International Conference on Information Security and Privacy
(ISP-10)

Orlando, Florida, USA, July 12-14, 2010
Sukumar Nandi, Guangzhi Qu, Chao-Tung Yang (Editors)
ISBN: 978-1-60651-021-6
Publisher: ISRST
Website: http://www.PromoteResearch.org

 

Contents:

 

Dae Glendowne, Rayford B. Vaughn
Rootkits and their Methods of Concealment
1-5

Jonathan Scott Leigh, Ray Vaughn
HIPPA Violated by Wireless Access Points
6-14

Belhocine Amin, Sadika Selka
Social Networks Security
15-19

Stefan Popoveniuc
Secure voting for children
20-24

Azene Zenebe, Renuka Kumar, Lola Staples, Nnanna Ekedebe
Security Awareness and Security Behaviors of College Students: Basic Security Controls and E-mail Security
25-30

Bart Custers
Data Mining with Discrimination Sensitive and Privacy Sensitive Attributes
31-38

Xiaoqing Xu, Jingzhong Wang, Fei Du
Research of Matrix Bloom Filter in Virus Filtering Firewall
39-43

Richard Janicki, Baoying Wang
Implementation and Detection of Covert Tunnels
44-49

Omotayo T. Ogundare, Dale Lindskog, Ron Ruhl, Pavol Zavarsky
An Analysis of High Availability Solutions within the VMware Infrastructure Architecture
50-57

Pritam Kulkarni, Sunil Mane
Analysis of Order of Matrices in Lattice based PIR Protocol
58-61

Shaun P. Morrissey, Georges Grinstein, Brenden Keyes
Developing Multidimensional Firewall Configuration Visualizations
62-69

Rahman Waheedur, Fareed Ahmad, Khan Shoaib
Modulation Multidimensional Anonymity for Privacy Preservation Data Mining
70-73

Maxim O. Kalinin, Dmitry P. Zegzhda, Peter D. Zegzhda
IT Systems Security Monitoring and Control via Advanced Concern with Integrity Property
74-79

Chandrasekaran Subramaniam, Vinod Duraivelu, Sruthi Saranya N, Mahendra Kumar M
An Integrated Information Security Framework for a Product Development Center
80-84

Tatiana Stepanova, Dmitry Zegzhda, Maxim Kalinin, Peter Baranov
Mobile Anomaly Detector Module Based on Power Consumption Analysis
85-89

Sunghyuck Hong, Sunho Lim
On Biometric Enabled X.509 Certificate
90-95

Kartik Mudaliar, Krishnashree Achuthan
Towards Better Risk Ranking of Threats and Control Focus Areas
96-101

Kshitij Dogra, Neeraj Garg
RWD - Securing Mobile Ad-hoc Networks from Wormhole Attacks
102-108

Fareed Ahmad, Rahman Waheedur, Khan Shoaib
Hybrid Approach for Missing Value Imputation
109-112

Hongjiang Xu, Cedric Rutashobya
A Research Framework for Challenges of Electronic-Commerce Implementation in Small Business
113-120

 

back to 2010 proceedings listing