Annual Symposium on Information Assurance >> ASIA


Navigation Menu
ASIA Main Page
Call for Papers
Organizing Committee
Symposium Proceedings
Best Paper Awards
Keynote Speakers
Author/Presenter Info.
NYS Cyber Security Conf.
Directions & Parking
EISO Website
UAlbany Business Website
Contact Us
Want to Sponsor?
End of Menu


Twitter logo image Facebook logo image YouTube logo image
Years for Selection: 2006 - 2007 - 2008 - 2009 - 2010 - 2011 - 2012 - 2013 - 2014 - 2015 - 2016 - 2017 -
This is the proceedings for ASIA ‘09. To see proceedings from other years, simply click on the appropriate link above. If citing from any papers, please use the following citation information: In the Proceedings of the 4th Annual Symposium on Information Assurance (ASIA ‘09), June 3-4, 2009, Empire State Plaza, Albany, NY.

Download full ASIA '09 Proceedings

Beginning Pages
>> Cover | Back Cover, pp.
>> Message from the Symposium Chairs (Sanjay Goel & Laura Iwan), pp.
>> Symposium Agenda, pp. i-ii
>> Table of Contents, pp. iii

Session 1: Invited Talk
>> Russian Cyber Warfare and the Magic of Misdirection, pp. 1
Jeff Carr, Greylogic

Session 2: Security Management
>> Behavior Targeting and the Modeling of Economic Compensation for Accessing Private User Behavior Information, pp. 2-6
Daniel O. Rice, Technology Solutions Experts, Inc.

>> Organizational Power and Information Security Implementation, pp. 7-15
John Blue, University of Delaware & Gurpreet Dhillon, Virginia Commonwealth University

Session 3: Distributed Security
>> Federated Role-based Access Control in Exertion-Oriented Programming, pp. 16-22
Satish Vellanki & Michael Sobolewski, Texas Tech University

>> IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Network, pp. 23-28
Sriram Sankaran, Mohammad Iftekhar Husain & Ramlingam Sridhar, University at Buffalo

Symposium Keynote Address
>> Reflections on Emerging Cyber Threats and International Cooperative Responses, pp. 29
Raphael Perl, Head, Action Against Terrorism Unit, Office of Security Cooperation in Europe

Session 4: Information Assurance
>> On Optimal AV System Strategies against Obfuscated Malware, pp. 30-35
Anshuman Singh*, Bin Mai†, Arun Lakhotia* and Andrew Walenstein*, *University of Louisiana at Lafayette, LA, USA; †Northwestern State University, Natchitoches, LA, USA

>> A Brief Letter on Reasoning about Information Assurance using the Semantic Web, pp. 36-38
Stephen F. Bush, GE Global Research Center

Session 5: Invited Talk
>> Social and Behavioral Approaches to Information Assurance, pp. 39
H.R. Rao, University at Buffalo, SUNY

Session 6: Authentication
>> Re-evaluating Single Sign-On System Design Risks: An Activity Theoretic Approach, pp. 40-49
Manish Gupta, Kranti Banala and Raj Sharman, University at Buffalo, SUNY

>> Bridging Research and Practice: Secure Date Management in the Classroom, pp. 50-55
Richard Savacool and Rajendra K. Raj, Rochester Institute of Technology

Session 7: Roundtable: Forensic Education
>> Roundtable: Forensic Education, pp. 56
Panelists: Fabio Auffant, NY State Police, Christian Balan, Champlain College, Sean Smith, NY Prosecutors Training Institute

Closing Pages
>> Author Biographies, pp. 57-64
>> Author Index, pp. 65

Those who do not archive the past are condemned to retype it!

- Garfinkel and Spafford

As we know,
There are known knowns.
There are things we know we know.
We also know
There are known unknowns.
That is to say
We know there are some things
We do not know.
But there are also unknown unknowns, the ones we don't know.
We don't know.

- Donald Rumsfeld, U.S. Secretary of Defense