How To Write An Article On E-Activities, Information Security And Privacy



Similar documents
Content Teaching Academy at James Madison University

Guide to Assessment Scales in Parkinson s Disease

Information, Network & Cyber Security

Methodologies development and software quality metrics in educational applications

UVic Department of Electrical and Computer Engineering

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

ehealth: Information and Communication Technology in Health August 29-31, 2016

Weighted Total Mark. Weighted Exam Mark

NS - Network Security

CISCO IOS NETWORK SECURITY (IINS)

CCNA Security v1.0 Scope and Sequence

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chap. 1: Introduction

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Principles of Information Assurance Syllabus

A Systems Engineering Approach to Developing Cyber Security Professionals

Bellevue University Cybersecurity Programs & Courses

Detailed Description about course module wise:

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

A Multiagent Model for Intelligent Distributed Control Systems

Mobile Devices and Malicious Code Attack Prevention

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia

External Supplier Control Requirements

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

CCNA Security v1.0 Scope and Sequence

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES

A Survey on Intrusion Detection System with Data Mining Techniques

Rhode Island Board of Medical Licensure and Discipline Guidelines for the Appropriate Use of Telemedicine and the Internet in Medical Practice

RECENT ADVANCES in INFORMATION TECHNOLOGY

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

EECS 588: Computer and Network Security. Introduction January 14, 2014

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Deploying a Secure Wireless VoIP Solution in Healthcare

Information Assurance and Security Technologies for Risk Assessment and Threat Management:

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS

WELCOME. Status of Tropical Disease in Tribal Communities Scientific Director Tropical Health Foundation Santa Marta, Colombia

PROFESSOR ANÍBAL TRAÇA DE ALMEIDA

From Drug Discovery to First in Humans

CLINICAL PHARMACOLOGY

Chapter 1 Instructor Version

The Information Security Problem

New rule sets standards of practice for physicians who use telemedicine

Security and Privacy in Cloud Computing

Network Security Essentials:

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CEH Version8 Course Outline

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

The FBI and the Internet

Security aspects of e-tailing. Chapter 7

Principles of ICT Systems and Data Security

CURRICULUM VITAE. September, 2015

A Research on Security Awareness and Countermeasures for the Single Server

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Board votes to establish standards for physicians who use telemedicine

NETWORK ADMINISTRATION AND SECURITY

Cisco Certified Security Professional (CCSP)

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Cellular Wireless technology: Creating a link between people and the healthcare community

Computer Networks & Computer Security

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

«Mathematics and Computer Science»

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences

Cablelynx Acceptable Use Policy

DISTRIBUTED SYSTEMS SECURITY

UTMB INFORMATION RESOURCES PRACTICE STANDARD

Managing Information Resources and IT Security

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

Licensed Healthcare Providers Guidelines for Telemedicine Using the MyDocNow Platform

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

: La Pedregosa Alta - Km. 4,7 - Qta. Dimensión - Mérida - Estado Mérida -

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Security Defense Strategy Basics

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

HIT Workflow & Redesign Specialist: Curriculum Overview

Transcription:

ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010 Published by WSEAS Press www.wseas.org ISSN E-ACTIVITIES: 1792-6971 ISSN ISP: 1792-6955 ISBN: 978-960-474-258-5

ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010 Published by WSEAS Press www.wseas.org Copyright 2010, by WSEAS Press All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press. All papers of the present volume were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive. See also: http://www.worldses.org/review/index.html ISSN E-ACTIVITIES: 1792-6971 ISSN ISP: 1792-6955 ISBN: 978-960-474-258-5 World Scientific and Engineering Academy and Society

ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) University of Los Andes, Merida Venezuela, December 14-16, 2010

Editors: Prof. Francklin Rivas-Echeverria, Universidad de Los Andes, Merida, Venezuela Prof. Gloria Mousalli-Kayat, Universidad de Los Andes, Merida, Venezuela International Program Committee Members: Prof. Anna Perez Prof. Jesus Calderon Prof. Oscar Camacho Prof. Luis A. Angulo Prof. Raul Huizzi Prof. Jose Aguilar Prof. Milagro Rivero Prof. Eliezer Colina Prof. Flor Narciso Prof. Addison Rios Prof. Mary Vergara Prof. Carlos Rivas Prof. Sebastian Provenzano Prof. Ana Patete Prof. Andres Arcia

Preface This year the 9th WSEAS International Conference on E-ACTIVITIES (E-ACTIVITIES '10) and the 9th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '10) were held at the University of Los Andes, Merida, Venezuela, December 14-16, 2010. The conferences remain faithful to their original idea of providing a platform to discuss E- Learning, E-Communities, E-Commerce, E-Management, E-Marketing, E-Governance, passive attacks, active attacks, viruses, Trojan horses, worms, denial of service, information security services etc. with participants from all over the world, both from academia and from industry. Their success is reflected in the papers received, with participants coming from several countries, allowing a real multinational multicultural exchange of experiences and ideas. The accepted papers of these conferences are published in this Book that will be indexed by ISI. Please, check it: www.worldses.org/indexes as well as in the CD-ROM Proceedings. They will be also available in the E-Library of the WSEAS. The best papers will be also promoted in many Journals for further evaluation. Conferences such as these can only succeed as a team effort, so the Editors want to thank the International Scientific Committee and the Reviewers for their excellent work in reviewing the papers as well as their invaluable input and advice. The Editors

Advances in E-Activities, Information Security and Privacy Table of Contents Plenary Lecture 1: Information Systems and Artificial Intelligence Applications and Limitations on Medical E-learning and E-Management, a Venezuelan Experience Carlos Rivas-Echeverria Information and Communication Technology Application οn Learning Bahasa Melayu among Foreign Students Maimun Aqsha Lubis, Mohamed Amin Embi, Ismail Suardi Wekke, Kamarulzaman Abdul Ghani, Sabariah Sulaiman 11 13 Protecting Cookies against Cross-Site Scripting Attacks using Cryptography 22 S. Mohammadi, Farhad Koohbor Polychronicity and Multipresence: A Grounded Theory of E-Learning Timeawareness as Expressed by Portuguese Academics' Time Concepts Jorge Tiago Martins, Miguel Baptista Nunes 32 New Mobile Payment Protocol: Mobile Pay Center Protocol (MPCP) 41 Mohammad Vahid Alizade, Reza Askari Moghaddam, Samad Momenebellah Multi-Layered Collaborative Approach to Address Enterprise Mobile Security Challenges 47 Jithesh Sathyan, Manesh Sadasivan A System and Design of Extensible Authentication Protocols based on ECC and SKE Mechanisms for Mobile and Wireless Communications Natarajan Vijayarangan 53 Risk Management with ISO 27000 Standards in Information Security 58 Kaja Prislan, Igor Bernik Regular Expressions Fusion using Emergent Computing 64 Rafael Torres, Junior Altamiranda, Jose Aguilar, Christian Delamarche Implementation of a Open Source Security Software Platform in a Telemedicine Network 72 M. Huerta, T. Viva, R. Clotet, R.Gonzalez, R. Alvizu, A. Perez, D. Rivas, F. Lara y R. Escalante, Ruben Gonzalez A Standard-Compliant Integrated Security Framework 77 Hassen Sallay, Khaled Al-Shalfan Managing Online Communities: An E-Moderation Collaboratively Constructed Paper 85 Teadira Perez, Raymond Marquina E-Banking Systems Implementation and Introduction with Focus on Iranian Banking Transactions Abolfazl Kalanaki 91 Education Blog: Institutional Technological Change Manager 97 Joan F. Chipia Lobo, Francklin Rivas, Gloria Mousalli-Kayat ISBN: 978-960-474-258-5 9

Advances in E-Activities, Information Security and Privacy Architecture of an Auto Vaccination System for Handheld Device and the Countermeasures for the Security Threats Maricel O. Balitanas, Tai-Hoon Kim 103 Formal Analysis of Intrusion Detection Systems for High Speed Networks 109 Mohsen Rouached, Hassen Sallay, Ouissem Ben Fredj, Adel Ammar, Khaled Al-Shalfan, Majdi Ben Saad On Distributed Intrusion Detection Systems Design for High Speed Networks 115 Ouissem Ben Fredj, Hassen Sallay, Adel Ammar, Mohsen Rouached, Khaled Al-Shalfan, Majdi Ben Saad Cellular Automata Encryption Method: Description, Evaluation and Tests 121 Lucian Milea, Mihail Teodorescu, Vlad Grosu, Orest Oltu Authors Index 125 ISBN: 978-960-474-258-5 10

Advances in E-Activities, Information Security and Privacy Plenary Lecture 1 Information Systems and Artificial Intelligence Applications and Limitations on Medical E-learning and E-Management, a Venezuelan Experience Professor Carlos Rivas-Echeverria Laboratorio de Sistemas Inteligentes, Universidad de Los Andes also with Clinicas del Sueno SLEEPCARE & Fundacion Dra. Yolanda Echeverria Merida, 5101 VENEZUELA E-mail: rivasecheverria@gmail.com Abstract: Information systems and artificial intelligence have plenty applications on the medical field and they are wide and common. Computer support has shown that can improve the quality of general medical care. It can improve the efficiency and optimize the management of the sanitary system and the clinical practice; and can reduce errors. Most countries are using electronic health records for the primary care system and hospitals. Electronic drug prescribing has significantly reduce drug errors. Telemedicine (including robotics) had delivered specialized medicine regardless the distance where the patients or physicians are located. Digital imaging management has facilitated the availability of images throughout the whole healthcare system, dramatically reducing film-developing and other costs while making them immediately available to the practitioner. Informatics management is fundamental to health care delivery. These are just a few examples among several other applications. Our laboratory, in Venezuela, has developed several expert systems and information systems that have been particularly designed for educational purposes; and recently we have developed some that also have applications on management. The plenary session includes the features and applications of the systems as well as their limitations in a developing country like ours. The trends and possible future for these systems are also discussed. Brief Biography of the Speaker: Carlos Rivas-Echeverria, MD, PhD, FACP. Specialist in Internal Medicine and in Critical Care. Has a Master Degree on Sleep Medicine and a Diplomate on Franchising Systems Management. Is the Head of the SLEEPCARE Sleep Clinics. Is Full Professor at the University of Los Andes, Head of the Department of Pharmacology. He is cofounder and active Member of the Intelligent Systems Laboratory. Over 60 publications in high level conferences and journals: the main topics of his papers are: Hypertensive disorders of pregnancy, sleep disorders, traffic accidents and artificial intelligence. ISBN: 978-960-474-258-5 11

Advances in E-Activities, Information Security and Privacy Authors Index Aguilar, J. 64 Marquina, R. 85 Alizade, M. V. 41 Milea, L. 121 Al-Shalfan, K. 77, 109, 115 Moghaddam, R. A. 41 Altamiranda, J. 64 Mohammadi, S. 22 Alvizu, R. 72 Momenebellah, S. 41 Ammar, A. 109, 115 Mousalli-Kayat, G. 97 Balitanas, M. O. 103 Oltu, O. 121 Baptista Nunes, M. 32 Perez, A. 72 Ben Fredj, O. 109, 115 Perez, T. 85 Bernik, I. 58 Prislan, K. 58 Chipia Lobo, J. F. 97 Rivas, D. 72 Clotet, R. 72 Rivas, F. 97 Delamarche, C. 64 Rouached, M. 109, 115 Embi, M. A. 13 Saad, M. B. 109, 115 Escalante, F. L. R. 72 Sadasivan, M. 47 Ghani, K. A. 13 Sallay, H. 77, 109, 115 Gonzalez, R. 72 Sathyan, J. 47 Gonzalez, R. 72 Sulaiman, S. 13 Grosu, V. 121 Teodorescu, M. 121 Huerta, M. 72 Tiago Martins, J. 32 Kalanaki, A. 91 Torres, R. 64 Kim, T.-H. 103 Vijayarangan, N. 53 Koohbor, F. 22 Viva, T. 72 Lubis, M. A. 13 Wekke, I. S. 13 ISBN: 978-960-474-258-5 125