posted by user: ilsunu || 2673 views || tracked by 7 users: [display]

MIST 2011 : 3rd International Workshop on Managing Insider Security Threats


When Nov 30, 2011 - Dec 2, 2011
Where Fukuoka Institute of Technology, Fukuoka
Submission Deadline Jul 23, 2011
Notification Due Aug 10, 2011
Final Version Due Sep 15, 2011
Categories    insider threats   information leakage prevention   intrusion detection

Call For Papers

3rd International Workshop on Managing Insider Security Threats (MIST 2011)
November 30 - December 2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan
(in conjunction with the 3-rd INCoS-2011 International Conference)

Submission Deadlinet: July 23, 2011
Acceptance Notification: August 10, 2011
Camera-Ready: September 15, 2011

During the past decades, information security developments have been mainly concerned
with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware.
However, according to a recent Gartner Research Report, information leakage caused by
insiders who are legally authorized to have access to some corporate information is
increasing dramatically.
These leakages can cause significant damages such as weakening
the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently
than information leakage caused by outsiders, but the financial damage is much greater.
Countermeasures in terms of physical, managerial, and technical aspects are necessary
to construct an integral security management system to protect companies' major information assets
from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent challenges and advances
in security technologies and management systems to prevent leakage of
organizations' information caused by insiders.
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology improvements
related to this important subject.


-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing

**Workshop Organizers
Ilsun You (Korean Bible University, South Korea)
Christian W. Probst (Technical University of Denmark, Denmark)

**Advisory Committee
Kouichi Sakurai (Kyushu Unversity, Japan)

**Program Committee

Authors are invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or have submitted
in parallel to any other conferences that have proceedings.
The submission of contributions to MIST 2011 must occur through the INCoS-2011 submission system

During submission, please select the track
"Workshop: Third International Workshop on Managing Insider Security Threats (MIST 2011)".

Submissions must be in English and prepared based on the instructions at
Each paper should not be more than six papges
(Conference Proceedings Manuscript: two column, single-spaced),
including figures and references, using 10 font size, and number each page.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register
and present the paper at the workshop.

All papers will be published in the IEEE CPS Conference proceedings (the INCoS-2011 proceedings).

For more details, please refer to the submission guideline of the INCoS-2011 at

We are currently negotiating a Special Issue in a high quality international journal for this workshop.

For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You ( ) or Dr. Christian W. Probst (

Related Resources

ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
ICCWS 2021   16th International Conference on Cyber Warfare and Security
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [Second Round: 11 December 2020]
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
SEAMS 2021   Software Engineering for Adaptive and Self-Managing Systems
4th Rome ICSSH 2021   4th Rome – International Conference on Social Science & Humanities (ICSSH), 07-08 September 2021
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
CCNC 2021   IEEE Consumer Communications & Networking Conference
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
3rd Athens ICSSH Sept 2021   3rd Athens – International Conference on Social Science & Humanities (ICSSH), 15-16 September 2021