Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    DITIL 2011 - Special Issue on "Defending Against Insider Threats and Internal Data Leakage"

    View: 1759

    Website http://isyou.hosting.paran.com/mist10/SCN-SI-10.pdf | Want to Edit it Edit Freely

    Category DITIL 2011

    Deadline: August 31, 2010 | Date: April 01, 2011

    Venue/Country: Special Issue, South Korea

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP


    Security and Communication Networks (SCN), Wiley InterScience
    Special Issue on "Defending Against Insider Threats and Internal Data Leakage"
    http://www.interscience.wiley.com/journal/security
    == Overview
    The security analysis conducted by researchers in computer science and mathematics
    in the last decade has been working hard to prevent malicious attacks conducted by outside entities,
    such as hackers and intruders, or by extraneous malicious processes such as viruses, spywares,
    and all sort of malwares.
    However, security reports clearly reveal that an increasing number of threats come presently
    from insiders which, being legally authorized to have access to corporate resources,
    can exploit system vulnerabilities and data breaches to get access to systems and information.
    Actually, insiders can cause significant damages to enterprises, companies and even countries;
    they can threaten enterprises' reputation, weaken their national and international competitiveness,
    and compromise their overall business.
    Despite the fact that insiders' attacks happen less frequently than those conducted by outsiders,
    their consequences are definitely very severe, and recovering from an insider attacks is usually
    a daunting task.
    Therefore, countermeasures in terms of physical, managerial, and technical aspects are necessary
    to construct an integral security management system that can protect companies' major information assets
    and systems also from unauthorized and malicious attacks coming from inside.
    This special issue collects scientific studies and works reporting on the most recent challenges
    and advances in security technologies and management systems
    about protecting an organization's information from corporate malicious activities.
    It aims to be the showcase for researchers that address the problems on how to prevent the leakage of
    organizations' information caused by insiders.
    The contributions to this special issue can conduct state-of-the-art surveys and
    case-analyses of practical significance,
    which, we wish, will support and foster further research
    and technology improvements related to this important subject.
    Papers on practical as well as on theoretical topics are invited.
    == Topics include (but are not limited to):
    - Theoretical foundations and algorithms for addressing insider threats
    - Insider threat assessment and modeling
    - Security technologies to prevent, detect and avoid insider threats
    - Validating the trustworthiness of staff
    - Post-insider threat incident analysis
    - Data breach modeling and mitigation techniques
    - Authentication and identification
    - Certification and authorization
    - Database security
    - Device control system
    - Digital forensic system
    - Digital right management system
    - Fraud detection
    - Network access control system
    - Intrusion detection
    - Keyboard information security
    - Information security governance
    - Information security management systems
    - Risk assessment and management
    - Log collection and analysis
    - Trust management
    - Secure information splitting and sharing algorithms
    - Steganography and subliminal channels
    - IT compliance (audit)
    - Continuous auditing
    - Socio-Technical Engineering Attack to Security and Privacy
    == Important Dates
    - Manuscript submission deadline: August 31, 2010
    - Acceptance notification: October 31, 2010
    - Camera-ready papers due: February 28, 2011
    - Publication of special issue: Spring/Summer, 2011 (Tentative)
    == Submission Procedure
    Papers submitted to this journal for possible publication must be original
    and must not be under consideration for publication in any other journal.
    Submissions of both in-depth research papers and review/application-oriented papers are encouraged.
    All submissions should be done in Wiley's manuscript central whose web link is: http://mc.manuscriptcentral.com/scn.
    For more detailed information on the submission requirements,
    please refer to the journal home-page at www.interscience.wiley.com/journal/security.
    When submitting the papers, the authors should make sure to choose the manuscript type as "Special Issue", enter the "Running Head" and the "Special Issue title" as "SCN-SI-23" and "Defending Against Insider Threats and Internal Data Leakage", respectively.
    == Guest Editors
    Dr. Elisa Bertino
    Purdue university, USA
    E-mail: bertinoatcs.purdue.edu
    Dr. Gabriele Lenzini
    SnT - Univ. of Luxembourg, Luxembourg
    E-mail: gabriele.lenziniatuni.lu
    Dr. Marek R. Ogiela
    AGH University of Science & Technology, Poland
    E-mail: mogielaatagh.edu.pl
    Dr. Ilsun You (Corresponding Editor)
    Korean Bible University, South Korea
    E-mail: ilsunuatgmail.com
    == Contacts
    For further information regarding the special issue, please contact at ilsunuatgmail.com.

    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.