3144 Slices
Medium 9781601323699

SESSION Poster Papers

Kevin Daimi, Hamid Arabnia, CSREA Press PDF

Int'l Conf. Security and Management | SAM'16 |

343

SESSION

POSTER PAPERS

Chair(s)

TBA

ISBN: 1-60132-445-6, CSREA Press ©

344

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

345

��s-Tor-y� on� User� Acceptance� of� PETs.

Marta Piekarska1 , Miguel Rios Quintero2

1 Security in Telecommunications, Technische Universität Berlin, Berlin, Germany

2 IP-Based Assesment, Technische Universität Berlin, Berlin, Germany

Abstract— Today every user has a plethora of devices to choose from, depending on the task they want to perform.

However every move they make leaves a trace on the internet. Global surveillance is so common we learned to accept it and not even try to fight against it. There are existing solutions that help protect users, however little research has been done on the usability and transparency of these tools.

See All Chapters
Medium 9781601323699

SESSION Crytographic Technologies II

Kevin Daimi, Hamid Arabnia, CSREA Press PDF

Int'l Conf. Security and Management | SAM'16 |

311

SESSION

CRYPTOGRAPHIC TECHNOLOGIES II

Chair(s)

Dr. Kazi Zunnurhain

Dr. Jue-Sam Chou

ISBN: 1-60132-445-6, CSREA Press ©

312

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

313

A New Group-based Secret Function Sharing with

Variate Threshold

Anneke Soraya Hidayat† , Dae-Soo Kim† , Eun-Jun Yoon‡ and Kee-Young Yoo†∗

School of Computer Science and Engineering

Kyungpook National University

Daegu, South Korea

Department of Cyber Security

Kyungil University

Gyenggsan-Si, Gyeongbuk, South Korea

Email: annekesoraya@gmail.com, stairways@infosec.knu.ac,kr, ejyoon@kiu.kr, yook@knu.ac.kr∗

Corresponding Author

Abstract—Secret sharing is a cryptographic scheme that divides a secret key s to n participants with threshold t. Thus, assuring that no less than t shares can reconstruct the secret. The application of secret sharing also widens not only one group but several hierarchical structure. However, the group-based secret sharing proposed by Liu et al. in 2014 has some drawbacks, which are having an equal threshold for each group and also reconstruct only partial secret when the present groups are less.

See All Chapters
Medium 9781601323699

SESSION Biometrics and Forensics

Kevin Daimi, Hamid Arabnia, CSREA Press PDF

Int'l Conf. Security and Management | SAM'16 |

221

SESSION

BIOMETRICS AND FORENSICS

Chair(s)

Dr. Haydar Teymourlouei

Dr. Khaled Ali Shehata

ISBN: 1-60132-445-6, CSREA Press ©

222

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

223

Subject Movement at Different Force Levels in a Fingerprint Recognition System

Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch, Brennon Morning, Evan Pulliam, Drew

Radcliff, Stephen Elliott, Ph.D.

Department of Technology Leadership and Innovation

Purdue University

West Lafayette, Indiana, USA

Abstract—There has been an increase in biometric application and advancement, and researchers continuously move to improve the technology. Fingerprint recognition is one of the biometric modalities that has experienced this growth, with its increasing presence in Homeland Security and law enforcement. This study investigated the subject performance movement within a fingerprint recognition system. The performance of a biometric system can be tied to the population using it. Analysis of the population brings context and granularity to performance results.

See All Chapters
Medium 9781601323699

SESSION Security Education + Information Assurance + Hardware Security

Kevin Daimi, Hamid Arabnia, CSREA Press PDF

Int'l Conf. Security and Management | SAM'16 |

175

SESSION

SECURITY EDUCATION + INFORMATION

ASSURANCE + HARDWARE SECURITY

Chair(s)

Prof. Ken Ferens

ISBN: 1-60132-445-6, CSREA Press ©

176

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

177

Towards a Mathematical Model for Autonomously Organizing Security Metric Ontologies

Gregory Vert

Bryce Barrette

College of Security and Intelligence

Global Security and Intelligence Studies

Embry Riddle Aeronautical University

Embry Riddle Aeronautical University

Barretb4@erau.edu vertg@erau.edu

Bilal Gonen

Assistant Professor of Computer Science

University of West Florida bilalgonen@gmail.com

Abstract:

Security metrics can be contextually related to the operation of the system and provide a static measure of system security. Some are better at determining the system security. However, their values can change dynamically to threat. Thus they can be grouped into ontologies measuring system health and security under threat conditions. The problem with current approaches is that they are static and that it does not consider the fact that metrics can also occur in multiple ontological classes.

See All Chapters
Medium 9781601323699

SESSION Special Track: End-To-End Security and Cybersecurity; From the Hardware to the Application

Kevin Daimi, Hamid Arabnia, CSREA Press PDF

Int'l Conf. Security and Management | SAM'16 |

129

SESSION

SPECIAL TRACK: END-TO-END SECURITY AND

CYBERSECURITY; FROM THE HARDWARE TO

APPLICATION

Chair(s)

Prof. Tiziana Margaria

ISBN: 1-60132-445-6, CSREA Press ©

130

Int'l Conf. Security and Management | SAM'16 |

ISBN: 1-60132-445-6, CSREA Press ©

Int'l Conf. Security and Management | SAM'16 |

131

SEcube™: an Open Security Platform General Approach and Strategies

Antonio VARRIALE1, Giorgio DI NATALE2, Paolo PRINETTO3, Bernhard STEFFEN4, Tiziana MARGARIA5

1

Blu5 Labs Ltd, Blu5 Group, Ta Xbiex, Malta – av@blu5labs.eu

LIRMM, CNRS, Montpellier, France – giorgio.dinatale@lirmm.fr

3

CINI Cyber Security National Lab & Politecnico di Torino, Torino, Italy – paolo.prinetto@polito.it

4

Chair of Programming Systems, TU Dortmund, Dortmund, Germany – bernhard.steffen@tu-do.de

5

University of Limerick and Lero, The Irish Software Research Centre, Limerick, Ireland – tiziana.margaria@lero.ie

See All Chapters

See All Slices