posted by user: isyou || 2302 views || tracked by 3 users: [display]

MIST 2013 : 5th International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.info/conf/mist13/
 
When Oct 24, 2013 - Oct 25, 2013
Where Busan, Korea
Submission Deadline Jul 31, 2013
Notification Due Aug 31, 2013
Final Version Due Sep 30, 2013
Categories    insider threats   information leakage   practical security   malicious insider
 

Call For Papers

===============================================================================
CALL for PAPERS
===============================================================================
5th International Workshop on Managing Insider Security Threats (MIST 2013)
http://isyou.info/conf/mist13

October 24-25, 2013, Pukyung National University, Busan, Korea

== ORGANIZED BY ==
Innovative Information Science & Technology Research Group
===============================================================================

IMPORTANT DATES
-------------------------------------
- Submission Deadline: July 31, 2013
- Authors Notification: August 31, 2013
- Author Registration: September 30, 2013
- Final Manuscript: September 30, 2013

OVERVIEW
-------------------------------------
During the past two decades, information security technology developments have been mainly concerned
with intrusion detection to prevent unauthorized attacks from outside the network.
This includes hacking, virus propagation, spyware and more.
However, according to a recent Gartner Research Report, information leaks have drastically increased from insiders
who are legally authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause significant damage
to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace.
On a larger scale, government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach.
While the leaking of critical information by insiders has a lower public profile than
that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges and advances
in security and cryptography technologies and management systems for preventing information breaches by insiders.
The workshop promotes state-of-the-art research, surveys and case analyses of practical significance.
Physical, managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical cyber-infrastructure against unauthorized internal attack.
We expect that this workshop will be a trigger for further research and technology improvements related to this important subject.

TOPICS
--------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process

**General Co-Chairs
Kyung Hyun Rhee (Pukyung National University, Korea)
Ilsun You (Korean Bible University, Korea)

**Steering Committee
Dieter Gollmann (Hamburg University of Technology, Germany)
Kouichi Sakurai (Kyushu University, Japan)

**Program Co-Chairs
Kangbin Yim (Soonchunhyang University, Korea)


**Program Committee
Ruo Ando (NICT, Japan)
Pandu Rangan Chandrasekaran (Indian Institute of Technology Madras, India)
Xiaofeng Chen (Xidian University, China)
Steven Furnell (Plymouth University, UK)
Yoshiaki Hori (Saga University, Japan)
Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
Fang-Yie Leu (Tunghai University, Taiwan)
Andrew P. Moore (Carnegie Mellon University, USA)
Kirill Morozov (Kyushu University, Japan)
Gunther Pernul (University of Regensburg, Germany)
Marcin Piekarczyk (Pedagogical University in Krakow, Poland)
Wolter Pieters (Delft University of Technology, the Netherlands)
Christian W. Probst (Technical University of Denmark, Denmark)
Marek Ogiela (AGH University of Science and Technology, Poland)
Malek Ben Salem (Accenture Technology Labs, USA)
Dongwan Shin (New Mexico Tech., USA)
Masakazu Soshi (Hiroshima City University, Japan)
Willy Susilo (University of Wollongong, Australia)
Shambhu Upadhyaya (University at Buffalo, The State University of New York, USA)
Qin Xin (University of the Faroe Islands, Denmark)
Danfeng (Daphne) Yao (Virginia Tech., USA)
Meng Yu (Virginia Commonwealth University, USA)
Baokang Zhao (National University of Defense Technology, China)



AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers:
they must not substantially duplicate work that any of the authors have published elsewhere
or have submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2013 must occur through the workshop submission system:
http://www.easychair.org/conferences/?conf=mist2013

The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size)
[available at http://jowua.yolasite.com/resources/easychair.zip]

Each paper should be 10-15 pages long based on the Easychair style.
Submission of a paper implies that should the paper be accepted,
at least one of the authors will register and present the paper at the workshop.


All papers will be published in the following journals:
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)
- ISSN (print): 2093-5374, ISSN (on-line): 2093-5382

Journal of Internet Services and Information Security (JISIS)
- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077


SPECIAL ISSUE
---------------
At least 50% good papers presented at MIST 2012 will be invited to SCIE, EI or Scopus Indexed Journals.
(Soon, the detail plan will be announced).


CONTACT
----------
For further information regarding the workshop and paper submission, please contact Dr. Ilsun You (ilsunu@gmail.com)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
S&P 2025   The 45th IEEE Symposium on Security and Privacy
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
NYC-2024-CT 2024   New York Annual Conference on Cyber Threats and Defense Strategies 2024
IJCTCM 2024   International Journal of Control Theory and Computer Modelling
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)