Keynote Lectures
1st International Conference
on E-business and Telecommunication Networks
Keynote 1: E-Business Security
and Information Assurance
 |
Dr. Manu Malek
|
Brief Bio
of Dr. Manu Malek:
Manu Malek is Industry Professor and Director of the Graduate Certificate in CyberSecurity Program at Stevens Institute of Technology. Prior to joining Stevens in October 2001, he was a Distinguished Member of Technical Staff at Lucent Technologies Bell Laboratories. He has more than 20 years of experience in teaching, practicing, and research in telecommunication and computer networks. He has held various academic positions in the US and overseas, as well as technical management positions with Bellcore (now Telcordia Technologies) and AT&T Bell Laboratories. He is the author, co-author, or editor of seven books, and the author or co-author of over fifty published technical papers and numerous internal technical reports in the areas of communication networks, network operations and management, and computer communications.
Dr. Malek is a fellow of the IEEE, an IEEE Communications Society Distinguished Lecturer, and the founder and Editor-in-Chief of Journal of Network and Systems Management. . He earned his Ph.D. in EE/CS from University of California, Berkeley.
Abstract:
Today businesses use the Internet/www to reach a worldwide audience at a relatively low cost. However, due to the very advantages it provides, the Internet poses a unique set of vulnerabilities which need to be addressed. Security is considered a major barrier to the growth of e-commerce. Buyers are concerned about sending their private information on the Internet, and sellers are concerned about their information being stolen as information is one of their major assets. This presentation addresses the critical security requirements for Information Assurance - the operations that protect information and information systems by ensuring information availability, integrity, and confidentiality. Some vulnerabilities and attacks, and the corresponding safeguards and defenses will be described.
Keynote2: Toward Identifying the Attack Source by Deterministic Packet Marking
 |
Dr. Nirwan Ansari
|
Brief
Bio of Dr. Nirwan Ansari:
Nirwan Ansari received the B.S.E.E. (summa cum laude), M.S.E.E., and Ph.D. from NJIT, University of Michigan, and Purdue University in 1982, 1983, and 1988, respectively.
He joined the Department of Electrical and Computer Engineering, NJIT, as an assistant professor in 1988, and has been promoted to a full professor since 1997. His current research focuses on various aspects of multimedia communications and high speed networks. He is a technical editor of the IEEE Communications Magazine, the Journal of Computing and Information Technology, and the ETRI Journal. He authored with E.S.H. Hou Computational Intelligence for Optimization (1997, and translated into Chinese in 2000), and edited with B. Yuhas Neural Networks in Telecommunications (1994), both published by Kluwer Academic Publishers. He has frequently been invited to give talks and tutorials. He was a distinguished speaker at the 2004 Sendai International Workshop on Internet Security and Management, and a keynote speaker at the IEEE/ACM co-sponsored International Conference on E-Business and Telecommunication Networks (ICETE2004). He has contributed over 200 publications in journals, edited books, and conferences.
He initiated (as the General Chair) the First IEEE International Conference on Information Technology: Research and Education (ITRE2003), was instrumental, while serving as its Chapter Chair, in rejuvenating the North Jersey Chapter of the IEEE Communications Society which received the 1996 Chapter of the Year Award and a 2003 Chapter Achievement Award, served as the Chair of the IEEE North Jersey Section and in the IEEE Region 1 Board of Governors during 2001-2002, and currently serves in various IEEE committees. He was the 1998 recipient of the NJIT Excellence Teaching Award in Graduate Instruction, and a 1999 IEEE Region 1 Award.
Abstract:
Recent high profile cyber attacks have caught much attention; they have also revealed the vulnerability of the existing information technology (IT) infrastructure. Developing technology to ensure connectivity of computer and information resources has become the utmost concern to facilitate various rapidly growing e-commerce applications. Prevention of all attacks on the Internet is, however, far from reality. When prevention fails, a mechanism to identify the source(s) of the attack is needed to at least insure accountability for these attacks.
In this talk, we present a novel approach toward identifying the attack source - Deterministic Packet Marking (DPM). The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a DDoS attack. Most of the processing is done at the victim. The traceback process can be performed post-mortem. The involvement of the Internet Service Providers (ISPs) is very limited, and changes to the infrastructure and operation required to deploy DPM are minimal. DPM performs the traceback without revealing the internal topology of the provider's network, which is a desirable quality of a traceback scheme. DPM is a joint work with Andrey Belenky.
Keynote 3: Wireless Technology: A Prescription for Financial Market
 |
MBA.
Deepak Pareek
|
Brief
Bio of Aso. Deepak Pareek:
Professional
with formal education in Engineering {Computers}, Business {Strategic
Management}, and Economics {Planning}. Over five years of exposure to
Information Technology, IT Enabled Services, Infrastructure {IT}, Financial
Services, Banking, E-Business and International Business & Trade.
World Bank empanelled management consultant. Provided a wide range of
information, support and analytical services in the field of e-Business,
Wireless and Mobile Computing development. Multi geographic experience
as a result of interactions with multilateral agencies, regional development
institutions, bilateral agencies, international banks, trade bodies,
government departments and agencies, institutes for training and research.
Abstract:
Real world issues have often driven the financial sector into a leadership position for the adoption of emerging technologies. Today's challenges -- deregulation, mergers, higher customer expectations, demands for efficiency and security -- suggest that business analytics, virtual teaming and single sign-on will soon join wireless and natural language understanding used by the cutting edge of the Finance industry.
The financial sector has always had an appetite for advanced IT. Popular use of ATMs predated home computers by years, and today, we see strong moves by innovative firms into wireless, natural language and business analytics.
Why? The financial industry's key product is information, whose flow is often impeded only by the need for signatures and documents. Your competitors also know this. They often have both the money and the risk tolerance needed to take a chance on new technologies.
Over the long term, work in artificial intelligence, agent technology and visualization may combine with experimental economics and valuation of intellectual capital to create new wealth or disrupt the industry in unpredictable ways. In the medium term, however, current trends and issues suggest important contributions can be made by specific emerging technologies.
The challenges:
Financial services firms are faced with unprecedented challenges created by: Deregulation and mergers; more sophisticated, demanding customers; and pressure to work more efficiently. Let's explore each of these more closely.
Deregulation has created a climate of increased competition and changing business structures.
New competitors have emerged from both different geographies and other industry sectors -- such as insurance -- challenging the value delivered to customers and the costs. There are more opportunities for mergers, and they must offer a return on investment through greater reach and economies of scale. Customers have better access to information and new expectations.
The Internet, cable news, mailing lists and newsgroups are just a few examples of how regular investors are provided with information that was previously unavailable to them.As service industries have moved to availability through a variety of communications and support 24x7, customer expectations have hit new highs.
Customers at lower tiers have become interested in wealth management services as well. The astute use of technology can make this a profitable business. New technologies and business models have raised the bar on efficiency.
The proliferation of networks has reduced the need for human handling and created new opportunities for financial services firms to reengineer processes.
Online banking has facilitated data capture and shifted work to customers.19-Oct-2006aljustificado2">The presentation:
Wireless Financial Services
"Technology Road Map for Financial Markets"
Why Financial Market should embrace Wireless Technology
The Story Thus Far
Financial Sector Evaluation & Technology in Financial Market
The Spectrum of Financial Applications
Initial Trends and Observations
Applications
Retail Brokerage
Retail Banking
Investment
Other Financial Services
Payments
Enterprise
Asset Management
Key Success Factors
Value Proposition
Future Outlook
Future of Financial Markets "Go Hi-tech"
Driving technologies for customer
Short Term Forecasts
The Spectrum of Future Applications
Case Studies
The Strategy "A step by step approach to building wireless financial services"
Conclusion
Keynote 4: Fundamental Challenges of Next Generation Information Retrieval
 |
Dr. Henry Tirri
|
Brief
Bio of Dr. Henry Tirri:
Henry R. Tirri received
his BSc, MSc and PhD in Computer Science from University of Helsinki,
Finland. Dr. Tirri’s academic experience includes both research
and teaching positions at the University of Helsinki, University of
Texas at Austin, Microelectronics and Computer Technology Corporation
(MCC), AT&T Bell Laboratories, Purdue University, NASA Ames Research
Center, Stanford University, And UC Berkeley, where he is currently
a Visiting Scholar until 2005. From 1998 he has been a Professor of
Computer Science at the University of Helsinki, and an Adjunct Professor
of Computational Engineering at the Helsinki University of Technology.
He is the Research Director of Intelligent Systems area in Helsinki
Institute for Information Technology and established the Complex Systems
Computation Research Group (http://cosco.hiit.fi). Dr. Tirri is the
Director of Helsinki Graduate School in Computer Science and Engineering
(HeCSE) (2003-) and a board member of the multidisciplinary Graduate
school for Learning environments (2001-).
Henry Tirri has published
more than 150 international publications in books, journals and conferences
in the areas of probabilistic and information-theoretic modeling,
neural networks, text and data mining, case-based reasoning, transaction
processing, intelligent learning environments, knowledge-based systems
and data-analysis in education. His work is both theoretical and applied
in nature, and the applied work has a strong multidisciplinary flavour.
His current interests focus on next generation search technologies.
Dr. Tirri was
a member of the editorial board of the Computer Journal (Oxford University
Press) (1995 – 1998), and currently in the editorial boards
of International Journal of Mobile Communications (2002-), Web Intelligence
and Agent Systems – An International Journal (IOS Press) (2002-2004)
and International Journal of Neural Systems (World Scientific) (2002-).
He has been the Program Chair or PC member in more than 25 International
Conferences and a Keynote and Invited speaker in more than 15 conferences.
Currently he is the Co-Chair of 2004 Web Intelligence(WI-04). Dr.
Tirri has held several expert positions in industry and government
and is a member of various professional societies such as ACM, IEEE
and IEEE Computer Society, International Neural Network Society, AAAI,
International Society for Bayesian Analysis and American Educational
Research Association.
Abstract:
Over the
last decade there has been an explosion of interest in text/HTML/XML
based information retrieval and information extraction. Information
retrieval is generally viewed as the task "find documents and
parts of documents that interest me," where the users give a
set of some kind of queries to express their interest focus. Albeit
it is a field with strong history of empirical evaluations, the fundamental
theoretical bases for information retrieval are not extensively developed
due to the rather vague nature of the problem - it is very difficult
to formally define a good match of documents to a query. The practical
and commercial value of solving the information retrieval problem
has increased tremendously with the advent of services on the Web,
in particular commercially profitable search engines pioneered by
Yahoo subsidiary Overture and Google. With recognition of profit-making
has come respect, and search is fast becoming a research and development
priority for some of the biggest players in technology, including
Microsoft and IBM. In this talk we will address the fundamental challenges
next generation information retrieval is facing such as automated
clustering of results, learning topics from document corpus and automatic
naming of these components, scaling of the advanced linguistic processing
and statistical modeling approaches extendable to petabyte level.
Keynote 5: TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space Networks
 |
Dr. Mohammed Atiquzzaman
|
Brief
Bio of Dr. Mohammed Atiquzzaman:
Mohammed Atiquzzaman obtained his M.S. and Ph.D. in Electrical Engineering and Electronics from the University of Manchester (UK). He is currently a professor in the School of Computer Science at the University of Oklahoma, and a senior member of IEEE.
Dr. Atiquzzaman is the co-editor-in-chief of Computer Communications journal since Jan 2003. He also serves on the editorial boards of IEEE Communications Magazine, Telecommunication Systems Journal, Real Time Imaging journal, and International Journal on Wireless and Optical Communications. He co-chaired the IEEE High Performance Switching and Routing Symposium (2003) and the SPIE Quality of Service over Next Generation Data Networks conferences (2001, 2002, 2003). He is the panels co-chair of INFOCOM'05, and is/has been in the program committee of many conferences such as INFOCOM, Globecom, ICCCN, Local Computer Networks, and serves on the review panels at the National Science Foundation. He received the NASA Group Achievement Award for "outstanding work to further NASA Glenn Research Center's effort in the area of Advanced Communications/Air Traffic Management's Fiber Optic Signal Distribution for Aeronautical Communications" project. He is the co-author of the book "Performance of TCP/IP over ATM networks" and has over 130 refereed publications, most of which can be accessed at www.cs.ou.edu/~atiq.
His current research interests are in areas of transport protocols, wireless and mobile networks, adhoc networks, satellite networks, Quality of Service, and optical communications. His research has been funded by National Science Foundation (NSF), National Aeronautics and Space Administration (NASA), and U.S. Air Force.
Abstract:
The Internet
Engineering Task Force has developed Mobile IP to handle mobility
of Internet hosts at the network layer. Mobile IP is also being considered
for deployment in space networks. Mobile IP, however, suffers from
a number of drawbacks such as high handover latency, packet loss,
and conflict with network security solutions. In this talk, we describe
TraSH, a new Transport Layer Seamless Handover solution to mobility
in both terrestrial and space networks. TraSH utilizes multi-homing
to achieve a seamless handover of a mobile host, and is designed to
solve many of the drawbacks of Mobile IP. Various aspects, such as
handover, signaling, location management, data transfer, and security
considerations of TraSH will be discussed. The applicability of TraSH
for both terrestrial and space networks will be highlighted. The Stream
Control Transmission Protocol (SCTP), with built-in multi-homing capability,
is used to illustrate the concepts of TraSH.
Keynote 6: Biometric Recognition- Security and Privacy Concerns
 |
Dr.
Luminita Vasiu
|
Brief
Bio of Dr. Luminita Vasiu:
Dr. Luminita Vasiu is the
Head of the Wireless Information Technology Research Centre, and MSc
Programme Leader in the School of Computing Science, Middlesex University,
UK. .Dr Vasiu is also the Chair of the British Computer Society Wireless
Information Technology Specialist Group. Her research interest includes
security, wireless technologies and m-commerce. She is a member of
numerous international conference committees and program Co-Chair
for ICETE and IWWST conferences. Dr. Vasiu has presented papers internationally,
been published in peer-reviewed journals such as the IEEE, and authored
papers on important research topics including security, Internet services
from wireless handheld devices, and m-commerce.
Abstract:
One emerging technology that is gaining recognition and significance is biometrics.
Tradition authentication system based on tokens or knowledge are rapidly being replaced by biometrics-based authentication systems based on psychological or behavioural characteristics. Biometrics can replace or supplement the existing technology. Clearly biometrics provides a innovative security platform and is presented as panacea for more secure authentication system problems.
However biometric-based security systems have some limitations that may have adverse implications for the security of a system. Limitations will be explored from the perspectives of performance, effectiveness, cost of adoption, security considerations and the softer aspects of market acceptance based on public acceptability. Additionally Biometrics has raised some privacy concerns; in many cases there is a necessary trade-off between security and privacy.
Any
problems regarding this Website please feel free to contact
the Webmaster |
|
|
|
|