Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
EISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA Ď07. To see proceedings from other years, simply click on the appropriate button below the main menu. If citing from any papers, please use the following citation information: In the Proceedings of the 3rd Annual Symposium on Information Assurance (ASIA Ď07), June 6-7, 2007, Empire State Plaza, Albany, NY. >>
Download full ASIA '07 Proceedings

Beginning Pages
>> Cover Information, pp.
>> Message from Symposium Chairs, pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

Session 1: Keynote Address (D-1)
>> An Academic Speculates on the Future of Intrusion Detection, pp. 1
Nick Weaver

Session 2: Intrusion Detection
>> Identifying Botnet Traffic on an Enterprise Network, pp. 2-8
Mary Henthorn

>> Lookahead Pairs and Full Sequences: A Tale of Two Anomaly Detection Methods, pp. 9-19
Hajime Inoue and Anil Somayaji

Session 3: Information System Design & Risk Analysis
>> Designing Information Systems Security: Interpretations from British National Health Services Hospital, pp. 20-28
Gurpreet Dhillon

>> Invited Talk: The Impact of Interdependent Risk on Healthcare Information Infrastructure Effectiveness, pp. 29-35
Insu Park, Raj Sharman, H. R. Rao, and Shambhu Upadhyaya

Session 4: Keynote Address (D-2)
>> Understanding Multistage Attacks in the Cyberspace to Address the Grand Challenges in Security, pp. 36
Shambhu Upadhyaya

Session 5: Wireless Sensor Network Security
>> A Secure Framework for Wireless Sensor Networks, pp. 37-45
Bruce Barnett and Daniel Sexton

>> Invited Talk: Traffic Analysis Resilient MAC for Multi-Hop Wireless Networks, pp. 46
Nael Abu-Ghazaleh

Session 6: Terrorism and International Crime
>> The Impact of Transnational Criminal Internet Activity in Academic Institutions on Public Safety and Security, pp. 47-54
Steffani Burd, Matthew Haschak, and Scott Cherkin

>> Countering Hypermedia Seduction for Terrorist Recruiting, pp. 55
Katharina Von Knop

Session 7: Federated Security Management
>> Role-based Security in a Federated File System, pp. 56-63
Max Berger and Micheal Sobolewski

>> Security Policy Management in Federated Computing Environments, pp. 64-70
Daniela Inclezan and Micheal Sobolewski

Closing Pages
>> Author Biographies, pp. 71-75
>> Author Index, pp. 76
Important Dates

I do not fear computers. I fear the lack of them.

- Isaac Asimov

Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active, part of the problem.

- Fred Langa

In theory, one can build provably secure systems. In theory, theory can be applied to practice, but in practice, it canít.

- M. Dacier