Dear Colleague,

Please find attached the call for participation to the Second Secure
Knowledge Management Workshop (SKM 2006) to be held in Brooklyn, NY,
September 28-29, 2006. (Supported in part by the National Science 
Foundation and the Polytechnic University)

The complete information is available at
http://www.cs.stonybrook.edu/skm2006.

We apologize if you receive multiple copies of this message.
Please help us distribute this to other interested colleagues.

Best Regards and see you in New York !

The SKM 2006 Organizing Committee

*************************************************************

CALL FOR PARTICIPATION

SKM 2006

The Second Secure Knowledge Management Workshop 2006

September 28-29, 2006
Polytechnic University, Brooklyn, NY

http://www.cs.stonybrook.edu/skm2006

*************************************************************

SPEAKERS
--------

Le Gruenwald, NSF
Phil Venables, Chief Information Security Officer, Goldman Sachs
Teresa L. Carlson, FBI
Hadi Mahabadi, Xerox Research Center of Canada
Salvatore J. Stolfo, Columbia University
Lawrence Gordon, University of Maryland
Charles C. Palmer, IBM

*************************************************************

Knowledge  management is the methodology  for  systematically
gathering,   organizing,  and  disseminating  knowledge.   It
essentially  consists of processes and tools  to  effectively
capture  and share knowledge as well as use the knowledge  of
individuals  within  an  organization.  Knowledge  Management
Systems (KMS) promote sharing information among employees and
require  security  mechanisms to prevent unauthorized  access
and  misuse. Security is a major issue revolving around  KMS.
The  Secure  Knowledge  Management  Workshop  aims  to  raise
awareness  of  academics and practitioners in  this  critical
area  of  research  by  presenting papers  containing  ideas,
directions,  and  questions that need to be  tackled  by  the
research community, as well as traditional scientific  papers
presenting results.


ACCEPTED PAPERS
---------------

1. Preserving Privacy in Mining Association Rules - Aryya Gangopadhyay,
Madhu Ahluwalia

2. Adversarial Planning and Plan Recognition two sides of the same coin
- Sviatoslav Braynov

3. Novel method for agile Information Security Management System
development - Timo J. Wiander, Jarkko M. Holappa

4. What is Private Intermediaries' impact on s/w Vulnerabilities
disclosure: An Economic Prespective - Jessica Pu Li, H. Raghav Rao

5. Managing the False Alarms: A Framework for Assurance and
Verification of Surveillance Monitoring - Peter Goldschmidt

6. Alerts from Non-Obvious Relationships in a Secure Information
Sharing Environment - Alan D. Marwick, Walter C. Geddes, Alice G. 
Klein,
Bernard Beekman

7. Data Sharing Policy for an Investigator-Matching System
- Arnon Rosenthal, Cleo Casipe, Conrad Chang

8. Comparing Authentication Protocols for Securely Accessing Systems by
Voice - Lawrence O'Gorman, Lynne Brotman, Michael Sammon

9. Overcoming Organizational Barriers to Secure Information Sharing &
Integration Submission to SKM2006 - Eliot Rich, Finn Olav Sveen, 
Matthew
Jager

10. An Empirical Investigation of Culture and Social Factors on
Intelectual Information Sharing in China - Seung Kyoon Shin, Jessica Pu
Li, G. Lawrence Sanders

11. Information Privacy on Personal Web Blogs - Sangmi Cha, JinKyu
Lee, H. Raghav Rao

12. Robust DWT Based MPEG-1 Watermarking in Four Bands - Ersin
Elbasi, Ahmet M. Eskicioglu

13. Internet Privacy Policies of Companies: A Country-level Study - Won
G. No, R. P. Sundarraj

14. UCLog+ : A Secure Knowledge Management System Providing Security
Situational Awareness from Multi-Level Data Sources(Alerts,Incidents 
Logs)
- William Yurcik, Cristina Abad

15. Configuration of Intrusion Detection Systems - Huseyin cavusoglu,
Birendra Mishra, Srinivasan Raghunathan, JinKyu Lee, H. Raghav Rao

16. Attack Simulation for Measuring Detection Model Effectiveness
- Ashish Garg, Shambhu Upadhyaya, Kevin Kwiat

17. Insider Threat Analysis and Strategies for Autonomic Policy
Formulation - Birendra Mishra, T. S. Raghu

18. Security and Knowledge Management Success Effectiveness
- Murray E. Jennex, Shambhu Upadhyaya, Kevin Kwiat

19. Proactive Knowledge Sharing Security for Netchains with
Breach-Directed Dynamic Policy Revision - Haluk Demirkan, Daniel
Soper, Michael Goul

20. Trust Based Routing Decisions in Mobile Ad-hoc Networks
- Kamal Deep Meka, Mohit Virendra, Shambhu Upadhyaya

21. Understanding Risk in Inter-organizational Knowledge Transfer: A
Game-theoretic Analysis - Savitha K. Namuduri, Kamesh R. Namuduri

22. Addressing Privacy Concerns and Building Trust through Value
Congruence Networks - Joseph A. Cazier, Benjamin B. M. Shao, Robert D. 
St.
Louis, Mohit Virendra, Shambhu Upadhyaya

23. On Supporting Active User Feedback in P3P - V.N.
Venkatakrishnan, Wei Xu

24. Owner-Controlled Information Privacy Protection Paradigms -
Yanjun Zuo, Timothy O.Keefe


ACCEPTED POSTERS
----------------

1.  Theories of Trust for Authentication Systems (Extended Abstract) Ji 
Ma,
- Mehmet A. Orgun

2. Virtual Organization Security Policies: An Ontology-based 
Integration
Approach - S.Muthaiyah, L.Kerschberg

3. KM needs SAFE Docs. . Secure Access for Essential Documents - John 
Teofil
Nosek

4. Providing Security for Web Services in a Federated Environment - 
Lori L.
DeLooze, Paul E. Young

5. Model Deceptive Information Dissemination Using a Holistic Approach 
- Yi
Hu, Brajendra Panda

6. Secured Knowledge Exchange Across The Extended 
Enterprise:Integrating
Security Knowledge Process Knowledge & Component Knowledge for a 
Semantic
Security Architecture for Knowledge Exchange - A. F. Salam, Rahul Singh

7. Knowledge Sharing in Online Communities - Kyung Woo Kang

8. A SEMI-BLIND Watermarking Scheme For Color Images - Ersin Elbasi, 
Ahmet
M. Eskicioglu

9. Data Integration Framework for a Knowledge Model of Organizational
Information Security Management - Liu Shuangyan, Lam-For Kwok

10. Ensuring Privacy While Maximizing Knowledge Management - Murray E.
Jennex, Chris Demchak, Kurt Fenstermacher

11. SAML based Role Hierarchy Preservation Model for Cross-enterprise
Identity Federation - Manish Gupta, Raj Sharman

12. A Knowledge-based Approach to Detect new Malicious Executables -
Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham



ORGANIZING COMMITTEE
--------------------

Steering Committee
------------------
Bhavani Thuraisingham - University of Texas, Dallas
Kevin Kwiat - Air Force Research Lab
Raghav Rao - SUNY at Buffalo
Shambhu Upadhyaya - SUNY at Buffalo


General Chair
-------------
Bill Yurcik - University of Illinois, Urbana-Champaign


Program Chair
-------------
Nasir Memon - Polytechnic University


Publicity Chair
---------------
Radu Sion - SUNY Stony Brook


Local Arrangements Chair
------------------------
Ahmet Eskicioglu - CUNY Brooklyn College


Finance Chair
-------------
Bill Hery - Polytechnic University


Program Committee
-----------------
Cristina L. Abad - Escuela Superior Politicnica del Litoral (ESPOL)
Mustaque Ahamad - Georgia Tech
Vijay Atluri - Rutgers University
Matt Bishop - UC Davis
Steve Chapin - Syracuse University
Pravin Dipak - Xerox
Nikita Borisov - University of Illinois, Urbana-Champaign
Peter Chen - Louisiana State University
Hsinchun Chen - University of Arizona
Thomas E Daniels - Iowa State University
Jim Davis - Iowa State University
Gurpreet Dhillon - Virginia Commonwealth University
Ron Dodge - United States Military Academy
Lawrence Gordon - University of Maryland
Jiawei Han - University of Illinois, Urbana-Champaign
Anupam Joshi - University of Maryland, Baltimore County
Kamesh Namuduri - Wichita State University
Chester Maciag - AFRL Rome
John McDermott - Office of Naval Research
Adam Slagell - NCSA and the University of Illinois, Urbana-Champaign
Lawrence O'Gorman - Avaya
Jinkyu Lee - SUNY at Buffalo
Robert McGraw - NSA
Brajendra Panda - University of Arkansas
Indrajit Ray - Colorado State University
Arnon Rosenthal - MITRE Corporation
Raghu Santanam - Arizona State University
Revankar Shriram V - Xerox
R. Sekar - SUNY Stony Brook
Benjamin Shao - Arizona State University
Raj Sharma - SUNY at Buffalo
Steve Tate - University of North Texas
Rao Vemuri - UC Davis
Jun Wang - NCSA and the University of Illinois, Urbana-Champaign
Marianne Winslett - University of Illinois, Urbana-Champaign
Xiaoxin Yin - University of Illinois, Urbana-Champaign