HICSS-43 Homepage

HICSS-42 Highlights


Program

* Keynote Address
* Distinguished Lecture
* Tracks and Minitracks
* Symposia, Workshops, and
   Tutorials

Call for Papers

Author Instructions
    
Minitrack Chair Review Instructions
     
Responsibilities

Accommodation and Travel Arrangements

Registration

Contact

Return to HICSS Homepage

 


Track: Decision Technologies and Service Sciences
Minitrack: Cyber Security and Information Intelligence Research


As our dependence on the cyber infrastructure grows ever larger, more complex, and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence information values currency and relevance over detail and accuracy. Information
explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant
advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern
cyberspace "mechanization." The goal of the Minitrack is to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and
information intelligence research that is founded on sound principles and technologies.

The goal of this Minitrack is to challenge, establish and debate a
far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence research that is founded on sound principles and technologies, including:

  • Better precision in understanding existing and emerging vulnerabilities and threats.

  • Advances in insider threat detection, deterrence, mitigation and elimination.

  • Game-changing ventures, innovations and conundrums (e.g., quantum computing, QKD, phishing, malware market, botnet/DOS)

  • Assuring security, survivability and dependability of our critical infrastructures.

  • Assuring the availability of time-critical scalable secure systems, information provenance and security with privacy.

  • Observable/ measurable/ certifiable security claims, rather than hypothesized causes.

  • Methods that enable us to specify security requirements, formulate security claims, and certify security properties.

  • Assurance against known and unknown (though perhaps pre-modeled) threats.

  • Mission fulfillment, whether or not security violations have taken place (rather than chasing all violations indiscriminately).


Minitrack Co-chairs:

Frederick T. Sheldon (Primary Contact)
Oak Ridge National Laboratory
PO Box 2008 MS6364
Oak Ridge TN 37831-6364
Office Phone: 865-576-1339
Departmental Phone: 865-574-4837
Departmental Fax: 865-576-5943
E-mail: SheldonFT@ornl.gov
URL: http://www.csiir.ornl.gov/sheldon

Mark T. Elmore
Oak Ridge National Laboratory
PO Box 2008 MS6364
Oak Ridge TN 37831-6364
Office Phone: 865-241-6372
Departmental Phone: 865-574-4837
Departmental Fax: 865-576-5943
E-mail: ElmoreMT@ornl.gov