MIST 2017: 9th International Workshop on Managing Insider Security Threats
Abstract
References
Index Terms
- MIST 2017: 9th International Workshop on Managing Insider Security Threats
Recommendations
MIST 2016: 8th International Workshop on Managing Insider Security Threats
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityIn this paper, a brief introduction is presented on the 8th International Workshop on Managing Insider Security Threats (MIST 2016). MIST 2016 takes place in conjunction with the 23rd ACM Conference on Computer and Communications Security (ACM CCS 2016)...
MIST 2015: 7th International Workshop on Managing Insider Security Threats
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityIn this paper, we provide a brief summary of the 7th International Workshop on Managing Insider Security Threats (MIST 2015). MIST 2015 is held in conjunction with the 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015). The ...
Detecting Insider Theft of Trade Secrets
Trusted insiders who misuse their privileges to gather and steal sensitive information represent a potent threat to businesses. Applying access controls to protect sensitive information can reduce the threat but has significant limitations. Even if ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Bhavani Thuraisingham,
- Program Chairs:
- David Evans,
- Tal Malkin,
- Dongyan Xu
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 180Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in