Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    SKM 2010 - SKM 2010 Secure Knowledge Management

    View: 1082

    Website http://skm2010.rutgers.edu/ | Want to Edit it Edit Freely

    Category Information Security;Knowledge Management

    Deadline: June 30, 2010 | Date: October 21, 2010

    Venue/Country: New Brunswick, U.S.A

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    Knowledge management is a very important research area that deals with methodologies for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively acquire and share data as well as use the knowledge of individuals within an organization. The workshop on Secure Knowledge Management will bring together researchers and practitioners from academic, industry and government to raise the awareness and share recent advances in knowledge management. The workshop will provide a venue to discuss and develop the next questions of challenges in knowledge management that need to be tackled by the community.

    Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important.

    Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications.

    Topics of Interest

    Topics of interest include, but are not limited to:

    Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust)

    Return of Investment on Secure Knowledge Systems

    Digital Rights Management (Digital Policy Management)

    Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index)

    Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace)

    Security and Privacy in Knowledge Management

    Wireless security in the context of Knowledge Management

    Data Mining for Fraud Detection (Financial Fraud Detection, Network Intrusion Detection)

    Data Mining for Secure Knowledge Management

    Risk Assessment

    Proceedings

    Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues.

    Best Paper Award

    The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management.

    Submission

    The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites:

    http://www.computer.org/portal/web/cscps/formatting

    The submissions should be sent electronically using

    https://cmt.research.microsoft.com/SKM2010


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.