Amril Syalim

Lecturer, Faculty of Computer Science, Universitas Indonesia

Address: R3301, Fakultas Ilmu Komputer, Kampus UI Depok, INDONESIA, 16424 TEL: +62-21-786-3419 ext:3301, FAX: +62-21-786-3415
Amril Syalim photo




About Me

I am a lecturer at Faculty of Computer Science, Universitas Indonesia. I am teaching some classes related to cryptography and computer security, operating systems, computer networks and mathematics. I am also working as an IT/security consultant in a government organization. My research interests are in the area of cryptography and information security.





Education

PhD (in Informatics). Kyushu University, Fukuoka, Japan.
Thesis Title: Securing Data with Provenance and Cryptography.

Master of Engineering (in Computer Science and Communication Engineering). Kyushu University, Fukuoka, Japan.
Thesis Title: Controlling Access to Encrypted Databases Using Multipolicy Access Control System.

Bachelor of Science (in Computer Science). University of Indonesia, Jakarta, Indonesia.
Thesis Title: Cellular Automata: Models and Parallel Implementation for Traffic Simulation.





Professional Certifications

Certified Information Systems Security Professional (CISSP, ISC²).





Publications/Presentations


Journals

  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "Securing Provenance of Distributed Processes in an Untrusted Environment." IEICE Transactions on Information and Systems Vol.E95-D, No.7, Jul. 2012.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider.” Information Processing Society of Japan (IPSJ) Journal (Technical Note), Vol.47, No.2, (2, 2006).

Conferences

  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "Improved proxy re-encryption scheme for symmetric key cryptography." International Workshop on Big Data and Information Security (IWBIS), 2017. IEEE, pp. 105-111. (Best Paper Award)
  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "How to sign multiple versions of digital documents." International Workshop on Big Data and Information Security (IWBIS), 2017. IEEE, pp. 133-136.
  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance." ICT-EurAsia 2013, LNCS 7804, Yogyakarta, Indonesia, March 25-29, 2013.
  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "Realizing Proxy Re-encryption in the Symmetric World." ICIEIS2011, CCIS 251, Kuala Lumpur, Malaysia, November 14-16, 2011.
  • Amril Syalim, Takashi Nishide, Kouichi Sakurai. "Preserving Integrity and Confidentiality of a Directed Acyclic Graph of Provenance." DBSec 2010, LNCS 6166, Rome, Italy, June 21-23, 2010.
  • Amril Syalim, Yoshiaki Hori, Kouichi Sakurai. "Grouping Provenance Information to Improve Efficiency of Access Control." ISA 2009: 51-59, LNCS 5576, Seoul, Korea, June 25-27, 2009.
  • Amril Syalim, Yoshiaki Hori, Kouichi Sakurai. "Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft’s Security Management Guide." The First International Workshop on Organizational Security Aspects (OSA 2009), pp.726-731, March 2009, Fukuoka.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Usage Control Model and Architecture for Data Confidentiality in Database Service Provider.” Indonesia Cryptology and Information Security Conference (INA-CISC) 2005. March 2005. Jakarta.

Symposiums/Posters

  • Takashi Nishide, Amril Syalim, and Kouichi Sakurai, "Report on IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy 2010." Computer Security Symposium (CSS) 2010. Oct 2010. Okayama.
  • Amril Syalim, Takashi Nishide, Kouichi Sakurai, "Preserving Integrity and Confidentiality of a Directed Acyclic Graph of Provenance." Forum on Information Technology (FIT) 2010. Sept 2010. Fukuoka.
  • Amril Syalim, Yoshiaki Hori, Kouichi Sakurai, "Securing Provenance by Distributing the Provenance Storage." Computer Security (CSEC) 2009. March 2009. Kumamoto.
  • Amril Syalim, Yoshiaki Hori, Kouichi Sakurai, "Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft’s Security Management Guide." Computer Security Symposium (CSS) 2008. Oct 2008. Okinawa.
  • Amril Syalim, Kouichi Sakurai.”Searching Encryption Key with Quantum Computer Using Grover Algorithm.” Symposium on Computer and Information Security (SCIS) 2008. January 2008. Miyazaki.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties.” Symposium on Computer and Information Security (SCIS) 2006. Jan 2006. Hiroshima.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”A Model to Partially Outsourcing Access Control for Databases.” Computer Security Symposium (CSS) 2005. Oct 2005. Matsuyama.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Usage Control Model for Data Confidentiality Problem in Database Service Provider.” Symposium on Computer and Information Security (SCIS) 2005. Jan 2005. Kobe.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Access Control Model for a Secure Enhanced Database Management System.” Computer Security Symposium (CSS) 2004. Oct 2004. Hokkaido University. Hokkaido.
  • Amril Syalim, Toshihiro Tabata and Kouichi Sakurai. ”Outsourced Access Control Model for Outsourced Databases (poster).” 2nd Japan/U.S. Workshop on Critical Information Infrastructure Protection. Jun 2005. Tokyo.




Awards/Honors

  • Monbukagakusho (MEXT—Japanese Government) Scholarship (2008-2012).
  • Kohnan Asia Scholarship (2005-2006).
  • Kyudenko Scholarship (2004-2005).




Professional Services

  • Journal reviewer: TKDE (IEEE, 2011), TDSC (IEEE, 2011,2012).
  • External reviewer: IWSEC 2007, INSCRYPT 2018, DEPENDSYS 2018 .
  • Organizer: Gemastik (2016 and 2017), Information and Network Security.