posted by user: ilsunu || 5683 views || tracked by 6 users: [display]

MIST 2015 : The 7th ACM CCS International Workshop on Managing Insider Security Threats

FacebookTwitterLinkedInGoogle

Link: http://isyou.info/conf/mist15/
 
When Oct 12, 2015 - Oct 16, 2015
Where The Denver Marriot City Center, Denver,
Submission Deadline Jun 8, 2015
Notification Due Jul 19, 2015
Final Version Due Jul 29, 2015
Categories    insider threats   security   information leakage prevention   intrusion detection
 

Call For Papers

===============================================================================
CALL for PAPERS
===============================================================================
ACM MIST 2015
7th ACM CCS International Workshop on Managing Insider Security Threats
(In Conjunction with ACM CCS 2015)
http://isyou.info/conf/mist15

The Denver Marriot City Center, Denver, Colorado, USA
October 12-16, 2015

===============================================================================

NEWS
-------------------------------------
(1) Submisison Deadline: June 8, 2015


IMPORTANT DATES
-------------------------------------
- Submission Deadline: June 8, 2015
- Authors Notification: July 10, 2015
- Author Registration: July 19, 2015
- Final Manuscript: July 29, 2015 (hard deadline)


OVERVIEW
-------------------------------------
During the past two decades, information security technology developments have been mainly
concerned with intrusion detection to prevent unauthorized attacks from outside the network.
This includes hacking, virus propagation, spyware and more.
However, according to a recent Gartner Research Report, information leaks have
drastically increased from insiders who are legally authorized to access corporate information.

The unauthorized leak of critical or proprietary information can cause significant damage
to corporate image and reputation, perhaps even weakening its competitiveness in the marketplace.
On a larger scale, government and public sectors may suffer competitive loss to other nations
due to an internal intelligence breach.
While the leaking of critical information by insiders has a lower public profile than
that of viruses and hacker attacks, the financial impact and loss can be just as devastating.

The objective of this workshop is to showcase the most recent challenges and advances
in security and cryptography technologies and management systems for preventing
information breaches by insiders. The workshop promotes state-of-the-art research, surveys
and case analyses of practical significance.
Physical, managerial, and technical countermeasures will be covered in the context of
an integrated security management system that protects critical cyber-infrastructure against
unauthorized internal attack.
We expect that this workshop will be a trigger for further research and technology improvements
related to this important subject.


TOPICS (not limited to)
------------------------

-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security and cryptography technologies to prevent, detect and predict insider threats
-Cryptographic protocols against insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Database security
-Device control system
-Digital forensic system
-Fraud detection
-Network access control system
-Intrusion detection
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-Trust management
-IT compliance (audit)
-Continuous auditing
-Corporate ethics, accountability and integrity
-Decision-making modeling and process


WORKSHOP ORGANIZATION
-------------------------------------

# General Co-Chairs
- Elisa Bertino (Purdue University, USA)
- Ilsun You (Korean Bible University, South Korea)

# Program Committee Members
- Benjamin Aziz (University of Portsmouth, UK)
- Rana Barua (Indian Statistical Institute, India)
- Matt Bishop (UC Davis, USA)
- Aniello Castiglione (Università degli Studi di Salerno, Italy)
- William R. Claycomb (Carnegie Mellon University, USA)
- Pandu Rangan Chandrasekaran (IIT Madras, India)
- Steven Furnell (Plymouth University, UK)
- Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
- Igor Kotenko (SPIRAS, Russia)
- Fang-Yie Leu (Tunghai University, Taiwan)
- Jason Nurse (Oxford University, UK)
- Marek R. Ogiela (AGH University, Poland)
- Francesco Palmieri (Università degli Studi di Salerno, Italy)
- Günther Pernul (University of Regensburg, Germany)
- Malek Ben Salem (Accenture Technology Labs, USA)
- Dongwan Shin (New Mexico Tech., USA)
- Shambhu Upadhyaya (SUNY Buffalo, USA)
- S. Felix Wu (UC Davis, USA)
- Danfeng (Daphne) Yao (Virginia Tech, USA)
[Additional members still being invited]


AUTHOR INSTRUCTION
-----------------------
Authors are invited to submit original papers:
they must not substantially duplicate work that any of the authors have published elsewhere
or have submitted in parallel to any other conferences that have proceedings.

The submission of contributions to MIST 2015 must occur through
the workshop submission system: https://easychair.org/conferences/?conf=mist2015

Submissions must be at most 12 pages in double-column ACM format
(http://www.acm.org/sigs/publications/ proceedings-templates) including the bibliography and well-marked appendices.
Submissions must be anonymized and avoid obvious self-references. Only PDF files will be accepted.

Submissions not meeting these guidelines risk rejection without consideration of their merits.
Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline.


CONTACT
----------
For further information regarding the workshop and paper submission,
please contact Dr. Ilsun You (ilsunu@gmail.com)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 1)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
IJCSITY 2024   International Journal of Computational Science and Information Technology
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex