CSE 2009

5 downloads 90 Views 207KB Size Report
Message from PASSAT 2009 Workshop Chair - Volume 3. ... SSP 2009 Organizing and Program Committees - Volume 3.......................................................... ........xxi.
2009 International Conference on Computational Science and Engineering

CSE 2009

Table of Contents Volume - 3 Message from PASSAT 2009 General Chairs - Volume 3 ........................................................................xii Message from PASSAT 2009 Program Chair - Volume 3 ........................................................................xiii Message from PASSAT 2009 Steering Chairs - Volume 3.......................................................................xiv Message from PASSAT 2009 Workshop Chair - Volume 3.......................................................................xv PASSAT 2009 Organizing and Program Committees Volume 3....................................................................................................................................................................xvi PASSAT 2009 Additional Reviewers - Volume 3.......................................................................................xviii Message from SecureCom 2009 and PSA 2009 Symposium Chairs - Volume 3...................................................................................................................................................xix Message from SSP 2009 Workshop Chairs - Volume 3.............................................................................xx SSP 2009 Organizing and Program Committees - Volume 3..................................................................xxi Keynote Speech: David Chaum - Volume 3 .................................................................................................xxii Keynote Speech: Stephen S. Yau - Volume 3............................................................................................xxiii

Volume 3: The 2009 IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2009) Privacy and Security I Noise Injection for Search Privacy Protection ........................................................................................................1 Shaozhi Ye, Felix Wu, Raju Pandey, and Hao Chen

Privacy-Preserving Bayesian Network for Horizontally Partitioned Data .........................................................9 Saeed Samet and Ali Miri

Privacy-Preserving Multi-agent Constraint Satisfaction .....................................................................................17 Thomas Léauté and Boi Faltings

v

FaceCloak: An Architecture for User Privacy on Social Networking Sites .....................................................26 Wanying Luo, Qi Xie, and Urs Hengartner

Privacy and Security II Adapting Privacy-Preserving Computation to the Service Provider Model .....................................................34 Florian Kerschbaum

Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach ..........................................................42 Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, and Yoshinobu Kawabe

Privacy-Enhanced Event Scheduling ......................................................................................................................52 Benjamin Kellermann and Rainer Böhme

Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design ............................................................................................................................................................60 Mary-Anne Williams

Privacy and Security III t-Plausibility: Semantic Preserving Text Sanitization ..........................................................................................68 Wei Jiang, Mummoorthy Murugesan, Chris Clifton, and Luo Si

Policy-Based Malicious Peer Detection in Ad Hoc Networks ...........................................................................76 Wenjia Li, Anupam Joshi, and Tim Finin

Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems ........................................................................................................................................................................83 Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, and Antony Martin

Risk and Trust Tuning Evidence-Based Trust Models ...................................................................................................................92 Eugen Staab and Thomas Engel

Trust Is in the Eye of the Beholder .......................................................................................................................100 Dimitri DeFigueiredo, Earl Barr, and S. Felix Wu

A Trust-Based Multiagent System ........................................................................................................................109 Richard Seymour and Gilbert L. Peterson

Towards Automating Social Engineering Using Social Networking Sites .....................................................117 Markus Huber, Stewart Kowalski, Marcus Nohlberg, and Simon Tjoa

Social Inference Risk Modeling in Mobile and Social Applications ...............................................................125 Sara Motahari, Sotirios Ziavras, Mor Naaman, Mohamed Ismail, and Quentin Jones

The 2009 International Symposium on Secure Computing (SecureCom 2009)

vi

Privacy and Security I Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans ..........................................................................................................................................................................133 David Evans and Robert H. Warren

Privacy Requirements in Vehicular Communication Systems .........................................................................139 Florian Schaub, Zhendong Ma, and Frank Kargl

A Framework to Balance Privacy and Data Usability Using Data Degradation ...........................................146 Harold van Heerde, Maarten Fokkinga, and Nicolas Anciaux

Privacy and Security II A Lattice-Based Privacy Aware Access Control Model ....................................................................................154 Kambiz Ghazinour, Maryam Majedi, and Ken Barker

Modelling of Pseudonymity under Probabilistic Linkability Attacks .............................................................160 Martin Neubauer

Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks ..............................................168 Gelareh Taban and Virgil D. Gligor

Privacy and Security III User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems ...................................................................................................................176 Victor Manuel García-Barrios

An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation .........................................................................................................................................................182 I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, and Da-Wei Wang

A Hybrid Enforcement Model for Group-centric Secure Information Sharing .............................................189 Ram Krishnan and Ravi Sandhu

A Framework for Enforcing Constrained RBAC Policies ................................................................................195 Jason Crampton and Hemanth Khambhammettu

Privacy and Security IV Guarantee-Based Access Control ..........................................................................................................................201 Mohammed Hussain and D.B. Skillicorn

Integrity Verification of Outsourced XML Databases .......................................................................................207 Ruilin Liu and Hui Wang

Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study ................................................................................................................................................................213 Riham Hassan, Mohamed Eltoweissy, Shawn Bohner, and Sherif El-Kassas

A Unified Approach to Intra-domain Security ....................................................................................................219 Craig A. Shue, Andrew J. Kalafut, and Minaxi Gupta

vii

Risk and Trust I A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology ................................................................................................................................225 Chih-Hung Chang

Improving Host Profiling with Bidirectional Flows ...........................................................................................231 Pavel Minařík, Jan Vykopal, and Vojtěch Krmíček

Nearby-Friend Discovery Protocol for Multiple Users ......................................................................................238 Shashwat Raizada, Goutam Paul, and Vineet Pandey

The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism ............................................................................244 Ghassan "Gus" Jabbour and Daniel A. Menascé

Risk and Trust II Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control ................................................................................................................................252 Daniel Trivellato, Fred Spiessens, Nicola Zannone, and Sandro Etalle

How to overcome the 'Trusted Node Model' in Quantum Cryptography .......................................................259 Peter Schartner and Stefan Rass

The Influence of Personalities Upon the Dynamics of Trust and Reputation ................................................263 Mark Hoogendoorn and S. Waqar Jaffry

Large Online Social Footprints--An Emerging Threat ......................................................................................271 Danesh Irani, Steve Webb, Kang Li, and Calton Pu

Risk and Trust III A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams ...............................................................................................................................................277 Xusen Cheng, Linda Macaulay, and Alex Zarifis

On the Feasibility of Remote Attestation for Web Services .............................................................................283 John Lyle and Andrew Martin

Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures .........................................................................................................................289 Michele Barletta, Silvio Ranise, and Luca Viganò

ProActive Caching: Generating Caching Heuristics for Business Process Environments ............................................................................................................................................................297 Mathias Kohler, Achim D. Brucker, and Andreas Schaad

viii

The 2009 International Symposium on Privacy and Security Applications (PSA 2009) Privacy and Security I Combining Attribute-Based and Access Systems ..............................................................................................305 Behzad Malek and Ali Miri

Analysis of the GMPLS Control Plane Security .................................................................................................313 Ayonote Clement , Pavol Zavarsky, and Dale Lindskog

Diversity in Network Attacker Motivation: A Literature Review ....................................................................319 Mark Rounds and Norman Pendgraft

Privacy and Security II Emergency Privacy Measures ................................................................................................................................324 Hendrik J.G. Oberholzer and Martin S. Olivier

Designing Privacy for Scalable Electronic Healthcare Linkage .......................................................................330 Anthony Stell, Richard Sinnott, Oluwafemi Ajayi, and Jipu Jiang

Routing Policy Conflict Detection without Violating ISP's Privacy ...............................................................337 Ning Hu, Peidong Zhu, Huayang Cao, and Kan Chen

Practical Values for Privacy ...................................................................................................................................343 Benjamin Wasser and Justin Zhan

Privacy and Security III Phishpin: An Identity-Based Anti-phishing Approach ......................................................................................347 Hicham Tout and William Hafner

Security Implications of Virtualization: A Literature Study .............................................................................353 André van Cleeff, Wolter Pieters, and Roel J. Wieringa

ViDPSec Visual Device Pairing Security Protocol ............................................................................................359 Dimitris Zisiadis, Spyros Kopsidas, and Leandros Tassiulas

Lightweight IDS Based on Features Selection and IDS Classification Scheme ............................................365 Safaa Zaman and Fakhri Karray

Risk and Trust A Study of the Methods for Improving Internet Usage Policy Compliance ...................................................371 Mandeep Saran and Pavol Zavarsky

Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk ......................................................................................................................................379 Shi-Cho Cha, Li-Ting Liu, and Bo-Chen Yu

An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002 ................................................................386 Zhitao Huang, Pavol Zavarsky, and Ron Ruhl

Ceremonies Formal Analysis in PKI’s Context ..................................................................................................392 Jean Everson Martina, Túlio Cícero Salavaro de Souza, and Ricardo Felipe Custódio ix

The 2009 International Workshop on Software Security Processes (SSP 2009) Software Engineering for Security Activity and Artifact Views of a Secure Software Development Process ......................................................399 Muhammad Umair Ahmed Khan and Mohammad Zulkernine

An AHP-Based Framework for Quality and Security Evaluation ...................................................................405 V. Casola, A.R. Fasolino, N. Mazzocca, and P. Tramontana

Assurance Process for Large Open Source Code Bases ....................................................................................412 Claudio A. Ardagna, Massimo Banzi, Ernesto Damiani, and Fulvio Frati

Code Obfuscation Using Pseudo-random Number Generators ........................................................................418 John Aycock, Juan Manuel Gutiérrez Cárdenas, and Daniel Medeiro Nunes de Castro

Misuse Cases + Assets + Security Goals .............................................................................................................424 Takao Okubo, Kenji Taguchi, and Nobukazu Yoshioka

Data Privacy Specification of Fair Data Practice Principles Using Privacy Policy Languages ..........................................430 Girma Nigusse, Bart De Decker, and Vincent Naessens

Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model .......................................................................................................................................438 Alaa Aref El Masri and João Pedro Sousa

A Privacy Framework for Personal Self-Improving Smart Spaces ..................................................................444 N. Liampotis, I. Roussaki, E. Papadopoulou, Y. Abu-Shaaban, M.H. Williams, N.K. Taylor, S.M. McBurney, and K. Dolinar

Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems ......................................................................................................................................................................450 Qussai Yaseen and Brajendra Panda

Risk Management Managing Risk of IT Security Outsourcing in the Decision-Making Stage ...................................................456 Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, and Andy Igonor

Risk Perceptions of Information Security: A Measurement Study ..................................................................462 Fariborz Farahmand, Melissa Dark, Sydney Liles, and Brandon Sorge

Managing Risks on Critical IT Systems in Public Service Organizations ......................................................470 Yeni Yuqin Li Helgesson

Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders’ Good Security Behaviors ............................................................................476 Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat

x

Trust and Security Models and Emerging Approaches A Dynamic Trust Evaluation Model on C2C Marketplaces .............................................................................482 Yun Yang and Juhua Chen

Threat Modeling for CSRF Attacks ......................................................................................................................486 Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, and Dale Lindskog

A Novel Approach to DRM Systems ...................................................................................................................492 F. Frattolillo, F. Landolfi, and F. Marulli

Worm Path Identification Using Visualization System .....................................................................................498 Seiji Shibaguchi, Yuki Nakayama, and Ken-ichi Okada

A Simulation of Various Variable Hacker Populations .....................................................................................504 Norman Pendegraft and Mark Rounds

Author Index - Volume 3 .....................................................................................................................................511

xi