posted by user: ilsunu || 2663 views || tracked by 6 users: [display]

MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.info/conf/mist17/
 
When Oct 30, 2017 - Nov 3, 2017
Where Dallas, USA
Submission Deadline Aug 4, 2017
Notification Due Sep 4, 2017
Final Version Due Sep 17, 2017
Categories    security   access control   insider threats
 

Call For Papers

===============================================================================
CALL for PAPERS
===============================================================================
ACM MIST 2017
9th ACM CCS International Workshop on Managing Insider Security Threats
(In Conjunction with ACM CCS 2017)
http://isyou.info/conf/mist17

Dallas, USA
Oct. 30 - Nov. 3, 2017

===============================================================================

IMPORTANT DATES
-------------------------------------
- Paper submission deadline: August 4, 2017, 23:59 (UTC–11)
- Acceptance notification: September 4, 2017
- Camera-ready due: September 17, 2017 (hard deadline)


OVERVIEW
-------------------------------------
During the past two decades, information security technology developments have been mainly
concerned with intrusion detection to prevent unauthorized attacks from outside the network.
This includes hacking, virus propagation, spyware and more.
However, according to a recent Gartner Research Report, information leaks have
drastically increased from insiders who are legally authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause significant damage
to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace.
On a larger scale, government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach.
While the leaking of critical information by insiders has a lower public profile than
that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges and advances
in security and cryptography technologies and management systems for preventing
information breaches by insiders. The workshop promotes state-of-the-art research, surveys
and case analyses of practical significance.
Physical, managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical cyber-infrastructure against
unauthorized internal attack.
We expect that this workshop will be a trigger for further research and technology improvements
related to this important subject.


TOPICS (not limited to)
------------------------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process


WORKSHOP ORGANIZATION
-------------------------------------

## General Co-Chairs
Ilsun You (Soonchunhyang University, South Korea)
Elisa Bertino (Purdue University, USA)


## Program Committee Members
-------------------------------------
- Ioannis Agrafiotis (Oxford University, UK)
- Joonsang Baek (Khalifa University of Science, Technology and Research, UAE)
- William Casey (Software Engineering Institute - Carnegie Mellon University, USA)
- William R. Claycomb (Carnegie Mellon University, USA)
- Ing-Ray Chen (Virginia Tech, USA)
- Raymond Choo (The University of Texas at San Antonio, USA)
- Steven Furnell (University of Plymouth, UK)
- Florian Kammuelle (Middlesex University, UK)
- Fang-Yie Leu (Tunghai University, Taiwan)
- Jason Nurse (Oxford University, UK)
- MAJ Michael Petullo (United States Military Academy, West Point, USA)
- Christian W. Probst (Technical University of Denmark, Denmark)
- Kyung-Hyune Rhee (Pukyong National University, South Korea)
- Fei Song (Beijing Jiaotong University, China)
- Hassan Takabi (University of North Texas, USA)
- Danfeng (Daphne) Yao (Virginia Tech, USA)
- Jeong Hyun Yi (Soongsil University, South Korea)
- Meng Yu (The University of Texas at San Antonio, USA)
- Quanyan Zhu (New York University, USA)

[Additional members still being invited]


AUTHOR INSTRUCTION
-----------------------
TBD


CONTACT
----------
For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You (ilsunu@gmail.com)

Related Resources

CCS 2017   The ACM Conference on Computer and Communications Security (CCS)
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SIGIR 2018   International ACM SIGIR Conference on Research and Development in Information Retrieval
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
MPS 2017   The 1st International Workshop on Multimedia Privacy and Security -- held in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017)