Dear Colleague, Please find attached the call for participation to the Second Secure Knowledge Management Workshop (SKM 2006) to be held in Brooklyn, NY, September 28-29, 2006. (Supported in part by the National Science Foundation and the Polytechnic University) The complete information is available at http://www.cs.stonybrook.edu/skm2006. We apologize if you receive multiple copies of this message. Please help us distribute this to other interested colleagues. Best Regards and see you in New York ! The SKM 2006 Organizing Committee ************************************************************* CALL FOR PARTICIPATION SKM 2006 The Second Secure Knowledge Management Workshop 2006 September 28-29, 2006 Polytechnic University, Brooklyn, NY http://www.cs.stonybrook.edu/skm2006 ************************************************************* SPEAKERS -------- Le Gruenwald, NSF Phil Venables, Chief Information Security Officer, Goldman Sachs Teresa L. Carlson, FBI Hadi Mahabadi, Xerox Research Center of Canada Salvatore J. Stolfo, Columbia University Lawrence Gordon, University of Maryland Charles C. Palmer, IBM ************************************************************* Knowledge management is the methodology for systematically gathering, organizing, and disseminating knowledge. It essentially consists of processes and tools to effectively capture and share knowledge as well as use the knowledge of individuals within an organization. Knowledge Management Systems (KMS) promote sharing information among employees and require security mechanisms to prevent unauthorized access and misuse. Security is a major issue revolving around KMS. The Secure Knowledge Management Workshop aims to raise awareness of academics and practitioners in this critical area of research by presenting papers containing ideas, directions, and questions that need to be tackled by the research community, as well as traditional scientific papers presenting results. ACCEPTED PAPERS --------------- 1. Preserving Privacy in Mining Association Rules - Aryya Gangopadhyay, Madhu Ahluwalia 2. Adversarial Planning and Plan Recognition two sides of the same coin - Sviatoslav Braynov 3. Novel method for agile Information Security Management System development - Timo J. Wiander, Jarkko M. Holappa 4. What is Private Intermediaries' impact on s/w Vulnerabilities disclosure: An Economic Prespective - Jessica Pu Li, H. Raghav Rao 5. Managing the False Alarms: A Framework for Assurance and Verification of Surveillance Monitoring - Peter Goldschmidt 6. Alerts from Non-Obvious Relationships in a Secure Information Sharing Environment - Alan D. Marwick, Walter C. Geddes, Alice G. Klein, Bernard Beekman 7. Data Sharing Policy for an Investigator-Matching System - Arnon Rosenthal, Cleo Casipe, Conrad Chang 8. Comparing Authentication Protocols for Securely Accessing Systems by Voice - Lawrence O'Gorman, Lynne Brotman, Michael Sammon 9. Overcoming Organizational Barriers to Secure Information Sharing & Integration Submission to SKM2006 - Eliot Rich, Finn Olav Sveen, Matthew Jager 10. An Empirical Investigation of Culture and Social Factors on Intelectual Information Sharing in China - Seung Kyoon Shin, Jessica Pu Li, G. Lawrence Sanders 11. Information Privacy on Personal Web Blogs - Sangmi Cha, JinKyu Lee, H. Raghav Rao 12. Robust DWT Based MPEG-1 Watermarking in Four Bands - Ersin Elbasi, Ahmet M. Eskicioglu 13. Internet Privacy Policies of Companies: A Country-level Study - Won G. No, R. P. Sundarraj 14. UCLog+ : A Secure Knowledge Management System Providing Security Situational Awareness from Multi-Level Data Sources(Alerts,Incidents Logs) - William Yurcik, Cristina Abad 15. Configuration of Intrusion Detection Systems - Huseyin cavusoglu, Birendra Mishra, Srinivasan Raghunathan, JinKyu Lee, H. Raghav Rao 16. Attack Simulation for Measuring Detection Model Effectiveness - Ashish Garg, Shambhu Upadhyaya, Kevin Kwiat 17. Insider Threat Analysis and Strategies for Autonomic Policy Formulation - Birendra Mishra, T. S. Raghu 18. Security and Knowledge Management Success Effectiveness - Murray E. Jennex, Shambhu Upadhyaya, Kevin Kwiat 19. Proactive Knowledge Sharing Security for Netchains with Breach-Directed Dynamic Policy Revision - Haluk Demirkan, Daniel Soper, Michael Goul 20. Trust Based Routing Decisions in Mobile Ad-hoc Networks - Kamal Deep Meka, Mohit Virendra, Shambhu Upadhyaya 21. Understanding Risk in Inter-organizational Knowledge Transfer: A Game-theoretic Analysis - Savitha K. Namuduri, Kamesh R. Namuduri 22. Addressing Privacy Concerns and Building Trust through Value Congruence Networks - Joseph A. Cazier, Benjamin B. M. Shao, Robert D. St. Louis, Mohit Virendra, Shambhu Upadhyaya 23. On Supporting Active User Feedback in P3P - V.N. Venkatakrishnan, Wei Xu 24. Owner-Controlled Information Privacy Protection Paradigms - Yanjun Zuo, Timothy O.Keefe ACCEPTED POSTERS ---------------- 1. Theories of Trust for Authentication Systems (Extended Abstract) Ji Ma, - Mehmet A. Orgun 2. Virtual Organization Security Policies: An Ontology-based Integration Approach - S.Muthaiyah, L.Kerschberg 3. KM needs SAFE Docs. . Secure Access for Essential Documents - John Teofil Nosek 4. Providing Security for Web Services in a Federated Environment - Lori L. DeLooze, Paul E. Young 5. Model Deceptive Information Dissemination Using a Holistic Approach - Yi Hu, Brajendra Panda 6. Secured Knowledge Exchange Across The Extended Enterprise:Integrating Security Knowledge Process Knowledge & Component Knowledge for a Semantic Security Architecture for Knowledge Exchange - A. F. Salam, Rahul Singh 7. Knowledge Sharing in Online Communities - Kyung Woo Kang 8. A SEMI-BLIND Watermarking Scheme For Color Images - Ersin Elbasi, Ahmet M. Eskicioglu 9. Data Integration Framework for a Knowledge Model of Organizational Information Security Management - Liu Shuangyan, Lam-For Kwok 10. Ensuring Privacy While Maximizing Knowledge Management - Murray E. Jennex, Chris Demchak, Kurt Fenstermacher 11. SAML based Role Hierarchy Preservation Model for Cross-enterprise Identity Federation - Manish Gupta, Raj Sharman 12. A Knowledge-based Approach to Detect new Malicious Executables - Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham ORGANIZING COMMITTEE -------------------- Steering Committee ------------------ Bhavani Thuraisingham - University of Texas, Dallas Kevin Kwiat - Air Force Research Lab Raghav Rao - SUNY at Buffalo Shambhu Upadhyaya - SUNY at Buffalo General Chair ------------- Bill Yurcik - University of Illinois, Urbana-Champaign Program Chair ------------- Nasir Memon - Polytechnic University Publicity Chair --------------- Radu Sion - SUNY Stony Brook Local Arrangements Chair ------------------------ Ahmet Eskicioglu - CUNY Brooklyn College Finance Chair ------------- Bill Hery - Polytechnic University Program Committee ----------------- Cristina L. Abad - Escuela Superior Politicnica del Litoral (ESPOL) Mustaque Ahamad - Georgia Tech Vijay Atluri - Rutgers University Matt Bishop - UC Davis Steve Chapin - Syracuse University Pravin Dipak - Xerox Nikita Borisov - University of Illinois, Urbana-Champaign Peter Chen - Louisiana State University Hsinchun Chen - University of Arizona Thomas E Daniels - Iowa State University Jim Davis - Iowa State University Gurpreet Dhillon - Virginia Commonwealth University Ron Dodge - United States Military Academy Lawrence Gordon - University of Maryland Jiawei Han - University of Illinois, Urbana-Champaign Anupam Joshi - University of Maryland, Baltimore County Kamesh Namuduri - Wichita State University Chester Maciag - AFRL Rome John McDermott - Office of Naval Research Adam Slagell - NCSA and the University of Illinois, Urbana-Champaign Lawrence O'Gorman - Avaya Jinkyu Lee - SUNY at Buffalo Robert McGraw - NSA Brajendra Panda - University of Arkansas Indrajit Ray - Colorado State University Arnon Rosenthal - MITRE Corporation Raghu Santanam - Arizona State University Revankar Shriram V - Xerox R. Sekar - SUNY Stony Brook Benjamin Shao - Arizona State University Raj Sharma - SUNY at Buffalo Steve Tate - University of North Texas Rao Vemuri - UC Davis Jun Wang - NCSA and the University of Illinois, Urbana-Champaign Marianne Winslett - University of Illinois, Urbana-Champaign Xiaoxin Yin - University of Illinois, Urbana-Champaign