posted by user: ilsunu || 3637 views || tracked by 7 users: [display]

MIST 2011 : 3rd International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.hosting.paran.com/mist11
 
When Nov 30, 2011 - Dec 2, 2011
Where Fukuoka Institute of Technology, Fukuoka
Submission Deadline Jul 23, 2011
Notification Due Aug 10, 2011
Final Version Due Sep 15, 2011
Categories    insider threats   information leakage prevention   intrusion detection
 

Call For Papers

3rd International Workshop on Managing Insider Security Threats (MIST 2011)
November 30 - December 2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan
(in conjunction with the 3-rd INCoS-2011 International Conference)


IMPORTANT DATES
-------------------------------------
Submission Deadlinet: July 23, 2011
Acceptance Notification: August 10, 2011
Camera-Ready: September 15, 2011


OVERVIEW
-------------------------------------
During the past decades, information security developments have been mainly concerned
with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware.
However, according to a recent Gartner Research Report, information leakage caused by
insiders who are legally authorized to have access to some corporate information is
increasing dramatically.
These leakages can cause significant damages such as weakening
the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently
than information leakage caused by outsiders, but the financial damage is much greater.
Countermeasures in terms of physical, managerial, and technical aspects are necessary
to construct an integral security management system to protect companies' major information assets
from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent challenges and advances
in security technologies and management systems to prevent leakage of
organizations' information caused by insiders.
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology improvements
related to this important subject.

TOPICS
--------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing

**Workshop Organizers
Ilsun You (Korean Bible University, South Korea)
Christian W. Probst (Technical University of Denmark, Denmark)

**Advisory Committee
Kouichi Sakurai (Kyushu Unversity, Japan)

**Program Committee
TBD

AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or have submitted
in parallel to any other conferences that have proceedings.
The submission of contributions to MIST 2011 must occur through the INCoS-2011 submission system
(http://edas.info/conference.php?c=10603).

During submission, please select the track
"Workshop: Third International Workshop on Managing Insider Security Threats (MIST 2011)".

Submissions must be in English and prepared based on the instructions at
http://www.computer.org/portal/site/cscps.
Each paper should not be more than six papges
(Conference Proceedings Manuscript: two column, single-spaced),
including figures and references, using 10 font size, and number each page.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register
and present the paper at the workshop.

All papers will be published in the IEEE CPS Conference proceedings (the INCoS-2011 proceedings).

For more details, please refer to the submission guideline of the INCoS-2011 at
http://voyager.ce.fit.ac.jp/~incos2011/submission.html

SPECIAL ISSUE
---------------
We are currently negotiating a Special Issue in a high quality international journal for this workshop.
(Pending)

CONTACT
----------
For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You (ilsunu@gmail.com ) or Dr. Christian W. Probst (probst@imm.dtu.dk)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
HKUST-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
ICoSR 2025   2025 4th International Conference on Service Robotics
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
SECRYPT 2025   22nd International Conference on Security and Cryptography