Filters








10 Hits in 2.3 sec

Ontological semantic technology for detecting insider threat and social engineering

Victor Raskin, Julia M. Taylor, Christian F. Hempelmann
2010 Proceedings of the 2010 workshop on New security paradigms - NSPW '10  
Uses of the system for cases of insider threat and/or social engineering are discussed.  ...  The definition issue was the focus of the Dagstuhl Seminar (08302) on "Countering Insider Threats" in July 2008 (Bishop et al. 2008-and these seminars continue).  ...  II, 12-16) does make some statements about "the malicious user" that are partially relevant to insider threat, its first volume, The Executive Summary, has no mention of the issue explicitly or implicitly  ... 
doi:10.1145/1900546.1900563 dblp:conf/nspw/RaskinTH10 fatcat:zbj743o2wrg63aoqg43hvtjoga

Socio-Technical Security Metrics (Dagstuhl Seminar 14491)

Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse, Marc Herbstritt
2015 Dagstuhl Reports  
This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events.  ...  Relation with previous seminars This seminar builds on the Insider Threat series (08302, 10341, 12501) and the seminar Secure Architectures in the Cloud (11492).  ...  of such counter-examples will validate a design.  ... 
doi:10.4230/dagrep.4.12.1 dblp:journals/dagstuhl-reports/GollmannHKPS14 fatcat:j22tyed5nnbcbfm42od2kh5pki

An empirical investigation of socio-technical code review metrics and security vulnerabilities

Andrew Meneely, Alberto C. Rodriguez Tejeda, Brian Spates, Shannon Trudeau, Danielle Neuberger, Katherine Whitlock, Christopher Ketant, Kayla Davis
2014 Proceedings of the 6th International Workshop on Social Software Engineering - SSE 2014  
This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events.  ...  Relation with previous seminars This seminar builds on the Insider Threat series (08302, 10341, 12501) and the seminar Secure Architectures in the Cloud (11492).  ...  of such counter-examples will validate a design.  ... 
doi:10.1145/2661685.2661687 dblp:conf/sigsoft/MeneelyTSTNWKD14 fatcat:u6gtpdsn7rbilim2wj4xvtrr7e

Report from Dagstuhl Seminar 12501 Organizational Processes for Supporting Sustainable Security Edited by 1 Executive Summary

Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian Probst, Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert, Christian License
unpublished
to this category of threat that we had gained from the 2008 and 2010 Dagstuhl seminars on insider threats (Countering Insider Threats, #08302, and Insider Threats: Strategies for Prevention, Mitigation  ...  We start from modeling systems and analysing them for insider threats.  ... 
fatcat:3qv6rcqmirgrzehpazeu44w7bm

Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality

Ulrich Flegel, Florian Kerschbaum, Richard Wacker
unpublished
As an asynchronous process any Fraud Detection System (FDS) requires the storing of activities that occur Dagstuhl Seminar Proceedings 08302 Countering Insider Threats http://drops.dagstuhl.de/opus/volltexte  ...  In summary the resulting requirements are that (1) the generated pseudonyms respect the syntax of the audit data, (2) pseudonyms must be equal for a given data value in different data fields, if R1 requires  ... 
fatcat:mi3zqeqsufbh5eurgc4qyrcxfu

Dagstuhl Tätigkeitsbericht Dagstuhl Tätigkeitsbericht Januar-Dezember 2008

Geschäftsstelle Schloss Dagstuhl
2008 Dagstuhl Publications Dagstuhl Tätigkeitsbericht Januar-Dezember   unpublished
Threats (20.07. -25.07.08) Dagstuhl Seminar Proceedings 08302: Countering Insider Threats (20.07. -25.07.08) Dagstuhl Seminar Proceedings Seite 46 08341: Sublinear Algorithms (17.08. -22.08.08)  ...  We expect many new research results and collaborations growing from the seeds of this meeting. 08251: Contextual and Social Media Understanding and Usage (15.06. - 20.06.08) Prof. 08302: Countering Insider  ... 
fatcat:bqydopiqgbdonfp4mj6hl5qjqi

Topological and Game-Theoretic Aspects of Infinite Computations Peter Hertling

Asu, Tempe, Usa, Stefanie Hahmann, Lmc-Imag Grenoble, Fr, Jörg Peters, Tu Chemnitz, De, Sabine Coquillart
2008 Group Testing in the Life Sciences Alexander Schliep (MPI for Molecular >Genetics, DE), Nicolas Thierry-Mieg   unpublished
Matthias Jarke, RWTH Aachen 08251: Contextual and Social Media Understanding and Usage (15.06. - 20.06.08) Prof. 08302: Countering Insider Threats (20.07. -25.07.08) Dagstuhl Seminar Proceedings 08302  ...  : Countering Insider Threats (20.07. -25.07.08) Dagstuhl Seminar Proceedings 08341: Sublinear Algorithms (17.08. -22.08.08) Dagstuhl Seminar Proceedings  ... 
fatcat:wjgxtv24wvdu3fjh5dp6hjpc4i

Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)

Susanne Biundo-Stephan, Hans Guesgen, Joachim Hertzberg, Stephen, James Crowley, Kai Kunze, Paul Lukowicz, Albrecht Schmidt, Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert (+11 others)
2012 unpublished
to this category of threat that we had gained from the 2008 and 2010 Dagstuhl seminars on insider threats (Countering Insider Threats, #08302, and Insider Threats: Strategies for Prevention, Mitigation  ...  We start from modeling systems and analysing them for insider threats.  ... 
fatcat:lqejrqkk6fdhnnwiufoktwlf74

2012 Jahresbericht Annual Report Jahresbericht Annual Report

Kontakt Geschäftsstelle, Schloss Dagstuhl, Heike Clemens, Jutka Gasiorowski
2013 unpublished
to this category of threat that we had gained from the 2008 and 2010 Dagstuhl seminars on insider threats (Countering Insider Threats, #08302, and Insider Threats: Strategies for Prevention, Mitigation  ...  The Dagstuhl seminar "Designing for process resilience to insider threats" was held on December 10-12th December, 2012 (Seminar #12501) to advance our understanding of ways of reducing insider threats  ...  In summary, what precisely is observed action interpretation and what would be benchmark data for it?  ... 
fatcat:qmtsqeo23jcjffzwbvuoasqchq

DEP bulletin 1981 July - December

No Name Supplied
1981
SECTION E .SUMMARY OF PENDING PERMIT APPLICATIONS •.  ...  QUESTION =s (Are the telephone contact numbers on the inside cover of the DEP Bulletin used? Has the response been satisfactory or unsatisfactory?)  ... 
doi:10.7282/t3-2wx0-sr58 fatcat:ecavwc5ogbdtjgsxkavab3ybfi