Managing Insider Security
Threats
Pukyong National University, Busan, Korea
[Overview][Topic][CFP][Important Date][Submission Guideline][Organization] [Post Publication][Invited Talks][Program][Registration][Previous Workshops][Workshop
Venue][Contact] Innovative Information Science & Technology Research Group
## NEWS (1) Author or Early Regsitration will be open until October 4, 2013. - International Journal of Computer
Mathematics (ISSN: 0020-7160, SCIE, IF = 0.542)
## OVERVIEW
Duringthe past two decades, information security technology developments have been
mainly concerned with intrusion detection to prevent unauthorized attacks from
outside the network. This includes
hacking, virus propagation, spyware and more. However, according to a recent
Gartner Research Report, information leaks have drastically increased from
insiders who are legally authorized to access corporate information.The
unauthorized leak of critical or proprietary information can cause significant
damage to corporate image and reputation, perhaps even weakening its
competitiveness in the marketplace. On a larger scale, government and public
sectors may suffer competitive loss to other nations due to an internal
intelligence breach. While the leaking of critical information by insiders has
a lower public profile than that of viruses and hacker attacks, the financial
impact and loss can be just as devastating.The
objective of this workshop is to showcase the most recent challenges and
advances in security and cryptography technologies and management systems for
preventing information breaches by insiders. The workshop promotes
state-of-the-art research, surveys and case analyses of practical significance.
Physical, managerial, and technical countermeasures will be covered in the
context of an integrated security management system that protects critical
cyber-infrastructure against unauthorized internal attack. We expect that this
workshop will be a trigger for further research and technology improvements
related to this important subject. [Top]
- Theoretical
foundations and algorithms for addressing insider threats - Insider
threat assessment and modeling - Security
and cryptography technologies to prevent, detect, and predict insider threats - Cryptographic
protocols against insider threats - Validating
the trustworthiness of staff - Post-insider
threat incident analysis - Data
breach modeling and mitigation techniques - Registration,
authentication and identification - Certification
and authorization - Database
security - Device
control system - Digital
forensic system - Fraud
detection - Network
access control system - Intrusion
detection - Keyboard
information security - Information
security governance - Information
security management systems - Risk
assessment and management - Log
collection and analysis - Trust
management - IT
compliance (audit) - Continuous
auditing - Corporate
ethics, accountability and integrity - Decision-making
modeling and process [Top] - Submission Deadline: - Authors Notification: - Author Registration: September 30, 2013 - Final Manuscript: September 30, 2013 [Top] Authors are
invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or The
submission of contributions to MIST 2013 must occur through the workshop
submission system:
The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size). [available
at http://jowua.yolasite.com/resources/easychair.zip] Each
paper should be at least 10 and at most 15 pages long based on the easychair
style. Submission
of a paper implies that should the paper be accepted, at least one of the
authors will register All
accepted papers will be published in the following journals: - MIST
2013 Volume 1 will be published in JoWUA vol. 4, no. 4, 2013 Journal of
Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications
(JoWUA) - MIST 2013 Volume 2 will be published in JISIS
vol. 3, no. 4, 2013 Journal of
Internet Services and Information Security (JISIS) * The
above two volumes will be available at MIST 2013 [Top] Steering Committee Dieter
Gollmann (Hamburg University of Technology, Germany) Kouichi
Sakurai (Kyushu University, Japan)
General Co-Chairs Kyung Hyun Rhee (Pukyung National University, Korea)
Program Co-Chairs Kangbin Yim (Soonchunhyang University, Korea)
Pannel Session Chair William R. Claycomb (Carnegie Mellon University, USA)
Program
Committee Members Ruo Ando (NICT, Japan) Pandu Rangan Chandrasekaran (Indian Institute of Technology Madras, India) Xiaofeng Chen (Xidian University, China) Steven Furnell (Plymouth University, UK) Yoshiaki Hori (Saga University, Japan) Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan) Fang-Yie Leu (Tunghai University, Taiwan) Andrew P. Moore (Carnegie Mellon University, USA) Kirill Morozov (Kyushu University, Japan) Gunther Pernul (University of Regensburg, Germany) Marcin Piekarczyk (Pedagogical University in Krakow, Poland) Wolter Pieters (Delft University of Technology, the Netherlands) Christian W. Probst (Technical University of Denmark, Denmark) Marek Ogiela (AGH University of Science and Technology, Poland) Malek Ben Salem (Accenture Technology Labs, USA) Dongwan Shin (New Mexico Tech., USA) Masakazu Soshi (Hiroshima City University, Japan) Willy Susilo (University of Wollongong, Australia) Shambhu Upadhyaya (University at Buffalo, The State University of New York, USA) Qin Xin (University of the Faroe Islands, Denmark) Danfeng (Daphne) Yao (Virginia Tech., USA) Meng Yu (Virginia Commonwealth University, USA) Baokang Zhao (National University of Defense Technology, China)
[Top] Special Issue on Innovative Security Technologies against Insider Threats and Data Leakage
Journal of Ambient Intelligence and Humanized Computing (ISSN: 1868-5137, Scopus & EI-indexed)
At least 50% papers presented at MIST 2013 will be invited to SCIE indexed Journals including the above special issue. [Top] - MIST 2012 - November 8-9,
2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan - MIST 2011 - December 1-2,
2011, Fukuoka Institute of Technology, Fukuoka, Japan (with InCos 2011) - MIST 2010 - June 15, 2010,
Morioka, Iwate, Japan (with IFIPTM 2010) - MIST 2009 - June 16, 2009,
Purdue University, West Lafayette, USA (with IFIPTM 2009) [Top]
## INVITED TALK Title: Anomaly Detection and Social Interactions:A Social Informatics approach for Insider Threats Invited Speaker: Dr. Felix Wu (Professor, UC Davis, USA)
[Top]
For more
information, please contact the general chair, Ilsun You (ilsunu@gmail.com). [Top]
== ORGANIZED BY ==
|