Probst, Christian W.3; Hunker, Jeffrey4; Gollmann, Dieter5; Bishop, Matt6
1 Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark2 Department of Informatics and Mathematical Modeling, Technical University of Denmark3 Department of Applied Mathematics and Computer Science, Technical University of Denmark4 Carnegie Mellon University5 Technische Universität Hamburg-Harburg6 University of California, Davis
This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.
Main Research Area:
Dagstuhl Seminar Proceedings
Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2008