[AISWorld] 4th International Workshop on Managing Insider Security Threats (MIST 2012)

Shuyuan Mary Ho smho at drexel.edu
Thu Mar 8 10:31:54 EST 2012


Apologies for multiple copies.



==========================

CALL for PAPERS

==========================

4th International Workshop on Managing Insider Security Threats (MIST 2012)

http://isyou.info/conf/mist12

November 8-9, 2012, Nishijin Plaza, Kyushu University, Fukuoka, Japan

==========================



IMPORTANT DATES

-------------------------------------

Submission Deadline: July 31, 2012

Acceptance Notification: August 31, 2012

Camera-Ready & Registration: September 30, 2012



OVERVIEW

-------------------------------------

During the past two decades, information security technology developments
have been mainly concerned with intrusion detection to prevent unauthorized
attacks from outside the network.  This includes hacking, virus
propagation, spyware and more. However, according to a recent Gartner
Research Report, information leaks have drastically increased from insiders
who are legally authorized to access corporate information.



The unauthorized leak of critical or proprietary information can cause
significant damage to corporate image and reputation, perhaps even
weakening its competitiveness in the marketplace. On a larger scale,
government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach. While the leaking of critical
information by insiders has a lower public profile than that of viruses and
hacker attacks, the financial impact and loss can be just as devastating.



The objective of this workshop is to showcase the most recent challenges
and advances in security technologies and management systems for preventing
information breaches by insiders. The workshop promotes state-of-the-art
research, surveys and case analyses of practical significance.  Physical,
managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical
cyber-infrastructure against unauthorized internal attack. We expect that
this workshop will be a trigger for further research and technology
improvements related to this important subject.



TOPICS

--------



-Theoretical foundations and algorithms for addressing insider threats

-Insider threat assessment and modeling

-Security technologies to prevent, detect and predict insider threats

-Validating the trustworthiness of staff

-Post-insider threat incident analysis

-Data breach modeling and mitigation techniques

-Registration, authentication and identification

-Certification and authorization

-Database security

-Device control system

-Digital forensic system

-Fraud detection

-Network access control system

-Intrusion detection

-Keyboard information security

-Information security governance

-Information security management systems

-Risk assessment and management

-Log collection and analysis

-Trust management

-IT compliance (audit)

-Continuous auditing

-Corporate ethics, accountability and integrity

-Decision-making modeling and process



**General Chair

Ilsun You (Korean Bible University, South Korea)



**Steering Committee

Dieter Gollmann (Hamburg University of Technology, Germany)

Kouichi Sakurai (Kyushu University, Japan)



**Program Co-Chairs

(1) Track: Insider Threats Prevention

Shuyuan Mary Ho (Drexel University, USA)



(2) Track: Information Leakage Prevention

Kangbin Yim (Soonchunhyang University, Korea)



**Local Arrangement Chair

Yoshiaki Hori (Kyushu University, Japan)



**Program Committee

Toshihiro Yamauchi (Okayama University, Japan)

Masahiro Mambo (Kanazawa University, Japan)





AUTHOR INSTRUCTION

-----------------------

Authors are invited to submit original papers: they must not substantially
duplicate work that any of the authors have published elsewhere or have
submitted in parallel to any other conferences that have proceedings.



The submission of contributions to MIST 2012 must occur through the
workshop submission system.

(Soon the website link will be given)



The submission file is in PDF or PS file format produced via the Easychair
Latex Class file (US letter size) [available at
http://jowua.yolasite.com/resources/easychair.zip]



Each paper should be 10-15 pages long based on the Easychair style.

Submission of a paper implies that should the paper be accepted, at least
one of the authors will register and present the paper at the workshop.





All papers will be published in the following journals:

Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable
Applications (JoWUA)

- ISSN (print): 2093-5374, ISSN (on-line): 2093-5382



Journal of Internet Services and Information Security (JISIS)

- ISSN (print): 2182-2069, ISSN (on-line): 2182-2077



SPECIAL ISSUE

---------------

There will be a special issue mainly composed of the considerable
extensions of good papers presented at MIST 2012.

[Its host journal is indexed by SCI(E)]

(Pending)



CONTACT

----------

For further information regarding the workshop and paper submission, please
contact Dr. Ilsun You (ilsunu at gmail.com)



--
*Shuyuan Mary Ho, PhD*
Assistant Professor
*Computing & Security Technology
Drexel University*
http://iSensorLab.com/ <http://www.goodwin.drexel.edu/iSensor/>
smho at drexel.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20120308/08f7ed8d/attachment.htm>


More information about the AISWorld mailing list