posted by user: isyou || 1657 views || tracked by 7 users: [display]

MIST 2009 : The First International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.hosting.paran.com/mist09/
 
When Jun 15, 2009 - Jun 19, 2009
Where Purdue University, West Lafayette, USA
Submission Deadline Mar 22, 2009
Notification Due Apr 22, 2009
Final Version Due Apr 30, 2009
Categories    insider threat   intrusion detection   network security   trust
 

Call For Papers

=================================================================================
The First International Workshop on Managing Insider Security Threats(MIST 2009)
http://isyou.hosting.paran.com/mist09/

Purdue University, West Lafayette, USA, June 15-19, 2009
(In Conjunction with IFIPTM 2009)
=================================================================================

Hot News!
Distinguished papers accepted and presented in MIST 2009,
after further revisions, will be invited for a Special Issue of Information
Systems Frontiers (indexed by SCIE)

**Overview

During the past decades, information security developments have
been mainly concerned with preventing illegal attacks by outsiders,
such as hacking, virus propagation, and spyware. However,
according to a recent Gartner Research Report, information
leakage caused by insiders who are legally authorized to have
access to some corporate information is increasing dramatically.
These leakages can cause significant damages such as weakening
the competitiveness of companies (and even countries).
Information leakage caused by insiders occurs less frequently than
information leakage caused by outsiders, but the financial damage
is much greater. Countermeasures in terms of physical, managerial,
and technical aspects are necessary to construct an integral
security management system to protect companies' major
information assets from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent
challenges and advances in security technologies and management
systems to prevent leakage of organizations' information caused by
insiders. It may also include state-of-the-art surveys and case
analyses of practical significance. We expect that the workshop
will be a trigger for further research and technology improvements
related to this important subject.

**Topics (include but are not limited to)

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing

**General Co-Chairs
David Chadwick (University of Kent, UK)
Ilsun You (Korean Bible University, South Korea)

**Publicity and Web Chair
Hang Bae Chang (Daejin University, South Korea)

**Program Committee
Gail-Joon Ahn (Arizona State University, USA)
Klemens Bohm (University of Karlsruhe, German)
Dawn M. Cappelli (Carnegie Mellon University, USA)
Fariborz Farahmand (Purdue University, USA)
Carrie Gates (CA Labs, USA)
Arif Ghafoor (Purdue University , USA)
Yong Guan (Iowa State University, USA)
Sushil Jajodia (George Mason University, USA )
Dong Seong Kim (Duke University, USA)
Kwangjo Kim (Information and Communications University, South Korea)
Tom Longstaff (Carnegie Mellon University , USA)
Chris Mitchell (University of London, UK)
Peter G. Neumann (SRI, USA)
Gunther Pernul (University of Regensburg, Germany)
Eugene Spafford (Purdue University, USA)
Shambhu Upadhyaya (SUNY Buffalo , USA)
Michael Wellman (University of Michigan, USA)
Seong-Moo Yoo (University of Alabama In Huntsville, USA)
Meng Yu (Western Illinois University, USA)

[additional members still being invited]

**Important dates
Paper Submission deadline: March 22, 2009
Acceptance notification: April 22, 2009
Camera-ready due: April 30, 2009

**Author Instruction
Authors are invited to submit original papers: they must not
substantially duplicate work that any of the authors have published
elsewhere or have submitted in parallel to any other conferences
that have proceedings. The submission of contributions to MIST
2009 must occur through the IFIPTM2009 submission system
(http://projects.cerias.purdue.edu/IFIPTM/sub.html). Submissions
must be in English and conform to the IFIP Series format. See
http://springer.com/series/6102 for templates (MS Word or Latex
only). Submissions must not exceed more than 16 pages, including
tables and figures, and must be in PDF only. Submission of a paper
implies that should the paper be accepted, at least one of the
authors will register and present the paper at the workshop.

**Proceedings and Special Issue
All accepted papers will be published in the conference
proceedings, to be published by Springer under the auspices of the
IFIP WG 11.11 on Trust Management. The proceedings will be
available at the workshop. At least one author of an accepted
paper must register at the conference site and present the paper
at the workshop.

After the workshop, the authors of the best papers will be invited
to submit extended versions for a Special Issue of Information
Systems Frontiers (indexed by SCIE) on Security Management and
Technologies for Protecting Against Internal Data Leakages. For
more detailed information about the special issue, please visit:
http://www.som.buffalo.edu/isinterface/ISFrontiers/forthcoming.htm

**Contact
For further information regarding the workshop and paper
submission, please contact hbchang@daejin.ac.kr
=================================================================================

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
MIST 2017   The 9th ACM CCS International Workshop on Managing Insider Security Threats
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
CNSA 2018   11th International Conference on Security and its Applications
ECSA 2018   ECSA 57: Changing estuaries, coasts and shelf systems - Diverse threats and opportunities
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
eCrime 2018   13th Symposium on Electronic Crime Research