posted by user: ilsunu || 2488 views || tracked by 7 users: [display]

MIST 2011 : 3rd International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.hosting.paran.com/mist11
 
When Nov 30, 2011 - Dec 2, 2011
Where Fukuoka Institute of Technology, Fukuoka
Submission Deadline Jul 23, 2011
Notification Due Aug 10, 2011
Final Version Due Sep 15, 2011
Categories    insider threats   information leakage prevention   intrusion detection
 

Call For Papers

3rd International Workshop on Managing Insider Security Threats (MIST 2011)
November 30 - December 2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan
(in conjunction with the 3-rd INCoS-2011 International Conference)


IMPORTANT DATES
-------------------------------------
Submission Deadlinet: July 23, 2011
Acceptance Notification: August 10, 2011
Camera-Ready: September 15, 2011


OVERVIEW
-------------------------------------
During the past decades, information security developments have been mainly concerned
with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware.
However, according to a recent Gartner Research Report, information leakage caused by
insiders who are legally authorized to have access to some corporate information is
increasing dramatically.
These leakages can cause significant damages such as weakening
the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently
than information leakage caused by outsiders, but the financial damage is much greater.
Countermeasures in terms of physical, managerial, and technical aspects are necessary
to construct an integral security management system to protect companies' major information assets
from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent challenges and advances
in security technologies and management systems to prevent leakage of
organizations' information caused by insiders.
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology improvements
related to this important subject.

TOPICS
--------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing

**Workshop Organizers
Ilsun You (Korean Bible University, South Korea)
Christian W. Probst (Technical University of Denmark, Denmark)

**Advisory Committee
Kouichi Sakurai (Kyushu Unversity, Japan)

**Program Committee
TBD

AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or have submitted
in parallel to any other conferences that have proceedings.
The submission of contributions to MIST 2011 must occur through the INCoS-2011 submission system
(http://edas.info/conference.php?c=10603).

During submission, please select the track
"Workshop: Third International Workshop on Managing Insider Security Threats (MIST 2011)".

Submissions must be in English and prepared based on the instructions at
http://www.computer.org/portal/site/cscps.
Each paper should not be more than six papges
(Conference Proceedings Manuscript: two column, single-spaced),
including figures and references, using 10 font size, and number each page.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register
and present the paper at the workshop.

All papers will be published in the IEEE CPS Conference proceedings (the INCoS-2011 proceedings).

For more details, please refer to the submission guideline of the INCoS-2011 at
http://voyager.ce.fit.ac.jp/~incos2011/submission.html

SPECIAL ISSUE
---------------
We are currently negotiating a Special Issue in a high quality international journal for this workshop.
(Pending)

CONTACT
----------
For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You (ilsunu@gmail.com ) or Dr. Christian W. Probst (probst@imm.dtu.dk)

Related Resources

CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
SEAMS 2020   15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
IJMPICT 2020   International Journal of Managing Public Sector Information and Communication Technologies
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
CANS 2020   Cryptology and Network Security
EI--ICVISP 2020   2020 4th International Conference on Vision, Image and Signal Processing (ICVISP 2020)
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
3rd ICSTR Barcelona September 2020   3rd ICSTR Barcelona – International Conference on Science & Technology Research, 03-04 September 2020
3rd ICSTR Budapest July 2020   3rd ICSTR Budapest – International Conference on Science & Technology Research, 03-04 July 2020