2nd International Workshop on Managing
Insider Security Threats
June 14-15, 2010, Morioka,
(in conjunction with IFIPTM 2010)
[Topics][Organization][Important Dates][Author Instruction][Proceedings & Special Issues]
[Workshop Program][Previous Workshops][IFIPTM 2010][Contact][CFP: txt, pdf]
1) MIST 2010 Program is available at here
2) Outstanding papers from MIST 2010, after further revisions, will be published in
Special Issue of Security and Communication Networks (SCN)(indexed by SCIE)
During the past decades, information security developments have been mainly concerned
with preventing illegal attacks by outsiders, such as hacking, virus propagation, and
spyware. However, according to a recent Gartner Research Report, information leakage
caused by insiders who are legally authorized to have access to some corporate
information is increasing dramatically.
These leakages can cause significant damages such as weakening the competitiveness of
companies (and even countries). Information leakage caused by insiders occurs less
frequently than information leakage caused by outsiders, but the financial damage is
much greater. Countermeasures in terms of physical, managerial, and technical aspects
are necessary to construct an integral security management system to protect
companies' major information assets from unauthorized internal attackers.
The objective of this workshop is to showcase the most recent challenges and advances
in security technologies and management systems to prevent leakage of organizations'
information caused by insiders.
It may also include state-of-the-art surveys and case analyses of practical significance.
We expect that the workshop will be a trigger for further research and technology
improvements related to this important subject.
** Topics (include but are not limited to)
-Theoretical foundations and algorithms for addressing insider threats
-Insider threat assessment and modeling
-Security technologies to prevent, detect and avoid insider threats
-Validating the trustworthiness of staff
-Post-insider threat incident analysis
-Data breach modeling and mitigation techniques
-Registration, authentication and identification
-Certification and authorization
-Device control system
-Digital forensic system
-Digital right management system
-Network access control system
-Keyboard information security
-Information security governance
-Information security management systems
-Risk assessment and management
-Log collection and analysis
-IT compliance (audit)
** Workshop Organizers
A Min Tjoa (Vienna University of Technology, Austria)
Ilsun You (Korean Bible University, South Korea)
** Program Committee
Elisa Bertino (Purdue University, USA)
Dawn M. Cappelli (Carnegie Mellon University, USA)
Hang Bae Chang (Daejin University , South Korea)
Fariborz Farahmand (Purdue University, USA)
Steven Furnell (University of Plymouth, UK)
Yong Guan (Iowa State University, USA)
Sang Yong Han (Chung-Ang University, Korea)
Shlomo Hershkop (Columbia University, USA)
Dong Seong Kim (Duke University, USA)
Fang-Yie Leu (Tunghai University, Taiwan)
Gabriele Lenzini (SnT - Univ. of Luxembourg, Luxembourg)
Leszek T. Lilien (Western Michigan University, USA)
Chu-Hsing Lin (Tunghai University, Taiwan)
Debin Liu (Indiana University, USA)
Barton P. Miller (University of Wisconsin, Madison, USA)
Chris Mitchell (University of London, UK)
Peter G. Neumann (SRI, USA)
Marek R. Ogiela (AGH University of Science & Technology Institute of Automatics, Poland)
Kazumasa Omote (JAIST, Japan)
Gunther Pernul (University of Regensburg, Germany)
Malek Ben Salem (Columbia University, USA)
Stelios Sidiroglou-Douskos (MIT, USA)
Sean W. Smith (Dartmouth College, USA)
Masakazu Soshi (Hiroshima City University, Japan)
Huiping Sun (Peking University, China)
Yuqing Sun (Shandong University, China)
Kenichi Takahashi (ISIT, Japan)
Shambhu Upadhyaya (SUNY Buffalo, USA)
Kangbin Yim, (Soonchunhyang University, Korea)
Meng Yu (Western Illinois University, USA)
Paper Submission deadline: April 30, 2010
Acceptance notification: May 24, 2010
Camera-ready due: June 4, 2010
** Author Instruction
Authors are invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or have submitted in parallel
to any other conferences that have proceedings.
The submission of contributions to MIST 2010 must occur through the submission system
Submissions must be in English and conform to the "Springer LNCS Series" format.
Please use the LNCS templates and style files available from
for templates (MS Word or Latex only).
Submissions must not exceed more than 16 pages, including tables and figures,
and must be in PDF only.
Submission of a paper implies that should the paper be accepted,
at least one of the authors will register and present the paper at the workshop.
** Proceedings and Special Issue
The proceedings will be published in Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications
(JoWUA, see http://www.jowua.org/).
After MIST 2010, authors of outstanding papers will be recommended to submit extended versions to
the Special Issue on Defending Against Insider Threats and Internal Data Leakage.
This special issue will be published in Security and Communication Networks (SCN), Wiley InterScience (indexed by SCIE).
For more detail information about the special issue, please refer the CFP.
- MIST 2009
For further information regarding the workshop and paper submission,
please contact email@example.com