Secure Knowledge Management
Previous SKM Workshops
Best paper award:
Informed Route Selection in Ad-Hoc Wireless Networks Based on Trust and Behavior, by Pratap M. Nataraj, Harsha P. Nagarajaiah, and Shambhu Upadhyaya.
Runner-up for best paper award: Optimal Resource Allocation to Improve Distributed System Reliability, by Li Wang, Shangping Ren, Ke Yue, and Kevin Kwiat.
Location: CoRE Building, Rutgers University Accommodations
Knowledge management is a very important research area that deals with methodologies for systematically gathering, organizing, and disseminating information. It essentially consists of processes and tools to effectively acquire and share data as well as use the knowledge of individuals within an organization. The workshop on Secure Knowledge Management will bring together researchers and practitioners from academic, industry and government to raise the awareness and share recent advances in knowledge management. The workshop will provide a venue to discuss and develop the next questions of challenges in knowledge management that need to be tackled by the community.
Knowledge Management Systems (KMS) promote sharing information among employees and should contain security features to prevent any unauthorized access. Security is becoming a major issue revolving around KMS. Security methods may include authentication or passwords, cryptography programs, intrusion detection systems or access control systems. Issues include insider threat (protecting from malicious insiders), infrastructure protection (securing against subversion attacks) and establishing correct policies and refinement and enforcement. Furthermore KMS content is much more sensitive than raw data stored in databases and issues of privacy also become important.
Since the attacks in 2001, many organizations, especially the US government, have increased their concern about KMS. With the advent of intranets and web-access, it is even more crucial to protect corporate knowledge as numerous individuals now have access to the assets of a corporation. Therefore, we need effective mechanisms for securing data, information, and knowledge as well as the applications.Topics of Interest
Topics of interest include, but are not limited to:
Papers will be compiled on a CD-ROM. Selected papers will be recommended for submission to special issues.Best Paper Award
The workshop will have a best paper award as judged by the program committee. In addition, the workshop will have a special session to discuss issues related to data mining for secure knwoledge management.Submission
The submission should be formatted in two-columns in IEEE format not exceeding 6 pages. Submissions should adhere to the standard 8.5" X 11" IEEE camera-ready format. Formatting instructions and LaTeX macros are available on the IEEE Computer Society sites:
The submissions should be sent electronically usingImportant Dates:
Previous SKM Workshops Steering Committee