Safety and Sustainability

Similar documents
MASSIF: A Promising Solution to Enhance Olympic Games IT Security

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

PRIME IDENTITY MANAGEMENT CORE

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Chapter 1: Introduction

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION

Management of Security Information and Events in Future Internet

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

th Panhellenic Conference on Informatics

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Workprogramme 2013 objective 1.2. Sandro D Elia. Software & Service Architectures and Infrastructures

CipherShare Features and Benefits

Issues in Information Systems Volume 15, Issue I, pp , 2014

Human Factors in Information Security

Secure Data Exchange Solution

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

POLICIES TO MITIGATE CYBER RISK

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Network Security. Current Status and Future Directions

Electronic Payment Schemes Guidelines

IoT Security Platform

Security and Privacy in Big Data, Blessing or Curse?

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH

Mutual Authentication Cloud Computing Platform based on TPM

PROTECT YOUR WORLD. Identity Management Solutions and Services

CESG Certification of Cyber Security Training Courses

Cyber Security Test-bed TDL Download Corner. Achieving The Trust Paradigm Shift ATTPS. Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel

Network Security 101 Multiple Tactics for Multi-layered Security

Jort Kollerie SonicWALL

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Preventing fraud in epassports and eids

Applying Cryptography as a Service to Mobile Applications

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Cyber Security and Privacy

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

Data Security Concerns for the Electric Grid

Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

Longmai Mobile PKI Solution

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Data Protection: From PKI to Virtualization & Cloud

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Introduction Chapter 1. Uses of Computer Networks

The Convergence of IT Security and Physical Access Control

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

CRYPTOGRAPHY AS A SERVICE

Master of Science in Information Systems & Security Management. Courses Descriptions

Defending the Internet of Things

Internet of Things (IoT): A vision, architectural elements, and future directions

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

NIST Big Data Public Working Group

ENISA and Cloud Security

Horizontal IoT Application Development using Semantic Web Technologies

Introduction of Information Security Research Division

Identity Management: Key Technologies

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

CoSign by ARX for PIV Cards

NC CJIN Governing Board. 13 October, George A. White

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

2. Cyber security research in the Netherlands

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Smart Card Application Development Using Java

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Cybersecurity at ODU ( )

Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Privacy & Security of Mobile Cloud Computing (MCC)

Information Security Basic Concepts

Cybercrime in Canadian Criminal Law

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

Introduction to Computer Networking: Trends and Issues

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

(Instructor-led; 3 Days)

Transcription:

Christos K. Georgiadis Hamid Jahankhani Elias Pimenidis Rabih Bashroush Ameer Al-Nemrat (Eds.) Global Security, Safety and Sustainability & e-democracy 7th International and 4th e-democracy Joint Conferences, ICGS3/e-Democracy 2011 Thessaloniki, Greece, August 24-26, 2011 Revised Selected Papers Springer

Table of Contents Transforming Vehicles into e-government 'Cloud Computing' Nodes... Dellios Kleanthis, Chronakis Aristeidis, and Polemi Despina 1 Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining 9 Stergios G. Tsiafoulis, Vasilios C. Zorkadis, and Elias Pimenidis Practical Password Harvesting from Volatile Memory 17 Stavroula Karayianni and Vasilios Katos Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication 23 B.L. Tait Tuning the Epidemical Algorithm in Wireless Sensor Networks 31 Kostis Gerakos, Christos Anagnostopoulos, and Stathes Hadjiefthymiades A Robustness Testing Method for Network Security 38 Yulong Fu and Ousmane Kone Economic Evaluation of Interactive Audio Media for Securing Internet Services 46 Theodosios Tsiakis, Panagiotis Katsaros, and Dimitris Gritzalis On the Evolution of Malware Species 54 Vasileios Vlachos, Christos Ilioudis, and Alexandros Papanikolaou PINEPULSE-. A System to PINpoint and Educate Mobile Phone Users with Low Security 62 Iosif Androulidakis and Gorazd Kandus GSi Compliant RAS for Public Private Sector Partnership 67 Fawzi Fawzi, Rabih Bashroush, A Probabilistic Key Agreement and Hamid Jahankhani Scheme for Sensor Networks without Key Predistribution 72 Vasiliki Liagkou, Effie Makri, Paul Spirakis, and Yannis Stamatiou Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates 80 Dimitrios Zissis, Dimitrios Lekkas, and Panayiotis Koutsabasis

XII Table of Contents Towards Colored Petri Net Modeling of Expanded C-TMAC 88 Apostolos K. Provatidis, Christos K. Georgiadis, and Ioannis K. Mavridis Leveraging the e-passport PKI to Achieve Interoperable Security for e-government Cross Border Services 96 Dimitrios Lekkas and Dimitrios Zissis Genre-Based Information Hiding 104 Russell Ogilvie and George R.S. Weir In the Hacker's Eye: The Neurophysiology of a Computer Hacker 112 Wael Khalifa, Kenneth Revett, and Abdel-Badeeh Salem Untangling Public Service Usage for Agribusinesses with Dialogic E-government 120 Sotiris Karetsos, Maria Ntaliani, Gonstantina Costopoulou, and On the Deployment of Artificial Immune Systems for Biometrics 126 Ruben Krishnamurthy, Kenneth Revett, and Hossein Jahankhani A Prediction Model for Criminal Levels Specialized in Brazilian Cities 131 Marcelo Damasceno de Melo, Jerffeson Teixeira, and Gustavo Campos MASSIF: A Promising Solution to Enhance Olympic Games IT Security 139 Elsa Prieto, Rodrigo Diaz, Luigi Romano, Roland Rieke, and Mohammed Achemlal An Ontology-Based Model for SIEM Environments 148 Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, and Herve Debar Analyzing the Economic Impacts of Security Breaches Due to Outsourcing 156 Dimitrios Koumaridis, Emmanouil Stiakakis, and Christos K. Georgiadis Study of the Perception on the Portuguese Citizen Card and Electronic Signature 164 Isabel Cerqueira, Vttor J. Sd, and Sergio Tenreiro de Magalhaes

Table of Contents XIII Securing Transportation-Critical Infrastructures: Trends and Perspectives 171 Marianthi Theoharidou, Miltiadis Kandias, and Dimitris Gritzalis - E-Government in Greece: Serving State's Economic Needs Respecting the Fundamental Right to Data Protection 179 Zoe Kardasiadou, Evi Chatziliasi, and Konstantinos Limniotis Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags 186 Hoda Jannati and Abolfazl Falahati Paving the Way for a Transformational Public Administration 194 Ioannis Savvas, Nick Bassiliades, Elias Pimenidis, and Cybercrime: The Case of Obfuscated Malware 204 Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Moutaz Alazab, and Ammar Alazab Feeling Secure vs. Being Secure the Mobile Phone User Case 212 Iosif Androulidakis and Gorazd Kandus A Collaborative System Offering Security Management Services for SMEs/mEs 220 Theodoros Ntouskas, Dimitrios Papanikas, and Nineta Polemi A Situational Awareness Architecture for the Smart Grid 229 Anastasia Mavridou and Mauricio Papa Alleviating SMEs' Administrative Burdens: The Rural Inclusion Initiative 237 Maria Ntaliani, Constantina Costopoulou, and Optimum Hardware-Architecture for Modular Divider in GF(2m) with Chaos as Arbitrary Source Based on ECC 245 Azar Hosseini and Abolfazl Falahati Sufficiency of Windows Event Log as Evidence in Digital Forensics 253 Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, and Rabih Bashroush An Evaluation of the Initiatives and the Progress Made on e-government Services in the EU 263, Elias Pimenidis, Loucas Protopappas, and M. Koukouli

XIV Table of Contents Improved Awareness on Fake Websites and Detecting Techniques 271 Hossein Jahankhani, Thulasirajh Jayaraveendran, and William Kapuku-Bwabw Study of the Perception on the Biometric Technology by the Portuguese Citizens 280 Daniela Borges, Vitor J. Sd, Sergio Tenreiro de Magalhdes, and Henrique Santos Author Index 289