ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SKM 2010 - SKM 2010 Secure Knowledge Management

Date2010-10-21

Deadline2010-06-30

VenueNew Brunsw, USA - United States USA - United States

KeywordsInformation Security;Knowledge Management

Websitehttp://skm2010.rutgers.edu/

Topics/Call fo Papers

Knowledge management is a very important research area that deals with methodologies for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively acquire and share data as well as use the knowledge of individuals within an organization. The workshop on Secure Knowledge Management will bring together researchers and practitioners from academic, industry and government to raise the awareness and share recent advances in knowledge management. The workshop will provide a venue to discuss and develop the next questions of challenges in knowledge management that need to be tackled by the community.

Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important.

Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications.

Topics of Interest

Topics of interest include, but are not limited to:

Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust)
Return of Investment on Secure Knowledge Systems
Digital Rights Management (Digital Policy Management)
Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index)
Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace)
Security and Privacy in Knowledge Management
Wireless security in the context of Knowledge Management
Data Mining for Fraud Detection (Financial Fraud Detection, Network Intrusion Detection)
Data Mining for Secure Knowledge Management
Risk Assessment

Proceedings

Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues.

Best Paper Award

The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management.

Submission

The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites:

http://www.computer.org/portal/web/cscps/formattin...

The submissions should be sent electronically using

https://cmt.research.microsoft.com/SKM2010

Last modified: 2010-06-04 19:32:22