Online Library TheLib.net » Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
cover of the book Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

Ebook: Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings

00
27.01.2024
0
0

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) – two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.




This book constitutes the refereed proceedings of the International Conference on Security Technology, SecTech 2010, and the International Conference on Disaster Recovery and Business Continuity, DRBC 2010, both held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 57 full papers presented were carefully reviewed and selected from 250 submissions. The papers are focused on the various aspects of advances in both Security Technology as well as Disaster Recovery and Business Continuity.


This book constitutes the refereed proceedings of the International Conference on Security Technology, SecTech 2010, and the International Conference on Disaster Recovery and Business Continuity, DRBC 2010, both held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 57 full papers presented were carefully reviewed and selected from 250 submissions. The papers are focused on the various aspects of advances in both Security Technology as well as Disaster Recovery and Business Continuity.
Content:
Front Matter....Pages -
Impact of Finger Type in Fingerprint Authentication....Pages 1-7
Using Arabic CAPTCHA for Cyber Security....Pages 8-17
Information Assurance in Saudi Organizations – An Empirical Study....Pages 18-28
Emerging Biometric Modalities: Challenges and Opportunities....Pages 29-38
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP....Pages 39-46
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan....Pages 47-56
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON....Pages 57-67
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device....Pages 68-73
Secure OSGi Platform against Service Injection....Pages 74-83
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse....Pages 84-93
Probabilistic Route Selection Algorithm for IP Traceback....Pages 94-103
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection....Pages 104-113
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model....Pages 114-125
Histogram-Based Reversible Data Hiding with Quadtree Concepts....Pages 126-133
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology....Pages 134-141
Performance Analysis of Cyber Security Awareness Delivery Methods....Pages 142-148
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms....Pages 149-160
One-Time Password System with Infinite Nested Hash Chains....Pages 161-170
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence....Pages 171-178
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor....Pages 179-186
Fusion of Moving and Static Facial Features for Robust Face Recognition....Pages 187-196
Human Authentication Based on ECG Waves Using Radon Transform....Pages 197-206
Wireless Network Security Vulnerabilities and Concerns....Pages 207-219
Figment Authentication Scheme in Wireless Sensor Network....Pages 220-223
Issues of Security and Network Load in Presence – A Survey....Pages 224-230
Discovering the Botnet Detection Techniques....Pages 231-235
Contactless Biometrics in Wireless Sensor Network: A Survey....Pages 236-243
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems....Pages 244-249
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010....Pages 250-258
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model....Pages 259-268
Internet SCADA Utilizing API’s as Data Source....Pages 269-275
Insecure Information System’s Solution Using Isolation Method....Pages 276-281
Communication Security for Control Systems in Smart Grid....Pages 282-289
NMACA Approach Used to Build a Secure Message Authentication Code....Pages 290-298
Back Matter....Pages -


This book constitutes the refereed proceedings of the International Conference on Security Technology, SecTech 2010, and the International Conference on Disaster Recovery and Business Continuity, DRBC 2010, both held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 57 full papers presented were carefully reviewed and selected from 250 submissions. The papers are focused on the various aspects of advances in both Security Technology as well as Disaster Recovery and Business Continuity.
Content:
Front Matter....Pages -
Impact of Finger Type in Fingerprint Authentication....Pages 1-7
Using Arabic CAPTCHA for Cyber Security....Pages 8-17
Information Assurance in Saudi Organizations – An Empirical Study....Pages 18-28
Emerging Biometric Modalities: Challenges and Opportunities....Pages 29-38
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP....Pages 39-46
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices – An Empirical Study of Telecommunication Industry in Pakistan....Pages 47-56
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON....Pages 57-67
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device....Pages 68-73
Secure OSGi Platform against Service Injection....Pages 74-83
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse....Pages 84-93
Probabilistic Route Selection Algorithm for IP Traceback....Pages 94-103
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection....Pages 104-113
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model....Pages 114-125
Histogram-Based Reversible Data Hiding with Quadtree Concepts....Pages 126-133
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology....Pages 134-141
Performance Analysis of Cyber Security Awareness Delivery Methods....Pages 142-148
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms....Pages 149-160
One-Time Password System with Infinite Nested Hash Chains....Pages 161-170
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence....Pages 171-178
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor....Pages 179-186
Fusion of Moving and Static Facial Features for Robust Face Recognition....Pages 187-196
Human Authentication Based on ECG Waves Using Radon Transform....Pages 197-206
Wireless Network Security Vulnerabilities and Concerns....Pages 207-219
Figment Authentication Scheme in Wireless Sensor Network....Pages 220-223
Issues of Security and Network Load in Presence – A Survey....Pages 224-230
Discovering the Botnet Detection Techniques....Pages 231-235
Contactless Biometrics in Wireless Sensor Network: A Survey....Pages 236-243
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems....Pages 244-249
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010....Pages 250-258
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model....Pages 259-268
Internet SCADA Utilizing API’s as Data Source....Pages 269-275
Insecure Information System’s Solution Using Isolation Method....Pages 276-281
Communication Security for Control Systems in Smart Grid....Pages 282-289
NMACA Approach Used to Build a Secure Message Authentication Code....Pages 290-298
Back Matter....Pages -
....
Download the book Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen