6th International Workshop on

Managing Insider Security Threats

(MIST 2014)

 

 

November 21-22, 2014, Konkuk University, Seoul, Republic of Korea

 

== CO-ORGANIZED BY ==

Innovative Information Science & Technology Research Group

Chosun University BK21+ SIFCT

Big Data Research Institute of Konkuk University

 

 

[CFP][TOPICS][IMPORTANT DATES][ORGANIZATION][INVITED TALK]
[
PREVIOUS MISTS] [SPECIAL SESSIONS][AUTHOR INSTRUCTION]
[REGISTRATION][
POST PUBLICATION][PROGRAM][CONTACT]

 

 

NEWS

(1) Program is now available at here.

(2) Registration is now available! Please refer to the REGISTRATION page.
(3) Submission Deadline is extended to September 25, 2014.

(4) MIST 2014 will include Special Session on Cyber Security and Defense (CSD 2014)

 

 

OVERVIEW

 

During the past two decades, information security technology developments have been mainly concerned with intrusion detection to prevent unauthorized attacks from outside the network. 

This includes hacking, virus propagation, spyware and more. However, according to a recent Gartner Research Report, information leaks have drastically increased from insiders who are legally authorized to access corporate information. 

 

The unauthorized leak of critical or proprietary information can cause significant damage to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace. On a larger scale, government and public sectors may suffer competitive loss to other nations due to an internal intelligence breach. While the leaking of critical information by insiders has a lower public profile than that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

 

The objective of this workshop is to showcase the most recent challenges and advances

in security and cryptography technologies and management systems for preventing information breaches by insiders. The workshop promotes state-of-the-art research, surveys and case analyses of practical significance.  Physical, managerial, and technical countermeasures will be covered in the context of an integrated security management system that protects critical cyber-infrastructure against unauthorized internal attack.

 

We expect that this workshop will be a trigger for further research and technology improvements related to this important subject.

 

[top]

 

 

TOPICS

 

-Theoretical foundations and algorithms for addressing insider threats

-Insider threat assessment and modeling

-Security and cryptography technologies to prevent, detect and predict insider threats

-Cryptographic protocols against insider threats

-Validating the trustworthiness of staff

-Post-insider threat incident analysis

-Data breach modeling and mitigation techniques

-Registration, authentication and identification

-Certification and authorization

-Database security

-Device control system

-Digital forensic system

-Fraud detection

-Network access control system

-Intrusion detection

-Keyboard information security

-Information security governance

-Information security management systems

-Risk assessment and management

-Log collection and analysis

-Trust management

-IT compliance (audit)

-Continuous auditing

-Corporate ethics, accountability and integrity

-Decision-making modeling and process

 

[top]

 

 

Workshop Organization

 

## Workshop Organizers

Ilsun You (Korean Bible University, Korea)

Young-guk Ha (Konkuk University, Korea)

 

## Advisory Committee

Pankoo Kim (Chosun University, Korea)

Kyung Hyun Rhee (Pukyung National University, Korea)

Kouichi Sakurai (Kyushu University, Japan)

Kangbin Yim (Soonchunhyang University, Korea)

 

## Program Committee Members

Benjamin Aziz (University of Portsmouth, UK)

Pandu Rangan Chandrasekaran (IIT Madras, India)

Xiaofeng Chen (Xidian University, China)

Junho Choi (Chosun University, Korea)
William R. Claycomb (Carnegie Mellon University, USA)

Ugo Fiore (Seconda Universita' di Napoli, Italy)

Steven Furnell (Plymouth University, UK)

Shuyuan Mary Ho (Florida State University, USA)

Xinyi Huang (Fujian Normal University, China)

Alex D. Kent (Los Alamos National Laboratory, USA)

Igor Kotenko (SPIRAS, Russia)

Philip Legg (Oxford University, UK)

Fang-Yie Leu (Tunghai University, Taiwan)

Kazuhiro Minami (Institute of Statistical Mathematics, Japan)

Marek Ogiela (AGH University, Poland)

Francesco Palmieri (Seconda Universita' di Napoli, Italy)

Günther Pernul (University of Regensburg, Germany)

Christian W. Probst (Technical University of Denmark, Denmark)

Malek Ben Salem (Accenture Technology Labs, USA)

Dongwan Shin (New Mexico Tech., USA)

Juhyun Shin (Chosun University, Korea)

Sean W. Smith (Dartmouth College, USA)

Shambhu Upadhyaya (SUNY Buffalo, USA)

Danfeng (Daphne) Yao (Virginia Tech, USA)

(More members are being invited)

 

[top]

 

 

IMPORTANT DATES

 

- Submission Deadline:     September 14, 2014 September 25, 2014

- Authors Notification:        October 15, 2014 October 24, 2014

- Author Registration:        October 31, 2014

- Final Manuscript:            October 31, 2014

 

[top]

 

 

 

SPECIAL SESSIONS


MIST 2014 will include the following special sessions:

-        1st Special Session on Cyber Security and Defense (CSD 2014)

 

 

[top]

 

 

AUTHOR INSTRUCTION

 

Authors are invited to submit original papers:

they must not substantially duplicate work that any of the authors have published elsewhere

or have submitted in parallel to any other conferences that have proceedings.

 

The submission of contributions to MIST 2014 must occur through
the workshop submission system:
https://www.easychair.org/conferences/?conf=mist14

 

The submission file is in PDF or PS file format produced via

the Easychair Latex Class file (US letter size)

[available at http://jowua.yolasite.com/resources/easychair.zip]

 

Each paper should be 10-15 pages long based on the Easychair style.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.

 

 

All papers will be published in the following journal:

Journal of Internet Services and Information Security (JISIS)

- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077

 

[top]

 

 

POST PUBLICATION

 

Selected paper presented at MIST 2014, if its author(s) will want, will be invited to
the following special issue:


"Advanced Technologies for Homeland and Cyber Defense "

Intelligent Automation and Soft Computing (SCIE)

(* note that there is a publication charge for this journal.)

[CFP]

 

Additional chances for SCIE or Scopus journals will be given for the post publication.

 

[top]

 

 

PREVIOUS MISTS

 

- MIST 2013 - October 24-25, 2013, Pukyong National University, Busan, Rep. of Korea

- MIST 2012 - November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan

- MIST 2011 - December 1-2, 2011, Fukuoka Institute of Technology, Fukuoka, Japan

(with InCos 2011)

- MIST 2010 - June 15, 2010, Morioka, Iwate, Japan (with IFIPTM 2010)

- MIST 2009 - June 16, 2009, Purdue University, West Lafayette, USA (with IFIPTM 2009)

 

[top]

 

 

INVITED TALK

 

Title: Characterizing the Insider Problem

Invited Speaker: Dr. Matt Bishop (Professor, UC Davis, USA)

 

: Bishop_head.jpg Matt Bishop received his Ph.D. in computer science from Purdue University, where he specialized in computer security, in 1984. He was a research scientist at the Research Institute of Advanced Computer Science and was on the faculty at Dartmouth College before joining the Department of Computer Science at the University of California at Davis. His main research area is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. This includes detecting and handling all types of malicious logic. He is active in the areas of network security, the study of denial of service attacks and defenses, policy modeling, software assurance testing, and formal modeling of access controls. Currently, he is studying the nature of insider threats as technical problems and how to harden processes to inhibit such attacks. He also works in electronic and Internet voting, and was one of the two principle investigators of the California Top-to-Bottom Review, which performed a technical review of all electronic voting systems certified in the State of California. He is active in information assurance education. His textbook, Computer Security: Art and Science, was published in December 2002 by Addison-Wesley Professional. He also teaches software engineering, machine architecture, operating systems, programming, and (of course) computer security.

 

[top]

 

 

CONTACT

 

For further information regarding the workshop and paper submission,

please contact Dr. Ilsun You (ilsunu@gmail.com)

 

[top]