Skip to content. | Skip to navigation

Personal tools

This Logo Viewlet registered to Business4 Theme
You are here: Home / Events / WORLDCOMP'16 / Program / SAM'16: Tuesday, July 26, 2016 Schedule

SAM'16: Tuesday, July 26, 2016 Schedule

To select a different schedule  CLICK HERE


7:00am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)
 
 
SESSION 3-SAM:    SECURITY MANAGEMENT + COMPUTER SECURITY + SECURITY
                  APPLICATIONS
                  Chairs: Dr. Martin Zsifkovits,
                          Universitat der Bundeswehr Munchen, Germany;
                          Dr. Kazi Zunnurhain,
                          Northern Kentucky University, USA
                  July 26, 2016 (Tuesday); 08:00pm - 10:20pm
                  (LOCATION: Ballroom 2)
 
08:00 - 08:20am:  Strategic Risk Management in Counter-Terrorism for the
                  Railbound Public Transport: Merging Qualitative and
                  Quantitative Operations Research Techniques
                  Martin Zsifkovits, Stefan Pickl
                  Universitat der Bundeswehr Munchen, Institute for Informatics,
                  Mathematics, and Operations Research, Neubiberg, Germany
 
08:20 - 08:40am:  Using Football Formations in a Honeypot Environment
                  Sebastian Kollmannsperger, Tyrone S. Toland
                  Department of Informatics, University of South Carolina
                  Upstate, Spartanburg, South Carolina, USA
 
08:40 - 09:00am:  Vulnerabilities with Internet of Things
                  Kazi Zunnurhain
                  Northern Kentucky University, Highland Heights, Kentucky, USA
 
09:00 - 09:20am:  eGovernment Security Requirements: Managing Obligations and
                  Authorizations Inconsistencies with XACMLv3
                  Ibrahim Yonis Omar, Romain Laborde, Francois Barrere,
                  Ahmad Samer Wazan, Abdelmalek Benzekri
                  Institut de Recherche en Informatique de Toulouse, University
                  Paul Sabatier, Toulouse, France
 
09:20 - 09:40am:  Mitigation Model to Improve Android Security
                  Hani Alshahrani, Ali Alshehri, Raed Alharthi, Huirong Fu,
                  and Ye Zhu
                  Department of Computer Science and Engineering, Oakland
                  University, Rochester, Michigan, USA;  Department of ECE,
                  Cleveland State University, Ohio, USA
 
09:40 - 10:00am:  Detecting and Preventing Information Security Breaches
                  Haydar Teymourlouei, Lethia Jackson
                  Department of Computer Science, Bowie State University,
                  Bowie, Maryland, USA
 
10:00 - 10:20am:  Modeling Host OSI Layers Cyber-Attacks Using System Dynamics
                  Uma Kannan, Rajendran Swamidurai, David Umphress
                  Computer Science and Software Engineering, Auburn University,
                  Auburn, Alabama, USA;  Mathematics and Computer Science,
                  Alabama State University, Montgomery, Alabama, USA
 
10:20 - 10:40pm:  BREAK
 
 
SESSION 4-SAM:    PANEL: FUTURE OF CYBERSECURITY EDUCATION
                  Moderator: Prof. Kevin Daimi, University of Detroit Mercy, USA
                  Panelists:
                  Prof. Eman El-Sheikh, University of West Florida, USA
                  Prof. Levent Ertaul, California State University East Bay, USA
                  Prof. Guillermo Francia, Jacksonville State University, USA
                  July 26, 2016 (Tuesday); 10:40am - 11:40pm
                  (LOCATION: Ballroom 2)
 
 
11:40 - 12:00pm:  FREE SLOT
 
12:00 - 12:20pm:  FREE SLOT
 
12:20 - 01:20pm:  LUNCH (On Your Own)
 
 
SESSION 5-SAM:    NETWORK SECURITY II
                  Chair: Prof. Guillermo Francia,
                         Jacksonville State University, USA
                  July 26, 2016 (Tuesday); 01:20pm - 03:00pm
                  (LOCATION: Ballroom 2)
 
01:20 - 01:40pm:  A Routing Algorithm with Path Randomization for Enhanced
                  Security and Balanced Energy Consumption
                  David C. Yuan, Lei Chen
                  Texas Academy of Mathematics and Science University of
                  Northern Texas, Texas, USA;  Department of Information
                  Technology, Georgia Southern University, Georgia, USA
 
01:40 - 02:00pm:  Federated Identity and Access Management and Trusted Computing
                  Based Federated Grid Model for Federated Grid Resources Access
                  Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman
                  Department of Computer Science, Iqra National University,
                  Peshawar, Pakistan;  MIMOS Berhad, Technology Park Malaysia,
                  Kuala Lumpur, Malaysia;  Department of Computer Sciences,
                  Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia
 
02:40 - 02:20pm:  Network Security Threats and Vulnerabilities
                  Manal Alshahrani, Haydar Teymourlouei
                  Department of Computer Science,
                  Bowie State University, Bowie, Maryland, USA
 
02:20 - 02:40pm:  SOC as a Service: A User Centric Approach for Network
                  Security Monitoring
                  Nicolas Greneche, Mohamed Kone, Christian Toinard
                  Sorbonne Paris, University of Paris 13, DSI, LIPN, CNRS,
                  UMR, Villetaneuse, France;
                  INSA CVL, Bourges, France
 
02:40 - 03:00pm:  FREE SLOT
 
 
03:00 - 03:40pm:  POSTER SESSION B-SAM
                  (INCLUDES POSTER + SHORT & POSITION PAPERS)
                  July 26, 2016 (Tuesday)
                  (LOCATION: Hallways of Ballrooms 1-5)
 
                  O.  s-Tor-y on User Acceptance of PETs
                      Marta Piekarska, Miguel Rios Quintero
                      Security in Telecommunications, Technische Universitat
                      Berlin, Germany;  2IP-Based Assesment, Technische Universitat
                      Berlin, Germany
                  O.  A Vision for Intrusion Analysis and Digital Forensics in Cloud
                      Kazi Zunnurhain
                      Northern Kentucky University, Highland Heights, Kentucky, USA
                  O.  ...
 
 
SESSION 6-SAM:    SPECIAL TRACK: END-TO-END SECURITY AND CYBERSECURITY:
                  FROM THE HARDWARE TO APPLICATION
                  Chair: Prof. Tiziana Margaria,
                         University of Limerick and Lero, Ireland
                  July 26, 2016 (Tuesday); 03:40am - 05:40pm
                  (LOCATION: Ballroom 2)
 
03:40 - 04:00pm:  SEcube: An Open Security Platform: General Approach and
                  Strategies
                  Antonio Varriale, Giorgio Di Natale, Paolo Prinetto,
                  Bernhard Steffen, Tiziana Margaria
                  Blu5 Labs Ltd., Ta' Xbiex, Malta;  LIRMM, CNRS, Montpellier,
                  France;  CINI Cyber Security National Lab, Rome, Italy;
                  Technical University of Dortmund, Germany;  University of
                  Limerick and Lero, Limerick, Ireland
 
04:00 - 04:20pm:  SEcube: Data at Rest and Data in Motion Protection
                  Antonio Varriale, Paolo Prinetto, Alberto Carelli, and
                  Pascal Trotta
                  Blu5 Labs Ltd., Ta' Xbiex, Malta;  CINI Cyber Security National
                  Lab, Rome, Italy;  Lero - The Irish Software Research Centre,
                  Limerick, Ireland
 
04:20 - 04:40pm:  Model Driven Design of Secure High Assurance Systems: An
                  Introduction to the Open Platform from the User Perspective
                  Steve Bosselmann, Johannes Neubauer, Stefan Naujokat, and
                  Bernhard Steffen
                  Technical University of Dortmund, Dortmund, Germany
 
04:40 - 05:00pm:  Towards Model Driven Design of Crypto Primitives and Processes
                  Alberto Carelli, Giorgio Di Natale, Pascal Trotta, and
                  Tiziana Margaria
                  LIRMM, CNRS, Montpellier, France;  CINI Cyber Security National
                  Lab, Rome, Italy;  Lero - The Irish Software Research Centre,
                  Limerick, Ireland;  University of Limerick and Lero, Ireland
 
05:00 - 05:20pm:  Model Driven Design of Secure Properties for Vision-based
                  Applications: A Case Study
                  Giuseppe Airo Farulla, Marco Indaco, Axel Legay, Tiziana Margaria
                  Looqui Srl, SME and Politecnico di Torino, Turin, Italy;
                  INRIA, Rennes, France;  University of Limerick and Lero, Ireland
 
05:20 - 05:40pm:  End2End CyberSecurity Based on a Strong Public-Private Partnership
                  Italian National Cyber Security Framework
                  Roberto Baldoni, Luca Montanari
                  CINI Cyber Security National Lab, Rome, Italy
 
 
05:40 - 08:30pm:  TUTORIALS + DISCUSSIONS
                  (Please refer to the lists at the begining of the program
                  book for details)


To select a different schedule  CLICK HERE

Navigation

« December 2016 »
December
MoTuWeThFrSaSu
1234
567891011
12131415161718
19202122232425
262728293031

Important Dates

  Past Events