| |||||||||||||||
SKM 2010 : Workshop on Secure Knowledge Management | |||||||||||||||
Link: http://skm2010.rutgers.edu | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Knowledge management is a very important research area that deals with methodologies for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively acquire and share data as well as use the knowledge of individuals within an organization. The workshop on Secure Knowledge Management will bring together researchers and practitioners from academic, industry and government to raise the awareness and share recent advances in knowledge management. The workshop will provide a venue to discuss and develop the next questions of challenges in knowledge management that need to be tackled by the community.
Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important. Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications. Topics of Interest: Topics of interest include, but are not limited to: * Secure Languages (Secure Knowledge Query Manipulation Language, Security Assertion Markup Language, B2B Circles of Trust) * Return of Investment on Secure Knowledge Systems * Digital Rights Management (Digital Policy Management) * Secure Content Management (Secure Content Management in Authorized Domains, Secure Content Delivery, Content Trust Index) * Knowledge Management for National Security (Securing and Sharing What We Know: Privacy, Trust and Knowledge Management, Identity Security Guarantee, Building Trust and Security in the B2B Marketplace) * Security and Privacy in Knowledge Management * Wireless security in the context of Knowledge Management * Data Mining for Fraud Detection (Financial Fraud Detection, Network Intrusion Detection) * Data Mining for Secure Knowledge Management * Risk Assessment Proceedings Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues. Best Paper Award The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management. Submission The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites: http://www.computer.org/portal/web/cscps/formatting The submissions should be sent electronically using https://cmt.research.microsoft.com/SKM2010 Important Dates: Manuscripts due: June 30, 2010 Author notification: July 31, 2010 Camera-ready due: August 20, 2010 Early registration deadline: September 1, 2010 Organizing Committee General Chair: Hoang Pham, Rutgers University Program Co-Chairs: Hui Xiong, Rutgers University W. Art Chaovalitwongse Proceeding Chair: Manish Parashar, Rutgers University Publicity Chair: Vijay Atluri, Rutgers University Web Chair: Thu D. Nguyen, Rutgers University Local Arrangement Chair: Myon-K. Jeong, Rutgers University |
|