Abbrevation
ISA
City
Busan
Country
North Korea
Deadline Paper
Start Date
End Date
Abstract

<FONT size=2>Our Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Information Security and Assurance including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems&#046; </FONT><BR><B>Keywords:</B> <STRONG>1) Security Engineering and Its Application<BR></STRONG><FONT size=2> &#8211; Security Level Definition Criteria and Its Application <BR> &#8211; Security Requirements Engineering<BR> &#8211; Security in System/Software/Product Development Site<BR> &#8211; Security in Development Processes<BR> &#8211; Security Maturity Model<BR> &#8211; Security Evaluation Criteria and Methodology <BR> &#8211; New Idea, Theory and Paradigm for Security <BR> &#8211; etc <BR></FONT><BR><B>2) Security and Assurance in Operational Area</B><BR><FONT size=2> &#8211; Security Policy, Strategy and Management<BR> &#8211; Authentication and Identity Management <BR> &#8211; Security Education and Training <BR> &#8211; Personnel Security and Privacy<BR> &#8211; </FONT><FONT face=&#8243;Times New Roman&#8243; size=2>Trust Negotiation, Establishment and Management<BR> &#8211; Vulnerability, Threat, and Risk Analysis <BR> &#8211; etc <BR></FONT><BR><FONT face=&#8243;Times New Roman&#8243;><B>3) Security and Assurance in Technology Area </B><BR><FONT size=2> &#8211; Agent and Mobile Code Security <BR> &#8211; Authorization and Access Control <BR> &#8211; Biometrics Security and Applications <BR> &#8211; Computer Forensics <BR> &#8211; Cryptographic Protocols <BR> &#8211; Data Integrity and Privacy <BR> &#8211; Database Security <BR> &#8211; Intrusion Detection and Prevention <BR> &#8211; Distributed System Security <BR> &#8211; Key Management and Recovery <BR> &#8211; Mobile and Ad hoc network security <BR> &#8211; Operating System Security <BR> &#8211; Secure Hardware and Software Design<BR> &#8211; </FONT></FONT><FONT face=&#8243;Times New Roman&#8243; size=2>Smartcards and Chip Security<BR> &#8211; RFID, Sensor Network, Ubiquitous Computing Security <BR> &#8211; etc</FONT> <P><FONT face=&#8243;Times New Roman&#8243;><B>4) Security and Assurance in Commercial Area </B><BR><FONT size=2> &#8211; Cell phone, PDA, and Potable Device Security <BR> &#8211; Biometrics Products and its Applications <BR> &#8211; Firewall, IDS, Anti&#8211;virus, and other Security Products <BR> &#8211; E&#8211;Commerce and E&#8211;Government Security <BR> &#8211; Intellectual Property Protection <BR> &#8211; Internet and Web Services Security <BR> &#8211; etc <BR><BR></FONT><B>5) Security and Assurance in Military Area</B><BR><FONT size=2> &#8211; Information Warfare and Countermeasures<BR> &#8211; Cyber&#8211;attack and Cyber&#8211;terrorism<BR> &#8211; Anti&#8211;tamper and TEMPEST<BR> &#8211; Physical Security and Soldier Security<BR> &#8211; E&#8211;bomb and Electronic Attack<BR> &#8211; Tactical Communication and Network Security<BR> &#8211; Sensor&#8211;to&#8211;shooter/Command Control System Security<BR></FONT></FONT><FONT face=&#8243;Times New Roman&#8243; size=2> &#8211; etc</FONT></P>