Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3133956.3148525acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

MIST 2017: 9th International Workshop on Managing Insider Security Threats

Published: 30 October 2017 Publication History

Abstract

This paper introduces the 9th International Workshop on Managing Insider Security Threats (MIST 2017), which takes place in conjunction with the 24th ACM Conference on Computer and Communications Security (ACM CCS 2017). Its objective is to present recent challenges and advanced technologies in managing insider security threats by publishing high-quality work that will be a trigger for further research related to this subject.

References

[1]
I. Agrafiotis, A. Erola, M. Goldsmith, and S. Creese, 2017, Formalising policies for insider-threat detection: A tripwire grammar. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 8, 1, (March 2017), 26--43.
[2]
F. Kammüller, M. Kerber, and C. W. Probst, 2017, Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications.8, 1, (March 2017), 44--78.
[3]
C.L. Huth, D.W. Chadwick, W.R. Claycomb, and I. You, 2013, Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers. 15, 1 (March 2013), 1--4.
[4]
C. W. Probst, I. You, D. Shin, and K. Sakurai, 2011, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Guest Editorial: Addressing Insider Threats and Information Leakage, 2, 1 (March 2011), 1--3.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
October 2017
2682 pages
ISBN:9781450349468
DOI:10.1145/3133956
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2017

Check for updates

Author Tags

  1. cybersecurity and defense
  2. data leakage prevention
  3. insider threats

Qualifiers

  • Abstract

Conference

CCS '17
Sponsor:

Acceptance Rates

CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 180
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media