Keynote lectures are plenary sessions which are scheduled for taking about 45 minutes + 10 minutes for questions.  
 
 
 
- Mohammad S. Obaidat, Monmouth University, United States
- Günther Pernul, University of Regensburg, Germany
 
 
Keynote Lecture 1
Future and Challenges of the Security of e-Systems and Computer Networks
 
  Mohammad S. Obaidat
Monmouth University, United States
Brief Bio:
Professor Mohammad S. Obaidat is an internationally well known academic/researcher/ scientist. He received his Ph.D. and M. S. degrees in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, Ohio, USA. Dr. Obaidat is currently a tenured full Professor of Computer Science at Monmouth University, NJ, USA. Among his previous positions are Chair of the Department of Computer Science and Director of the Graduate Program at Monmouth University and a faculty member at the City University of New York. He has received extensive research funding and has published over three hundred and forty (340) refereed technical articles in scholarly international journals and proceedings of international conferences. He is the author of several books including the Best Selling Book, Wireless Networks (Wiley), Multiwavelength Optical LANs (Wiley), APPLIED SYSTEM SIMULATION: Methodologies and Applications (Kluwer/Springer), Security of e-Systems and Computer Networks (Cambridge University Press), and Fundamentals of Performance Evaluation of Computer and Telecommunications Systems (Wiley). Professor Obaidat has served as a consultant for several corporations and organizations worldwide. He is the Editor-in-Chief of the International Journal of Communication Systems published by John Wiley & Sons. He is also Editor of IEEE Wireless Communications. Obaidat is an editor/ editorial board member/advisory board member of seven other refereed scholarly journals including two IEEE Transactions, Elsevier Computer Communications Journal, Springer Journal of Supercomputing, SCS Transactions of the Society for Modeling and Simulation, SCS Journal of Defense Modeling and Simulation, Elsevier Journal of Computers and EE, and International Journal of Information Technology. He has guest edited numerous special issues of scholarly journals and IEEE Transactions. Obaidat has served as the general chair, honorary chair, steering committee chair, advisory committee chair and program chair of many international conferences. He is the founder of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS and has served as the General Chair of SPECTS since its inception. Obaidat has received a recognition certificate from IEEE. Between 1994-1997, Obaidat has served as distinguished speaker/visitor of IEEE Computer Society. Since 1995 he has been serving as an ACM distinguished Lecturer. He is also an SCS distinguished Lecturer. Between 1996-1999, Dr. Obaidat served as an IEEE/ACM program evaluator of the Computing Sciences Accreditation Board/Commission, CSAB/CSAC. He has served as the Scientific Advisor for the World Bank/UN Digital Inclusion Workshop- The Role of Information and Communication Technology in Development. Between 1995-2002, he has served as a member of the board of directors of the Society for Computer Simulation International. Between 2002-2004, He has served as Vice President of Conferences of the Society for Modeling and Simulation International SCS. Between 2004-2006, he has served as the SCS Vice President of Membership. Currently, he is the Senior Vice President of SCS. He has been invited to lecture and give keynote speeches worldwide. His research interests are: wireless communications and networks, telecommunications and Networking systems, security of network, information and computer systems, security of e-based systems, performance evaluation of computer systems, algorithms and networks, high performance and parallel computing/computers, applied neural networks and pattern recognition, adaptive learning and speech processing. Recently, Prof. Obaidat has been awarded a Nokia Research Fellowship and the distinguished Fulbright Scholar Award. During the 2004/2005, he was on sabbatical leave as Fulbright Distinguished Professor and Advisor to the President of Philadelphia University in Jordan, Dr. Adnan Badran. The latter became the Prime Minister of Jordan in April 2005 and served earlier as Vice President of UNESCO. Prof. Obaidat is a Fellow of the Society for Modeling and Simulation International SCSI, and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).
 
Abstract:
e-Based systems and computer networks are ubiquitous in the modern world, with applications spanning e-commerce, WLANS, healthcare and governmental organizations, banking, among others. The secure transfer of information has therefore become a critical area of research, development, and investment. e-Security solutions aim to provide five important services: authentication of users and actors, integrity, confidentiality of communication, availability of business services, and non-repudiation of transactions. Most e-security solutions that are provided by the literature use two main cryptographic techniques: public key cryptosystems and digital signatures.
Organizations face three types of economic impact as possible results of malicious attacks targeting them: the immediate, short term, and midterm economic impacts. The immediate economic impact is the cost of repairing, modifying, or replacing systems (when needed) and the immediate losses due to disruption of business operations, transactions, and cash flows. Short term economic impact is the cost on an organization, which includes the loss of contractual relationships or existing customers because of the inability to deliver products or services as well as the negative impact on the reputation of the organization. Long term economic impact is induced by the decline in an organization's market appraisal.
ICT and Internet use have contributed significantly to the success of many companies and organizations. Nevertheless, the current growth of digital attacks has caused decision makers in enterprises and government to doubt the confidence in information and communication technology. In fact, security incidents that occurred recently have emphasized three important facts: (a) computer network attacks can induce a huge damage on business and government activity, (b) many of the attacked organizations have active security infrastructures at the moment the security incident occurred and (c) the security infrastructure cost vary highly from one organization to the other based on the security policy adopted and the nature of the activity performed by the enterprise. Structured methodologies that identify, analyze, monitor, and mitigate computer and network security risks have been developed to help enterprises integrate security in their strategic plans.
The core areas of security of e-systems and computer networks such as authentication of users, system integrity, confidentiality of communication, availability of business service, risk management and analysis and non-repudiation of transactions –are covered in this talk. Other topics that will be dealt with include public key infrastructure (PKI) systems, biometric-based security systems, intrusion detection technologies, virtual private networks (VPNs), malware, and wireless LANs security.
This keynote presents the recent trends, challenges and applications of security of e-based systems and computer networks. Samples of some of our recent results in this fascinating area will be presented as well.
 
Keynote Lecture 2
Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and Use in the Access-eGov Project
 
Günther Pernul
University of Regensburg, Germany
Brief Bio:
Günther Pernul received diploma and doctoral degrees both from the University of Vienna, Austria. Currently he is a full professor and managing director of the Department of Information Systems at the University of Regensburg, Germany. His research interests are web-based information systems, information security, and application security. In these areas he is co-author of a text book, has edited or co-edited eight books, and published more than 100 papers in scientific journals and conference proceedings Dr. Pernul is a member of ACM, IEEE, GI, OCG, member of the IFIP WG 11.3 and observer of the IFIP WG 11.8 (Security Education). He serves on the steering board of the Communications and Multimedia Security (CMS) and is cofounder of the EC-Web (since 2000) and TrustBus (since 2004) conference series. He has been involved in several research projects on national and international levels.
 

Abstract:
In this talk we argue that traditional approaches for authorization and access control in computer systems (i.e., discretionary, mandatory, and role-based access controls) are not appropriate to address the requirements of networked or distributed systems, and that proper authorization and access control requires infrastructural support in one way or another. This support can be provided, for example, by an authentication and authorization infrastructure (AAI). Against this background, we overview, analyze, discuss, and put into perspective some technologies that can be used to build and operate AAIs. A privilege management infrastructure (PMI) is one step further and able to support a comprehensive authorization service. Several new approaches for privilege management have emerged by dynamically controlling the users accesses based on exchanging and evaluating general user attributes, most notable the attribute-based access control model (ABAC). During the talk we will develop a PMI service model as a reference that includes ABAC functionality and is based on the OASIS XACML specifications and lessons learned from different existing AAIs. Our work is carried out within the European research project Access-eGov that aims for a European-wide e-Government service platform.