The Community for Technology Leaders
The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007) (2007)
Valencia
Oct. 14, 2007 to Oct. 20, 2007
ISSN: 2162-2108
ISBN: 0-7695-2989-5
TABLE OF CONTENTS

Evaluating a New Reputation Algorithm With Consideration For Fairness (PDF)

Adam Wierzbicki , Polish-Japanese Institute of Information Technology
pp. 1-6

Four security certification levels for IT Managers and Staff in the Public Sector (PDF)

Sergejus Sosunovas , Vilnius Gediminas Technical University, Sauletekio al. 11, Vilnius, Lithuania
Olegas Vasilecas , Vilnius Gediminas Technical University, Sauletekio al. 11, Vilnius, Lithuania
pp. 7-11

A Survey of User-centric Identity Management Technologies (PDF)

Tewfiq El Maliki , University of applied sciences of Geneva, University of Geneva
Jean-Marc Seigneur , University of applied sciences of Geneva, University of Geneva
pp. 12-17

SemID: Combining Semantics with Identity Management (PDF)

Mohammad M. R. Chowdhury , UniK-University Graduate Center, Kjeller, Norway.
Juan Miguel Gomez , Universidad Carlos III de Madrid
Josef Noll , UniK-University Graduate Center, Kjeller, Norway
Angel Garcia Crespo , Universidad Carlos III de Madrid
pp. 18-23

Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections (PDF)

Marga Nacher , Polytechnic University of Valencia
Carlos T. Calafate , Polytechnic University of Valencia
Juan Carlos Cano , Polytechnic University of Valencia
Pietro Manzoni , Polytechnic University of Valencia
pp. 24-29

Trustworthily Forwarding Sensor Networks Information to the Internet (PDF)

Olivier Powell , Patras University, Greece
Jean-Marc Seigneur , University of Geneva, Switzerland
Luminita Moraru , University of Geneva, Switzerland
pp. 30-35

A Formal Approach to prevent Attacks on Mobile Agent Systems (PDF)

Monia Loulou , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
Mohamed Tounsi , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
Ahmed Hadj Kacem , Laboratory MIRACL FSEG, B.P. 1088, 3018 Sfax, Tunisia
Mohamed Jmaiel , Laboratory ReDCAD ENIS, B.P. W 3038 Sfax, Tunisia
Mohamed Mosbah , Laboratory LaBRI UMR CNRS 5800 Bordeaux, France
pp. 42-47

Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms (PDF)

Zorana Bankovic , Universidad PolitÚcnica de Madrid
Slobodan Bojanic , Universidad PolitÚcnica de Madrid
Octavio Nieto-Taladriz , Universidad PolitÚcnica de Madrid
Atta Badii , University of Reading, UK
pp. 48-53

A Scheme for Protecting the Information Leakage Via Portable Devices (PDF)

Masaru Takesue , Hosei University, Tokyo 184-8584 Japan
pp. 54-59

A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance Calculation (PDF)

Noura A. Saleh , National Telecommunications Institute, Nasr City, Cairo, Egypt.
Hoda N. Boghdady , National Telecommunications Institute, Nasr City, Cairo, Egypt.
Samir I. Shaheen , Cairo University, Giza, Egypt
Ahmed M. Darwish , Cairo University, Giza, Egypt
pp. 60-65

Classification of Privacy Enhancing Technologies on Life-cycle of Information (PDF)

Yeonjung Kang , Hanyang University
Hyangjin Lee , Hanyang University
Kilsoo Chun , Hanyang University
Junghwan Song , Hanyang University
pp. 66-70

Chaos-Based Cryptography: End of the Road? (PDF)

Daniel-Ioan Curiac , Politehnica University Timisoara, Romania
Daniel Iercan , Politehnica University Timisoara, Romania
Octavian Dranga , James Cook University
Florin Dragan , Politehnica University Timisoara, Romania
Ovidiu Banias , Politehnica University Timisoara, Romania
pp. 71-76

Long-term storage and management of encrypted biomedical data in real scenarios (PDF)

I. Blanquer , Universidad PolitÚcnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
V. Hernandez , Universidad PolitÚcnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
D. Segrelles , Universidad PolitÚcnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
E. Torres , Universidad PolitÚcnica de Valencia, Camino de Vera S/N, 46022 Valencia Spain
pp. 77-82

Semantically supported Authentication and Privacy in Social Networks (Abstract)

Josef Noll , UniK, University Graduate Center, Kjeller, Norway
Mohammad M.R. Chowdhury , UniK, University Graduate Center, Kjeller, Norway
Gyorgy Kalman , UniK, University Graduate Center, Kjeller, Norway
Juan Miguel Gomez , Universidad Carlos III de Madrid, Spain
pp. 83-88

SECUAREA: Security in physical and logical areas (PDF)

Lourdes Lopez , Universidad PolitÚcnica de Madrid
Luis Redondo , Universidad PolitÚcnica de Madrid
Jose-Fernan Martinez , Universidad PolitÚcnica de Madrid
Manuel Ramiro , Universidad PolitÚcnica de Madrid
Vicente Hernandez , Universidad PolitÚcnica de Madrid
Francisco Bonilla , Universidad PolitÚcnica de Madrid
Fermin Breton , Universidad PolitÚcnica de Madrid
pp. 95-100

Robust sensor self-initialization: Whispering to avoid intruders (PDF)

Carlos Ribeiro , INESC-ID / IST Carlos DOT Ribeiro AT INESC-ID DOT PT
pp. 101-106

Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services (PDF)

Xiaomeng Su , Telenor ASA, Snar°yveien 30, Norway
Damiano Bolzoni , University of Twente
Pascal van Eck , University of Twente
pp. 107-114

Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System (PDF)

Jacques Saraydaryan , CITI INSA-Lyon - ARES INRIA Project, France
Veronique Legrand , CITI INSA-Lyon - ARES INRIA Project, France
Stephane Ubeda , CITI INSA-Lyon - ARES INRIA Project, France
pp. 115-121

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments (PDF)

Jorge Belenguer , Polytechnic University of Valencia
Carlos T. Calafate , Polytechnic University of Valencia
pp. 122-127

Dynamic environment evaluation for reliable AmI applications based on untrusted sensor (PDF)

Pedro Malagon , Universidad Polit┐ecnica de Madrid
Juan Carlos Vallejo , Universidad Politecnica de Madrid
Jose M. Moya , Universidad Politecnica de Madrid
Alvaro Araujo , Universidad Politecnica de Madrid
Octavio Nieto-Taladriz , Universidad Politecnica de Madrid
pp. 128-131

Distributed Identity Management Model for Digital Ecosystems (PDF)

Hristo Koshutanski , University of Malaga
Mihaela Ion , CREATE-NET, Treno, Italy
Luigi Telesca , CREATE-NET, Treno, Italy
pp. 132-138

Security made easy: Achieving user-friendly communication protection in ad-hoc situations (PDF)

Jens Heider , Fraunhofer Institute for Secure Information Technology
Julian Schutte , Fraunhofer Institute for Secure Information Technology
pp. 139-144

Adding Value to TCP/IP Based Information exchange Security by Specialized Hardware (PDF)

Vuka!sin Pejovic , Universidad Polit┐ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
Slobodan Bojanic , Universidad Polit┐ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
Carlos Carreras , Universidad Polit┐ecnica de Madrid, Ciudad Universitaria s/n, 28040, Madrid, Spain
pp. 145-150

Migrating a HoneyDepot to Hardware (PDF)

Vuka!sin Pejovic , Universidad Polit┐ecnica de Madrid, Madrid
Ivana Kova!cevic , University of Belgrade, Serbia
Slobodan Bojanic , Universidad Polit┐ecnica de Madrid, Madrid
Corado Leita , Institut Eurecom, Cedex, France
Jelena Popovic , University of Belgrade, Serbia
Octavio Nieto-Taladriz , Universidad Polit┐ecnica de Madrid, Madrid
pp. 151-156

Route Investigation for Secure Routing in Mobile Ad-hoc Networks (PDF)

Han-Shik Kim , Korea University
Byung-Seok Kang , Korea University
Sangheon Pack , Korea University
Chul-Hee Kang , Korea University
pp. 163-168

A Proposal to Improve IKEv2 negotiation (PDF)

Lari Iso-Anttila , Tampere University of Technology/Pori
Jorma Ylinen , Tampere University of Technology/Pori
Pekka Loula , Tampere University of Technology/Pori
pp. 169-174

Temporal Verification in Secure Group Communication System Design (PDF)

B. Fontan , ENSICA, France
S. Mota , LAAS-CNRS University of Toulouse
P. de Saqui-Sannes , ENSICA, France
T. Villemur , LAAS-CNRS University of Toulouse
pp. 175-180

Towards a Comprehensive View of Secure Software Engineering (PDF)

Mehrez Essafi , University of Manouba, Tunisia
Lamia Labed , University of Manouba, Tunisia
Henda Ben Ghezala , University of Manouba, Tunisia
pp. 181-186

A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems (PDF)

Hedi HAMDI , UniversitÚ de Bordeaux, LaBRI, France
ADEL Bouhoula , Sup'COM CitÚ Technologique des Communications, Tunisia
Mohamed Mosbah , UniversitÚ de Bordeaux, LaBRI, France
pp. 187-192

Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles (PDF)

Pierre Parrend , INRIA ARES/CITI, INSA-Lyon, France
Samuel Galice , INRIA ARES/CITI, INSA-Lyon, France
Stephane Frenot , INRIA ARES/CITI, INSA-Lyon, France
Stephane Ubeda , INRIA ARES/CITI, INSA-Lyon, France
pp. 193-200

Formal Verification of Business Workflows and Role Based Access Control Systems (PDF)

Arnaud Dury , Computer Research Institute of Montreal (CRIM)
Sergiy Boroday , Computer Research Institute of Montreal (CRIM)
Alexandre Petrenko , Computer Research Institute of Montreal (CRIM)
Volkmar Lotz , SAP Labs France
pp. 201-210

A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions (PDF)

Haiyong Chen , Tsinghua University, Beijing, China
Hongwei Sun , Tsinghua University, Beijing, China
Kwok-Yan Lam , Tsinghua University, Beijing, China
pp. 211-215

AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment (PDF)

Somchart Fugkeaw , Thai Digital ID Co.,Ltd., Bangkok
Piyawit Manpanpanich , Thai Digital ID Co.,Ltd., Bangkok
Sekpon Juntapremjitt , Whitehat Certified Co.,Ltd., Bangkok
pp. 216-221
92 ms
(Ver 3.3 (11022016))