License
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08302.2
URN: urn:nbn:de:0030-drops-17937
URL: https://drops.dagstuhl.de/opus/volltexte/2008/1793/
Go to the corresponding Portal |
Probst, Christian W. ;
Hunker, Jeffrey ;
Bishop, Matt ;
Gollmann, Dieter
08302 Summary -- Countering Insider Threats
Abstract
This article summarizes the objectives and structure of a
seminar with the same title, held from July 20th to July 25th, 2008, at
Schloss Dagstuhl, Germany. The seminar brought together researchers
and policy-makers from all involved communities, to clarify what it is
that identifies an insider threat, and to develop a common vision of how
an insider can be categorized as well as an integrated approach that
allows a qualitative reasoning about the threat and the possibilities of
attacks. This report gives an overview of the discussions and presentations
during the week, as well as the outcome of these discussions.
BibTeX - Entry
@InProceedings{probst_et_al:DagSemProc.08302.2,
author = {Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter},
title = {{08302 Summary – Countering Insider Threats}},
booktitle = {Countering Insider Threats},
pages = {1--18},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1793},
URN = {urn:nbn:de:0030-drops-17937},
doi = {10.4230/DagSemProc.08302.2},
annote = {Keywords: Insider threat, workshop report}
}
Keywords: |
|
Insider threat, workshop report |
Collection: |
|
08302 - Countering Insider Threats |
Issue Date: |
|
2008 |
Date of publication: |
|
23.12.2008 |