ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MIST 2015 - 7th ACM CCS International Workshop on Managing Insider Security Threats

Date2015-10-12 - 2015-10-16

Deadline2015-06-08

VenueThe Denver Marriot City Center, Denver, USA - United States USA - United States

Keywords

Websitehttps://isyou.info/conf/mist15

Topics/Call fo Papers

During the past decades, information security developments have been mainly concerned with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware. However, according to a recent Gartner Research Report), information leakage caused by insiders who are legally authorized to have access to some corporate information is increasing dramatically. These leakages can cause significant damages such as weakening the competitiveness of companies (and even countries). Information leakage caused by insiders occurs less frequently than information leakage caused by outsiders), but the financial damage is much greater. Countermeasures in terms of physical, managerial, and technical aspects are necessary to construct an integral security management system to protect companies' major information assets from unauthorized internal attackers. The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to prevent leakage of organizations' information caused by insiders. It may also include state-of-the-art surveys and case analyses of practical significance. We expect that the workshop will be a trigger for further research and technology improvements related to this important subject.
Topics (not limited to)
- Theoretical foundations and algorithms for addressing insider threats
- Insider threat assessment and modeling
- Security and cryptography technologies to prevent, detect and predict insider threats
- Cryptographic protocols against insider threats
- Validating the trustworthiness of staff
- Post-insider threat incident analysis
- Data breach modeling and mitigation techniques
- Registration, authentication and identification
- Certification and authorization
- Database security
- Device control system
- Digital forensic system
- Fraud detection
- Network access control system
- Intrusion detection
- Keyboard information security
- Information security governance
- Information security management systems
- Risk assessment and management
- Log collection and analysis
- Trust management
- IT compliance (audit)
- Continuous auditing
- Corporate ethics, accountability and integrity
Workshop Organization
General Co-Chairs
- Elisa Bertino (Purdue University, USA)
- Ilsun You (Korean Bible University, South Korea)
Program Committee
- Benjamin Aziz (University of Portsmouth, UK)
- Rana Barua (Indian Statistical Institute, India)
- Matt Bishop (UC Davis, USA)
- Aniello Castiglione (Università degli Studi di Salerno, Italy)
- William R. Claycomb (Carnegie Mellon University, USA)
- Pandu Rangan Chandrasekaran (IIT Madras, India)
- Steven Furnell (Plymouth University, UK)
- Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
- Igor Kotenko (SPIRAS, Russia)
- Fang-Yie Leu (Tunghai University, Taiwan)
- Jason Nurse (Oxford University, UK)
- Marek R. Ogiela (AGH University, Poland)
- Francesco Palmieri (Università degli Studi di Salerno, Italy)
- Günther Pernul (University of Regensburg, Germany)
- Malek Ben Salem (Accenture Technology Labs, USA)
- Dongwan Shin (New Mexico Tech., USA)
- Shambhu Upadhyaya (SUNY Buffalo, USA)
- S. Felix Wu (UC Davis, USA)
- Danfeng (Daphne) Yao (Virginia Tech, USA)

Last modified: 2015-04-07 23:23:43