ASIA Main Page
Call for Papers
Best Paper Awards
NYS Cyber Security Conf.
Directions & Parking
UAlbany Business Website
Want to Sponsor?
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 - |
This is the proceedings for ASIA Ď07. To see proceedings from other years, simply click on the appropriate button below the main menu. If citing from any papers, please use the following citation information: In the Proceedings of the 3rd Annual Symposium on Information Assurance (ASIA Ď07), June 6-7, 2007, Empire State Plaza, Albany, NY. >> Download full ASIA '07 Proceedings
>> Cover Information, pp.
>> Message from Symposium Chairs, pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii
Session 1: Keynote Address (D-1)
>> An Academic Speculates on the Future of Intrusion Detection, pp. 1
Session 2: Intrusion Detection
>> Identifying Botnet Traffic on an Enterprise Network, pp. 2-8
>> Lookahead Pairs and Full Sequences: A Tale of Two Anomaly Detection Methods, pp. 9-19
***WINNER BEST PAPER AWARD***
Hajime Inoue and Anil Somayaji
Session 3: Information System Design & Risk Analysis
>> Designing Information Systems Security: Interpretations from British National Health Services Hospital, pp. 20-28
>> Invited Talk: The Impact of Interdependent Risk on Healthcare Information Infrastructure Effectiveness, pp. 29-35
Insu Park, Raj Sharman, H. R. Rao, and Shambhu Upadhyaya
Session 4: Keynote Address (D-2)
>> Understanding Multistage Attacks in the Cyberspace to Address the Grand Challenges in Security, pp. 36
Session 5: Wireless Sensor Network Security
>> A Secure Framework for Wireless Sensor Networks, pp. 37-45
Bruce Barnett and Daniel Sexton
>> Invited Talk: Traffic Analysis Resilient MAC for Multi-Hop Wireless Networks, pp. 46
Session 6: Terrorism and International Crime
>> The Impact of Transnational Criminal Internet Activity in Academic Institutions on Public Safety and Security, pp. 47-54
Steffani Burd, Matthew Haschak, and Scott Cherkin
>> Countering Hypermedia Seduction for Terrorist Recruiting, pp. 55
Katharina Von Knop
Session 7: Federated Security Management
>> Role-based Security in a Federated File System, pp. 56-63
Max Berger and Micheal Sobolewski
>> Security Policy Management in Federated Computing Environments, pp. 64-70
Daniela Inclezan and Micheal Sobolewski
>> Author Biographies, pp. 71-75
>> Author Index, pp. 76
I do not fear computers. I fear the lack of them.
- Isaac Asimov
Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.
- Fred Langa
In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it canít.
- M. Dacier