SKM Program Details
The PPT or the PDF file
format for each of the presentation below are the
closest to the original slides that were presented in
the workshop. Flash files have been provided for viewing
convenience. Due to conversion difficulties, they are
not an exact replica of the original slides. Due
to the authors request, PPT files of certain
presentations are not hosted.
Invited Speakers
-
Collaborative Secure Knowledge Management By Bill McQuay,
Technical Advisor, Air Force Research Laboratory
- Secure
Knowledge Management By Dr. Bhavani Thuraisingham, National
Science Foundation
-
DHS, National Cyber Security Division Overview By Hun Kim,
Deputy Director, Strategic Initiatives
-
Economics, psychology, and sociology and the limitations they
impose on secure knowledge management By Andrew Odlyzko,
Digital Technology Center, University of Minnesota
-
Faster Differentiation of Terrorists and Malicious Cyber
Transactions from Good People and Transactions By Peter P.
Chen, Foster Distinguished Chair Professor, Computer Science
Dept. Louisiana State University
- Some
Patterns of Knowledge Management in Secure Environments By
Alan D. Marwick, IBM Software Group, Fred Maymir-Ducharme, IBM
Federal Systems
-
Cyber-Identity, Authority and Trust in an Uncertain World By
Ravi Sandhu, Laboratory for Information Security Technology,
George Mason University
-
The
Challenges of Secure Knowledge Management By Margaret E.
Grayson, President & CEO, V-ONE Corporation
|
A Sessions
-
A Trusted Information Sharing Project From
Syracuse University, Electrical Engineering &
Computer Science
-
Using Subject- and Object-specific Attributes for
Access Control in Web-based Knowledge Management
Systems From Vienna University of Economics and
BA
-
Auditable Security Controls Of Best In Class
Security and IT Operations Organizations By Gene
Kim, CTO, Tripwire, Inc.
-
A Queuing Formulation of Intrusion Detection with
Active and Passive Responses From Department of
Information Systems and Operations Management,
School of Management, The University of Texas at
Dallas
- Ferret By T.J.
Smith, Research Triangle Park, NC
-
Detecting the Misappropriation of Sensitive
Information through Bottleneck Monitoring By T.J
Goan, Stottler Henke Associates Inc.
-
Network Log Anonymization: Application of Crypto-PAn
to Cisco Netflows From National Center for
Supercomputing Applications (NCSA), University of
Illinois at Urbana-Champaign
-
A Control Flow Integrity Based Trust Model, By
Ge Zhu, Akhilesh Tyagi, Iowa State University.
-
Trust Management and Theory Revision By Ji Ma,
School of Computer and Information Science,
University of South Australia.
-
Using Entropy to Trade Privacy for Trust From
Department of Computer Sciences, Purdue University.
-
Statistical Privacy For Privacy Preserving
Information Sharing, Johannes Gehrke, Cornell
University
-
On Privacy and Anonymity in Knowledge
Externalization From The Chinese University of
Hong Kong
-
Trust-based Privacy Preservation for Peer-to-peer
Data Sharing From Department of Computer
Sciences, Purdue University
-
Securing Information through Trust Management in
Wireless Networks From Computer Science and
Engineering, The State University of New York at
Buffalo
-
PBKM: A Secure Knowledge Management Framework
From Dept. Computer Science, UT @ San Antonio
|
B Sessions
-
Private and Trusted Interactions From Department
of Computer Sciences, CERIAS and CWSA, Purdue
University
-
Trust-Based Security Protocols From University
of Arkansas
-
Assessing the Effect of Deceptive Data in the Web of
Trust From University of Arkansas
-
Data access control and measure in the development
of web-based health insurance systems From
Computer Science Department, Information Assurance
Center, West Chester University
-
A Policy-Based Security Mechanism for Distributed
Health Networks From netlab Research Group, Dept
of Computer Science, University of Victoria
-
Securing Clinical Knowledge, Balancing
Accessibility, Security, and Privacy in Dental
Education From Daniel W. Emmer, PhD Ebrahim
Randeree, MBA
-
Securing Pervasive Networks Using Biometrics
From Center for Unified Biometrics and Sensors,
University at Buffalo
-
Using Facets of Security within a Knowledge-based
Framework to Broker and Manage Semantic Web Services
From E-Center for E-Business, George Mason
University
-
Securing Content in the Department of Defense’s
Global Information Grid By Robert W. McGraw,
Technical Director, IA Architecture & Systems
Security Engineering Group, Information Assurance
Directorate, National Security Agency
-
Enhanced Access Control for Collaborative Documents
By Jeffrey D. Campbell Interactive Systems Research
Center, Information Systems Department, UMBC
-
Securing Organizational Knowledge using Automated
Annotation By Savitha Kadiyala, K.R. Namuduri,
Venu Dasigi
-
Information Theoretic Model for Inference Resistant
Knowledge Management in RBAC Based Collaborative
Environment By Manish Gupta, Sivakumar Chennuru
-
A Multi-Disciplinary Approach for Countering Insider
Threats From Syracuse Research Corporation and
Syracuse University
-
A Game-theoretic Approach to the Design of
Self-Protection and Self-Healing Mechanisms in
Autonomic Computing Systems By Birendra Mishra,
Anderson School of Management, U C Riverside and T.
S. Raghu, W. P. Carey School of Business, Arizona
State University
|
|