License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08302.1
URN: urn:nbn:de:0030-drops-17960
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1796/
Go to the corresponding Portal |
Bishop, Matt ;
Gollmann, Dieter ;
Hunker, Jeffrey ;
Probst, Christian W.
08302 Abstracts Collection -- Countering Insider Threats
Abstract
From July 20 to July 25, 2008, the Dagstuhl Seminar 08302 ``Countering Insider Threats '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available.
BibTeX - Entry
@InProceedings{bishop_et_al:DagSemProc.08302.1,
author = {Bishop, Matt and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
title = {{08302 Abstracts Collection – Countering Insider Threats}},
booktitle = {Countering Insider Threats},
pages = {1--10},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1796},
URN = {urn:nbn:de:0030-drops-17960},
doi = {10.4230/DagSemProc.08302.1},
annote = {Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Keywords: |
|
Insider Threat, Security Policies, Threat Modelling |
Collection: |
|
08302 - Countering Insider Threats |
Issue Date: |
|
2008 |
Date of publication: |
|
23.12.2008 |