This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.
@InProceedings{probst_et_al:DagSemProc.08302.2, author = {Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter}, title = {{08302 Summary – Countering Insider Threats}}, booktitle = {Countering Insider Threats}, pages = {1--18}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8302}, editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.2}, URN = {urn:nbn:de:0030-drops-17937}, doi = {10.4230/DagSemProc.08302.2}, annote = {Keywords: Insider threat, workshop report} }
Feedback for Dagstuhl Publishing