posted by user: isyou || 3333 views || tracked by 5 users: [display]

MIST 2012 : 4th International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.info/conf/mist12/
 
When Nov 8, 2012 - Nov 9, 2012
Where Fukuoka, Japan
Submission Deadline Aug 31, 2012
Notification Due Sep 30, 2012
Final Version Due Oct 12, 2012
Categories    insider threats   information leakage prevention   malicious insider
 

Call For Papers


Apologies for multiple copies
If you don't want to subscribe this call for papers any more, please let us know at cyberchair4mist@gmail.com

=======================================================================
CALL for PAPERS
=======================================================================
4th International Workshop on Managing Insider Security Threats (MIST 2011)
http://isyou.info/conf/mist12
November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan

In Cooperation With
IPSJ SIG on Security Psychology and Trust (SPT)
IEICE Technical Committee on Information and Communication System Security(ICSS)
=======================================================================

IMPORTANT DATES
-------------------------------------
Submission Deadline: August 31, 2012
Acceptance Notification: September 30, 2012
Camera-Ready & Registration: October 12, 2012


INVITED TALKS
-------------------------------------
We are proud to announce the following confirmed invited speakers:

(1) 1st Invited Talk
- Speaker: Prof. Eugene H. Spafford (Purdue University, USA) at http://info.spaf.us
- Title: Inside, Outside -- But Clearly Not on *Our* Side

(2) 2nd Invited Talk
- Speaker: Prof. Dieter Gollmann (Hamburg University of Technology, Germany)
- Title: TBD


OVERVIEW
-------------------------------------
During the past two decades, information security technology developments have been mainly concerned with intrusion detection to prevent unauthorized attacks from outside the network. This

includes hacking, virus propagation, spyware and more. However, according to a recent Gartner Research Report, information leaks have drastically increased from insiders who are legally

authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause significant damage to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace. On

a larger scale, government and public sectors may suffer competitive loss to other nations due to an internal intelligence breach. While the leaking of critical information by insiders has a

lower public profile than that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges and advances in security and cryptography technologies and management systems for preventing information breaches by

insiders. The workshop promotes state-of-the-art research, surveys and case analyses of practical significance. Physical, managerial, and technical countermeasures will be covered in the

context of an integrated security management system that protects critical cyber-infrastructure against unauthorized internal attack. We expect that this workshop will be a trigger for

further research and technology improvements related to this important subject.

TOPICS
--------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process

**General Chair
Ilsun You (Korean Bible University, South Korea)

**Steering Committee
Dieter Gollmann (Hamburg University of Technology, Germany)
Kouichi Sakurai (Kyushu University, Japan)

**Program Co-Chairs
(1) Track: Insider Threats Prevention
Shuyuan Mary Ho (Drexel University, USA)

(2) Track: Information Leakage Prevention
Kangbin Yim (Soonchunhyang University, Korea)

**Local Arrangement Chair
Yoshiaki Hori (Kyushu University, Japan)

**Program Committee
William R. Claycomb (Carnegie Mellon University, USA)
Steven Furnell (University of Plymouth, UK)
Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
Masahiro Mambo (Kanazawa University, Japan)
Gunther Pernul (University of Regensburg, Germany)
Wolter Pieters (Delft University of Technology, the Netherlands)
Kazuhiro Minami (Institute of Statistical Mathematics, Japan)
Andrew P. Moore (CyLab at Carnegie Mellon University, USA)
Malek Ben Salem (Accenture Technology Labs, USA)
Dongwan Shin (New Mexico Tech, USA)
Sean W. Smith (Dartmouth College, USA)
Masakazu Soshi (Hiroshima City University, Japan)
Willy Susilo (University of Wollongong, Australia)
Shambhu Upadhyaya (SUNY Buffalo, USA)
Toshihiro Yamauchi (Okayama University, Japan)
(More members are being invited)

AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other

conferences that have proceedings.

The submission of contributions to MIST 2011 must occur through the workshop submission system:
http://www.easychair.org/conferences/?conf=mist2012

The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size) [available at http://jowua.yolasite.com/resources/easychair.zip]

Each paper should be 10-15 pages long based on the Easychair style.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.


All papers will be published in the following journals:
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)
- ISSN (print): 2093-5374, ISSN (on-line): 2093-5382

Journal of Internet Services and Information Security (JISIS)
- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077

SPECIAL ISSUE
---------------
Authors of good papers presented at MIST 2012 will be invited to extend their paper for the following SCIE indexed journals:
(1) Journal of Supercomputing (Springer, SCIE)
(2) Computer Science and Information Systems (SCIE, http://www.comsis.org/)

More SCIE or EI indexed journals will be invited.


CONTACT
----------
For further information regarding the workshop and paper submission, please contact Dr. Ilsun You (ilsunu@gmail.com)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
HKUST-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
BIOE 2024   10th International Conference on Bioscience & Engineering