Skip to main content
  • Conference proceedings
  • © 2009

Advances in Information Security and Its Application

Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

Conference proceedings info: ISA 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Information Assurance and Its Application

    1. The ISDF Framework: Integrating Security Patterns and Best Practices

      • Abdulaziz Alkussayer, William H. Allen
      Pages 17-28
  3. Security Protocol and Its Application

    1. Concurrency and Time in Role-Based Access Control

      • Chia-Chu Chiang, Coskun Bayrak
      Pages 37-42
    2. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

      • Yong Nyuo Shin, In-Kyung Jun, Hyun Kim, Woochang Shin
      Pages 43-49
    3. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings

      • Xiaofei Ding, Fushan Wei, Chuangui Ma, Shumin Chen
      Pages 50-56
    4. Context-Based E-Health System Access Control Mechanism

      • Fahed Al-Neyadi, Jemal H. Abawajy
      Pages 68-77
  4. Other Security Research

    1. A Contents Encryption Mechanism Using Reused Key in IPTV

      • Yoon-Su Jeong, Yong-Tae Kim, Young-Bok Cho, Ki-Jeong Lee, Gil-Cheol Park, Sang-Ho Lee
      Pages 85-90
    2. Experiment Research of Automatic Deception Model Based on Autonomic Computing

      • Bingyang Li, Huiqiang Wang, Guangsheng Feng
      Pages 98-104
    3. Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks

      • Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai
      Pages 105-110
    4. Reconsidering Data Logging in Light of Digital Forensics

      • Bin-Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai
      Pages 111-118
    5. Blurriness in Live Forensics: An Introduction

      • Antonio Savoldi, Paolo Gubian
      Pages 119-126
  5. Back Matter

Other Volumes

  1. Advances in Information Security and Its Application

About this book

Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), and the Second International Conference on Information Security and Assurance (ISA 2008, Busan, Korea, April 2008). The goal of this conference is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of information technology. ISA 2009 contained research papers submitted by researchers from all over the world. In order to guarantee high-quality proceedings, we put extensive effort into reviewing the papers. All submissions were peer reviewed by at least three Program Committee members as well as external reviewers. As the quality of the submissions was quite high, it was extremely difficult to select the papers for oral presentation and publication in the proceedings of the conference.

Reviews

From the reviews:

"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. … This book will be useful to both information technology (IT) security researchers and practitioners. … It is well written and easy to understand, and the author provides experimental results that support the design. … suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)

Editors and Affiliations

  • Department of Computer Science and Engineering, Kyungnam University, Masan, Korea

    Jong Hyuk Park

  • Carnegie Mellon CyLab Japan, Kobe, Japan

    Justin Zhan

  • Center for Information Security Technologies(CIST), Korea University, Seoul, Korea

    Changhoon Lee

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

  • School of Multimedia, Hannam University, Daejeon, Korea

    Tai-hoon Kim

  • Division of Computer Engineering, Mokwon University, Daejeon, Korea

    Sang-Soo Yeo

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access