SKM 2010 - SKM 2010 Secure Knowledge Management
Date2010-10-21
Deadline2010-06-30
VenueNew Brunsw, USA - United States
KeywordsInformation Security;Knowledge Management
Websitehttp://skm2010.rutgers.edu/
Topics/Call fo Papers
Knowledge management is a very important research area that deals with methodologies for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively acquire and share data as well as use the knowledge of individuals within an organization. The workshop on Secure Knowledge Management will bring together researchers and practitioners from academic, industry and government to raise the awareness and share recent advances in knowledge management. The workshop will provide a venue to discuss and develop the next questions of challenges in knowledge management that need to be tackled by the community.
Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important.
Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications.
Topics of Interest
Topics of interest include, but are not limited to:
Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust)
Return of Investment on Secure Knowledge Systems
Digital Rights Management (Digital Policy Management)
Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index)
Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace)
Security and Privacy in Knowledge Management
Wireless security in the context of Knowledge Management
Data Mining for Fraud Detection (Financial Fraud Detection, Network Intrusion Detection)
Data Mining for Secure Knowledge Management
Risk Assessment
Proceedings
Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues.
Best Paper Award
The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management.
Submission
The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites:
http://www.computer.org/portal/web/cscps/formattin...
The submissions should be sent electronically using
https://cmt.research.microsoft.com/SKM2010
Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important.
Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications.
Topics of Interest
Topics of interest include, but are not limited to:
Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust)
Return of Investment on Secure Knowledge Systems
Digital Rights Management (Digital Policy Management)
Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index)
Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace)
Security and Privacy in Knowledge Management
Wireless security in the context of Knowledge Management
Data Mining for Fraud Detection (Financial Fraud Detection, Network Intrusion Detection)
Data Mining for Secure Knowledge Management
Risk Assessment
Proceedings
Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues.
Best Paper Award
The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management.
Submission
The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites:
http://www.computer.org/portal/web/cscps/formattin...
The submissions should be sent electronically using
https://cmt.research.microsoft.com/SKM2010
Other CFPs
- The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
- 2011 3rd International Conference on Bioinformatics and Biomedical Technology (ICBBT 2011)
- 2011 International Conference on Mechanical and Aerospace Engineering (CMAE 2011)
- 2011 International Conference on Control, Robotics and Cybernetics (ICCRC 2011)
- The 2010 International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2010)
Last modified: 2010-06-04 19:32:22