posted by user: ilsunu || 5890 views || tracked by 8 users: [display]

MIST 2016 : 8th ACM CCS International Workshop on Managing Insider Security Threats


When Oct 24, 2016 - Oct 28, 2016
Where Hofburg Palace, Vienna, Austria
Submission Deadline Jul 27, 2016
Notification Due Sep 10, 2016
Final Version Due Sep 20, 2016
Categories    insider threats   security   authentication

Call For Papers

8th ACM CCS International Workshop on Managing Insider Security Threats
(In Conjunction with ACM CCS 2016)

Hofburg Palace, Vienna, Austria
October 24-28, 2016


(1) Submisison Deadline is extended to July 27, 2016

- Submission Deadline: July 27, 2016
- Authors Notification: September 10, 2016
- Author Registration: September 20, 2016
- Final Manuscript: September 20, 2016 (hard deadline)

During the past two decades, information security technology developments have been mainly
concerned with intrusion detection to prevent unauthorized attacks from outside the network.
This includes hacking, virus propagation, spyware and more.
However, according to a recent Gartner Research Report, information leaks have
drastically increased from insiders who are legally authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause significant damage
to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace.
On a larger scale, government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach.
While the leaking of critical information by insiders has a lower public profile than
that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges and advances
in security and cryptography technologies and management systems for preventing
information breaches by insiders. The workshop promotes state-of-the-art research, surveys
and case analyses of practical significance.
Physical, managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical cyber-infrastructure against
unauthorized internal attack.
We expect that this workshop will be a trigger for further research and technology improvements
related to this important subject.

TOPICS (not limited to)

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process


- General Co-Chairs
Ilsun You (Soonchunhyang University, South Korea)
Elisa Bertino (Purdue University, USA)

- Program Committee Members
- Ioannis Agrafiotis (Oxford University, UK)
- Joonsang Baek (Khalifa Univ. of Sci., Tech. and Research, UAE)
- Matt Bishop (UC Davis, USA)
- William R. Claycomb (Carnegie Mellon University, USA)
- Steven Furnell (University of Plymouth, UK)
- Florian Kammuelle (Middlesex University, UK)
- Andrew Stephen MCGough (Durham University, UK)
- Kazuhiro Minami (Institute of Statistical Mathematics, Japan)
- Jose A. Morales (Carnegie Mellon University, USA)
- Jason Nurse (Oxford University, UK)
- G√ľnther Pernul (University of Regensburg, Germany)
- Christian W. Probst (Technical University of Denmark, Denmark)
- Malek Ben Salem (Accenture, USA)
- Willy Susilo (University of Wollongong, Australia)
- Hassan Takabi (University of North Texas, USA)
- Shambhu Upadhyaya (SUNY Buffalo, USA)
- Danfeng (Daphne) Yao (Virginia Tech, USA)
- Meng Yu (The University of Texas at San Antonio, USA)

[Additional members still being invited]

Authors are invited to submit original papers:
they must not substantially duplicate work that any of the authors have published elsewhere
or have submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2016 must occur through
the workshop submission system: TBD

Submissions must be at most 12 pages in double-column ACM format
( proceedings-templates) including the bibliography and well-marked appendices.
Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted.

Submissions not meeting these guidelines risk rejection without consideration of their merits.
Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline.

For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You (

Related Resources

CCS - May 2019   CCS 2019 : 26th ACM Conference on Computer and Communications Security - May Deadline
SP 2020   IEEE Symposium on Security and Privacy
CCS 2019   26th ACM Conference on Computer and Communications Security
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
ACM WiSec 2020   13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
SEAMS 2020   15th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications