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings
      Xiaofei Ding, Fushan Wei, Chuangui Ma, Shumin Chen
      Pages 50-56
    4. Context-Based E-Health System Access Control Mechanism
      Fahed Al-Neyadi, Jemal H. Abawajy
      Pages 68-77
  4. Other Security Research

    1. A Contents Encryption Mechanism Using Reused Key in IPTV
      Yoon-Su Jeong, Yong-Tae Kim, Young-Bok Cho, Ki-Jeong Lee, Gil-Cheol Park, Sang-Ho Lee
      Pages 85-90
    2. Experiment Research of Automatic Deception Model Based on Autonomic Computing
      Bingyang Li, Huiqiang Wang, Guangsheng Feng
      Pages 98-104
    3. Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks
      Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 105-110
    4. Reconsidering Data Logging in Light of Digital Forensics
      Bin-Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai
      Pages 111-118
    5. Blurriness in Live Forensics: An Introduction
      Antonio Savoldi, Paolo Gubian
      Pages 119-126
  5. Back Matter

Other volumes

  1. Advances in Information Security and Its Application
    Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
  2. Advances in Information Security and Assurance
    Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.

Keywords

Firewall ISDF authentication cryptographic hardware data security fingerprint detection hardware token key exchange manet networks role-based access security security metrics security patterns worm

Editors and affiliations

  • Jong Hyuk Park
    • 1
  • Justin Zhan
    • 2
  • Changhoon Lee
    • 3
  • Guilin Wang
    • 4
  • Tai-hoon Kim
    • 5
  • Sang-Soo Yeo
    • 6
  1. 1.Department of Computer Science and EngineeringKyungnam UniversityMasanKorea
  2. 2.Carnegie Mellon CyLab JapanKobeJapan
  3. 3.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  4. 4.School of Computer ScienceUniversity of BirminghamBirminghamUK
  5. 5.School of MultimediaHannam UniversityDaejeonKorea
  6. 6.Division of Computer EngineeringMokwon UniversityDaejeonKorea

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02632-4
  • Online ISBN 978-3-642-02633-1
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937