Managing Insider Security
Threats (MIST 2014) November 21-22, 2014, Konkuk
University, Seoul, Republic of Korea ==
CO-ORGANIZED BY == Innovative Information Science & Technology Research Group Chosun
University BK21+ SIFCT Big
Data Research Institute of Konkuk University [CFP][TOPICS][IMPORTANT DATES][ORGANIZATION][INVITED TALK] NEWS (1)
Program is now available at here. (2)
Registration is now available! Please refer to the REGISTRATION
page. (4)
MIST 2014 will include Special Session on Cyber Security and Defense (CSD 2014) OVERVIEW During
the past two decades, information security technology developments have been
mainly concerned with intrusion detection to prevent unauthorized attacks
from outside the network. This
includes hacking, virus propagation, spyware and more. However, according to
a recent Gartner Research Report, information leaks have drastically
increased from insiders who are legally authorized to access corporate
information. The
unauthorized leak of critical or proprietary information can cause
significant damage to corporate image and reputation, perhaps even weakening
its competitiveness in the marketplace. On a larger scale, government and
public sectors may suffer competitive loss to other nations due to an
internal intelligence breach. While the leaking of critical information by
insiders has a lower public profile than that of viruses and hacker attacks,
the financial impact and loss can be just as devastating. The
objective of this workshop is to showcase the most recent challenges and
advances in security and cryptography technologies and management
systems for preventing information breaches by insiders. The workshop
promotes state-of-the-art research, surveys and case analyses of practical
significance. Physical,
managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical
cyber-infrastructure against unauthorized internal attack. We
expect that this workshop will be a trigger for further research and
technology improvements related to this important subject. [top] TOPICS
-Theoretical
foundations and algorithms for addressing insider threats -Insider
threat assessment and modeling -Security
and cryptography technologies to prevent, detect and predict insider threats -Cryptographic
protocols against insider threats -Validating
the trustworthiness of staff -Post-insider
threat incident analysis -Data
breach modeling and mitigation techniques -Registration,
authentication and identification -Certification
and authorization -Database
security -Device
control system -Digital
forensic system -Fraud
detection -Network
access control system -Intrusion
detection -Keyboard
information security -Information
security governance -Information
security management systems -Risk
assessment and management -Log
collection and analysis -Trust
management -IT
compliance (audit) -Continuous
auditing -Corporate
ethics, accountability and integrity -Decision-making
modeling and process [top] ## Workshop Organizers Ilsun You (Korean Bible University, Korea) Young-guk Ha (Konkuk University,
Korea) ## Advisory Committee Pankoo Kim (Chosun University,
Korea) Kyung
Hyun Rhee (Pukyung National University, Korea) Kouichi Sakurai (Kyushu University, Japan) Kangbin Yim (Soonchunhyang
University, Korea) ## Program Committee Members Benjamin
Aziz (University of Portsmouth, UK) Pandu
Rangan Chandrasekaran
(IIT Madras, India) Xiaofeng
Chen (Xidian University, China) Junho Choi (Chosun University,
Korea) Ugo
Fiore (Seconda Universita'
di Napoli, Italy) Steven
Furnell (Plymouth University, UK) Shuyuan Mary Ho (Florida State University, USA) Xinyi Huang (Fujian Normal University, China) Alex
D. Kent (Los Alamos National Laboratory, USA) Igor
Kotenko (SPIRAS, Russia) Philip
Legg (Oxford University, UK) Fang-Yie Leu (Tunghai
University, Taiwan) Kazuhiro
Minami (Institute of Statistical Mathematics, Japan) Marek
Ogiela (AGH University, Poland) Francesco
Palmieri (Seconda Universita' di Napoli, Italy) Günther Pernul (University of
Regensburg, Germany) Christian
W. Probst (Technical University of Denmark,
Denmark) Malek Ben Salem (Accenture Technology Labs, USA) Dongwan
Shin (New Mexico Tech., USA) Juhyun Shin (Chosun University,
Korea) Sean
W. Smith (Dartmouth College, USA) Shambhu Upadhyaya (SUNY Buffalo,
USA) Danfeng (Daphne) Yao (Virginia Tech, USA) (More
members are being invited) [top] -
Submission Deadline: -
Authors Notification: -
Author Registration: October
31, 2014 -
Final Manuscript: October
31, 2014 [top]
-
1st Special Session on Cyber Security and Defense (CSD
2014) [top] Authors
are invited to submit original papers: they
must not substantially duplicate work that any of the authors have published
elsewhere or have submitted in parallel to any other conferences
that have proceedings. The
submission of contributions to MIST 2014 must occur through The
submission file is in PDF or PS file format produced via the
Easychair Latex Class file (US letter size) [available
at http://jowua.yolasite.com/resources/easychair.zip] Each
paper should be 10-15 pages long based on the Easychair
style. Submission
of a paper implies that should the paper be accepted, at least one of the
authors will register and present the paper at the workshop. All
papers will be published in the following journal: Journal of Internet Services and
Information Security (JISIS) -
ISSN (print): 2182-2069, ISSN (on-line): 2182-2077 [top] Selected
paper presented at MIST 2014, if its author(s) will want, will be invited to
Intelligent Automation and Soft
Computing (SCIE) (*
note that there is a publication charge for this journal.) [CFP] Additional
chances for SCIE or Scopus journals will be given for the post publication. [top] -
MIST 2013 - October 24-25, 2013, Pukyong National University, Busan, Rep. of Korea -
MIST 2012 - November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan -
MIST 2011 - December 1-2, 2011,
Fukuoka Institute of Technology, Fukuoka, Japan (with InCos 2011) -
MIST 2010 - June 15, 2010,
Morioka, Iwate, Japan (with IFIPTM
2010) -
MIST 2009 - June 16, 2009, Purdue
University, West Lafayette, USA (with IFIPTM 2009) [top] Title: Characterizing the Insider Problem Invited Speaker: Dr. Matt Bishop (Professor, UC
Davis, USA) Matt Bishop received his Ph.D. in
computer science from Purdue University, where he specialized in computer
security, in 1984. He was a research scientist at the Research Institute of
Advanced Computer Science and was on the faculty at Dartmouth College before
joining the Department of Computer Science at the University of California at
Davis. His main research area is the analysis of vulnerabilities in computer systems,
including modeling them, building tools to detect vulnerabilities, and
ameliorating or eliminating them. This includes detecting and handling all
types of malicious logic. He is active in the areas of network security, the
study of denial of service attacks and defenses, policy modeling, software
assurance testing, and formal modeling of access controls. Currently, he is
studying the nature of insider threats as technical problems and how to
harden processes to inhibit such attacks. He also works in electronic and
Internet voting, and was one of the two principle investigators of the
California Top-to-Bottom Review, which performed a technical review of all
electronic voting systems certified in the State of California. He is active
in information assurance education. His textbook, Computer Security: Art and
Science, was published in December 2002 by Addison-Wesley Professional. He
also teaches software engineering, machine architecture, operating systems,
programming, and (of course) computer security. [top] For
further information regarding the workshop and paper submission, please
contact Dr. Ilsun You (ilsunu@gmail.com) [top] |