[AISWorld] CFP: 6th International Workshop on Managing Insider Security Threats (MIST 2014)

Shuyuan Mary Ho anomaly.detector at gmail.com
Mon Aug 4 11:59:03 EDT 2014


CALL for PAPERS

6th International Workshop on Managing Insider Security Threats (MIST 2014)
http://isyou.info/conf/mist14

November 21-22, 2014, Seoul, Republic of Korea


== ORGANIZED BY ==
Innovative Information Science & Technology Research Group


NEWS
-------------------------------------
(1) MIST 2014 will be supported by the special issue of
    the Scientific World Journal  (SCIE, IF=1.730)

(2) MIST 2014 welcomes special session proposals.


IMPORTANT DATES
-------------------------------------
- Submission Deadline:  September 12, 2014
- Authors Notification:  October 15, 2014
- Author Registration:  October 31, 2014
- Final Manuscript:  October 31, 2014


OVERVIEW
-------------------------------------
During the past two decades, information security technology developments
have been mainly concerned with intrusion detection to prevent unauthorized
attacks from outside the network. This includes hacking, virus propagation,
spyware and more. However, according to a recent Gartner Research Report,
information leaks have drastically increased from insiders who are legally
authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause
significant damage to corporate image and reputation, perhaps even
weakening its competitiveness in the marketplace. On a larger scale,
government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach. While the leaking of critical
information by insiders has a lower public profile than that of viruses and
hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges
and advances
in security and cryptography technologies and management systems for
preventing information breaches by insiders. The workshop promotes
state-of-the-art research, surveys and case analyses of practical
significance. Physical, managerial, and technical countermeasures will be
covered in the context of an integrated security management system that
protects critical cyber-infrastructure against unauthorized internal
attack. We expect that this workshop will be a trigger for further research
and technology improvements related to this important subject.


TOPICS
--------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict
insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process


WORKSHOP ORGANIZATION
-------------------------------------

- Workshop Organizer
Ilsun You (Korean Bible University, Korea)

- Steering Committee
Pankoo Kim (Chosun University, Korea)
Kouichi Sakurai (Kyushu University, Japan)

-International Liaison Chair
Kyung Hyun Rhee (Pukyung National University, Korea)
Kangbin Yim (Soonchunhyang University, Korea)

- Program Committee Members
Benjamin Aziz (University of Portsmouth, UK)
Pandu Rangan Chandrasekaran (IIT Madras, India)
Xiaofeng Chen (Xidian University, China)
Christian W. Probst (Technical University of Denmark, Denmark)
Ugo Fiore (Seconda Universita' di Napoli, Italy)
Steven Furnell (Plymouth University, UK)
Shuyuan Mary Ho (Florida State University, USA)
Xinyi Huang (Fujian Normal University, China)
Alex D. Kent (Los Alamos National Laboratory, USA)
Igor Kotenko (SPIRAS, Russia)
Philip Legg (Oxford University, UK)
Fang-Yie Leu (Tunghai University, Taiwan)
Kazuhiro Minami (Institute of Statistical Mathematics, Japan)
Marek Ogiela (AGH University, Poland)
Francesco Palmieri (Seconda Universita' di Napoli, Italy)
Günther Pernul (University of Regensburg, Germany)
Malek Ben Salem (Accenture Technology Labs, USA)
Sean W. Smith (Dartmouth College, USA)
Shambhu Upadhyaya (SUNY Buffalo, USA)
Danfeng (Daphne) Yao (Virginia Tech, USA)
(More members are being invited)


AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers, which must not be
substantially duplications of work that have published elsewhere or have
submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2014 must occur through the
workshop submission system:
https://www.easychair.org/conferences/?conf=mist14

The submission file is in PDF or PS file format produced via the Easychair
Latex Class file (US letter size) [available at
http://jowua.yolasite.com/resources/easychair.zip]

Each paper should be 10-15 pages long based on the Easychair style.
Submission of a paper implies that should the paper be accepted, at least
one of the authors will register and present the paper at the workshop.

All the papers presented at MIST 2014 will be published in
the following journal (volume 4, number 4):

Journal of Internet Services and Information Security (JISIS)
- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077


SPECIAL ISSUE
---------------
Outstanding papers presented at MIST 2014 (with authors' preference) are
invited to the following special issue "Recent Advances in Cyber Security
and Defense" of The Scientific World Journal (SCIE, IF=1.730)
http://www.hindawi.com/journals/tswj/si/276970/cfp/

Some other SCIE or Scopus journals will be also prepared for the post
publication.


CONTACT
----------
For further information regarding the workshop and paper submission, please
contact Dr. Ilsun You (ilsunu at gmail.com)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140804/6aac9079/attachment.html>


More information about the AISWorld mailing list