posted by user: ilsunu || 5439 views || tracked by 7 users: [display]

MIST 2010 : 2nd International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.hosting.paran.com/mist10
 
When Jun 14, 2010 - Jun 15, 2010
Where Morioka, Iwate, Japan
Submission Deadline Apr 30, 2010
Notification Due May 30, 2010
Final Version Due Jun 8, 2010
Categories    insider threat   DLP
 

Call For Papers

--------------------------------------------------------------------
The 2nd International Workshop on Managing Insider Security Threats (MIST 2010)
http://isyou.hosting.paran.com/mist10

June 14-15, 2010, Morioka, Iwate, Japan
(in conjunction with IFIPTM 2010)
http://www.ifip-tm2010.org/
----------------------------------------------------------------------------------------

** NEWS
Outstanding papers from MIST 2010, after further revisions, will be published in
Special Issue of Security and Communication Networks (SCN)(indexed by SCIE)

**Overview

During the past decades, information security developments have been mainly concerned
with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware.
However, according to a recent Gartner Research Report, information leakage caused by insiders who are legally authorized to have access to some corporate information is increasing dramatically.
These leakages can cause significant damages such as weakening the competitiveness of companies (and even countries). Information leakage caused by insiders occurs less frequently than information leakage caused by outsiders, but the financial damage is much greater.
Countermeasures in terms of physical, managerial, and technical aspects are necessary
to construct an integral security management system to protect companies' major information assets from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to prevent leakage of organizations' information caused by insiders.
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology improvements related to this important subject.

**Topics (include but are not limited to)

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing

**Workshop Organizers
A Min Tjoa (Vienna University of Technology, Austria)
Ilsun You (Korean Bible University, South Korea)

**Program Committee
Dawn M. Cappelli (Carnegie Mellon University, USA)
Elisa Bertino (Purdue University, USA)
Fariborz Farahmand (Purdue University, USA)
Steven Furnell (University of Plymouth, UK)
Yong Guan (Iowa State University, USA)
Shlomo Hershkop (Columbia University, USA)
Dong Seong Kim (Duke University, USA)
Fang-Yie Leu (Tunghai University, Taiwan)
Gabriele Lenzini (SnT - Univ. of Luxembourg, Luxembourg)
Leszek T. Lilien (Western Michigan University, USA)
Chu-Hsing Lin (Tunghai University, Taiwan)
Debin Liu (Indiana University, USA)
Barton P. Miller (University of Wisconsin, Madison, USA)
Chris Mitchell (University of London, UK)
Peter G. Neumann (SRI, USA)
Marek R. Ogiela (AGH University of Science & Technology Institute of Automatics, Poland)
Kazumasa Omote (JAIST, Japan)
Gunther Pernul (University of Regensburg, Germany)
Malek Ben Salem (Columbia University, USA)
Stelios Sidiroglou-Douskos (MIT, USA)
Sean W. Smith (Dartmouth College, USA)
Masakazu Soshi (Hiroshima City University, Japan)
Huiping Sun (Peking University, China)
Yuqing Sun (Shandong University, China)
Kenichi Takahashi (ISIT, Japan)
Shambhu Upadhyaya (SUNY Buffalo, USA)
Meng Yu (Western Illinois University, USA)

**Important dates
Paper Submission deadline: April 30, 2010
Acceptance notification: May 24, 2010
Camera-ready due: June 4, 2010

**Author Instruction
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings.
The submission of contributions to MIST 2010 must occur through the submission system
(http://www.easychair.org/conferences/?conf=mist10).

Submissions must be in English and conform to the "Springer LNCS Series" format.
Please use the LNCS templates and style files available from http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0
for templates (MS Word or Latex only).
Submissions must not exceed more than 16 pages, including tables and figures, and must be in PDF only.
Submission of a paper implies that should the paper be accepted, at least one of the authors will register
and present the paper at the workshop.

**Proceedings and Special Issue
The proceedings will be published as online CEUR Workshop Proceedings (ISSN: 1613-0073, see http://www.CEUR-ws.org/).

After MIST 2010, authors of outstanding papers will be recommended to submit extended versions to
the Special Issue on Defending Against Insider Threats and Internal Data Leakage.
This special issue will be published in Security and Communication Networks (SCN), Wiley InterScience (indexed by SCIE).
For more detail information about the special issue, please refer to http://isyou.hosting.paran.com/mist10/SCN-SI-10.pdf.

**Contact
For further information regarding the workshop and paper submission,
please contact ilsunu@gmail.com

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
S&P 2025   The 45th IEEE Symposium on Security and Privacy
NYC-2024-CT 2024   New York Annual Conference on Cyber Threats and Defense Strategies 2024
IJCTCM 2024   International Journal of Control Theory and Computer Modelling
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)