License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08302.2
URN: urn:nbn:de:0030-drops-17937
Go to the corresponding Portal

Probst, Christian W. ; Hunker, Jeffrey ; Bishop, Matt ; Gollmann, Dieter

08302 Summary -- Countering Insider Threats

08302.SWM.1793.pdf (0.2 MB)


This article summarizes the objectives and structure of a
seminar with the same title, held from July 20th to July 25th, 2008, at
Schloss Dagstuhl, Germany. The seminar brought together researchers
and policy-makers from all involved communities, to clarify what it is
that identifies an insider threat, and to develop a common vision of how
an insider can be categorized as well as an integrated approach that
allows a qualitative reasoning about the threat and the possibilities of
attacks. This report gives an overview of the discussions and presentations
during the week, as well as the outcome of these discussions.

BibTeX - Entry

  author =	{Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter},
  title =	{{08302 Summary – Countering Insider Threats}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--18},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{},
  URN =		{urn:nbn:de:0030-drops-17937},
  doi =		{10.4230/DagSemProc.08302.2},
  annote =	{Keywords: Insider threat, workshop report}

Keywords: Insider threat, workshop report
Collection: 08302 - Countering Insider Threats
Issue Date: 2008
Date of publication: 23.12.2008

DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI