MIST 2012 - Fourth International Workshop on Managing Insider Security Threats (MIST 2012)
Topics/Call fo Papers
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology improvements
related to this important subject.
**Topics (include but are not limited to)
-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
We expect that the workshop will be a trigger for further research and technology improvements
related to this important subject.
**Topics (include but are not limited to)
-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modelling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modelling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Digital right management system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
Other CFPs
- Fifth International Conference on Broadband, Wireless Computing, Communication and Applications
- Fifth Workshop on Challenged Networks (CHANTS 2010)
- An edited volume of Springer-Verlag's on Waste-to-Energy: Recent Developments Call for Chapters 2010
- 4th Desiree Alliance Conference Working Sex: Power, Practice, and Politics
- IEEE 25th International Conference on Advanced Information Networking and Applications
Last modified: 2012-02-16 09:55:40