Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    MIST 2011 - Third International Workshop on Managing Insider Security Threats (MIST 2011)

    View: 736

    Website | Want to Edit it Edit Freely

    Category MIST 2011

    Deadline: June 15, 2011 | Date: November 30, 2011-December 03, 2011

    Venue/Country: Fukuoka, Japan

    Updated: 2011-04-19 21:16:57 (GMT+9)

    Call For Papers - CFP

    During the past decades, information security developments have been mainly concerned with preventing illegal attacks by outsiders, such as hacking, virus propagation, and spyware. However, according to a recent Gartner Research Report, information leakage caused by insiders who are legally authorized to have access to some corporate information is increasing dramatically. These leakages can cause significant damages such as weakening the competitiveness of companies (and even countries). Information leakage caused by insiders occurs less frequently than information leakage caused by outsiders, but the financial damage is much greater. Countermeasures in terms of physical, managerial, and technical aspects are necessary to construct an integral security management system to protect companies' major information assets from unauthorized internal attackers. The objective of this workshop is to showcase the most recent challenges and advances in security technologies and management systems to prevent leakage of organizations' information caused by insiders. It may also include state-of-the-art surveys and case analyses of practical significance. We expect that the workshop will be a trigger for further research and technology improvements related to this important subject.

    Topics of Interest

    The workshop seeks original contributions in all relevant areas, including but not limited to the following topics:

    Theoretical foundations and algorithms for addressing insider threats

    Insider threat assessment and modeling

    Security technologies to prevent, detect and avoid insider threats

    Validating the trustworthiness of staff

    Post-insider threat incident analysis

    Data breach modeling and mitigation techniques

    Registration, authentication and identification

    Certification and authorization

    Database security

    Device control system

    Digital forensic system

    Digital right management system

    Fraud detection

    Network access control system

    Intrusion detection

    Keyboard information security

    Information security governance

    Information security management systems

    Risk assessment and management

    Log collection and analysis

    Trust management

    IT compliance (audit)

    Continuous auditing


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.