International Conference on Information Security and Privacy
(ISP-10)
Orlando, Florida, USA, July 12-14, 2010
Sukumar Nandi, Guangzhi Qu, Chao-Tung Yang
(Editors)
ISBN: 978-1-60651-021-6
Publisher: ISRST
Website: http://www.PromoteResearch.org
Contents:
Dae Glendowne, Rayford B. Vaughn
Rootkits and their Methods of Concealment
1-5
Jonathan Scott Leigh, Ray Vaughn
HIPPA Violated by Wireless Access Points
6-14
Belhocine Amin, Sadika Selka
Social Networks Security
15-19
Stefan Popoveniuc
Secure voting for children
20-24
Azene Zenebe, Renuka Kumar, Lola Staples, Nnanna Ekedebe
Security Awareness and Security Behaviors of College Students: Basic Security Controls and E-mail Security
25-30
Bart Custers
Data Mining with Discrimination Sensitive and Privacy Sensitive Attributes
31-38
Xiaoqing Xu, Jingzhong Wang, Fei Du
Research of Matrix Bloom Filter in Virus Filtering Firewall
39-43
Richard Janicki, Baoying Wang
Implementation and Detection of Covert Tunnels
44-49
Omotayo T. Ogundare, Dale Lindskog, Ron Ruhl, Pavol Zavarsky
An Analysis of High Availability Solutions within the VMware Infrastructure Architecture
50-57
Pritam Kulkarni, Sunil Mane
Analysis of Order of Matrices in Lattice based PIR Protocol
58-61
Shaun P. Morrissey, Georges Grinstein, Brenden Keyes
Developing Multidimensional Firewall Configuration Visualizations
62-69
Rahman Waheedur, Fareed Ahmad, Khan Shoaib
Modulation Multidimensional Anonymity for Privacy Preservation Data Mining
70-73
Maxim O. Kalinin, Dmitry P. Zegzhda, Peter D. Zegzhda
IT Systems Security Monitoring and Control via Advanced Concern with Integrity Property
74-79
Chandrasekaran Subramaniam, Vinod Duraivelu, Sruthi Saranya N, Mahendra Kumar M
An Integrated Information Security Framework for a Product Development Center
80-84
Tatiana Stepanova, Dmitry Zegzhda, Maxim Kalinin, Peter Baranov
Mobile Anomaly Detector Module Based on Power Consumption Analysis
85-89
Sunghyuck Hong, Sunho Lim
On Biometric Enabled X.509 Certificate
90-95
Kartik Mudaliar, Krishnashree Achuthan
Towards Better Risk Ranking of Threats and Control Focus Areas
96-101
Kshitij Dogra, Neeraj Garg
RWD - Securing Mobile Ad-hoc Networks from Wormhole Attacks
102-108
Fareed Ahmad, Rahman Waheedur, Khan Shoaib
Hybrid Approach for Missing Value Imputation
109-112
Hongjiang Xu, Cedric Rutashobya
A Research Framework for Challenges of Electronic-Commerce Implementation in Small Business
113-120