International Conference on Secure Knowledge Management (SKM)*

International Conference on Secure Knowledge Management (SKM)*

No warranty for correctness & completeness!
This site will be updated with no ads and linked to its KMedu opportunities
as soon as the provider subscribes to this service!
(sample pages: training, university, community, conference)

Monthly Featured

Featured Provider

The Secure Knowledge Management (SKM) Workshop and International Conference will bring together researchers and practitioners from academia, industry and government to share recent advances on secure knowledge Management in revolutionary and disruptive technology domains such as cloud computing, big data, artificial intelligence, and internet of things.

Conference History:

SKM International Conference 2021 , October 8-9, 2021, San Antonio, TX, USA
Conference Theme: Secure Knowledge Management in Artificial Intelligence Era
(Host: Department of Computer Science & Department of Electrical and Computer Engineering, College of Sciences, University of Texas at San Antonio)

    Panel Discussions:
    Women in Cybersecurity Panel

8th SKM International Conference 2019, December 21 – 22, 2019, BITS Pilani, Goa Campus, Sancoale, India
Conference Theme: Secure Knowledge Management in Artificial Intelligence Era
(Host: Department of Computer Science and Information Systems, Birla Institute of Technology and Science, Pilani (BITS Pilani), K K Birla Goa Campus)

    Pre-Conference Workshops: (Dec 21)
    Workshop on Digital Payment Systems (incl. Blockchain for Enterprise Tutorial)

    Conference Sessions:
    Cyber Security; Security and Artificial Intelligence(Machine Learning; Access Control Models; Social Networks

    Keynotes/Invited Taklks:
    Challenges of Ownership and Privacy in Medical Data Sharing; Igniting Digital Transformation; Cyber Security of Critical Infrastructures: A C3I Perspective; Trust and Loyalty in Artificial Intelligence; Digital Payments Adoption by Low-Income Populations in Bangalore: Lessons From The Road; Securing Trust in Online Social Networks

7th SKM Workshop 2017, October 6-7, 2017, Tampa, FL, USA
(Host: Computer Science Department, University of South Florida)

    Workshop Sessions:
    n.a.
    Keynotes/Invited Taklks:
    n.a.

6th SKM International 2014, 8-9 December 2014, Dubai, UAE
Conference Theme: International Conference on Secure Knowledge Management in Big-data Era
(Host: Department of Computer Science, Birla Institute of Technology and Science, Pilani – Dubai Campus)

    Conference Sessions:
    n.a., Poster Session

    Keynotes/Invited Taklks:
    BGP hijack: myth or reality?; Database Scalability, Elasticity, and Autonomy in the Cloud; …n.a.

5th SKM Workshop 2012, June 5-6, 2012, Albany, NY, USA
(Host: Information Security and Digital Forensics Department, School of Business, University at Albany, State University of New York; in conjunction with the Annual Symposium on Information Assurance (ASIA))

    Workshop/Symposium Sessions:
    Forensic / IT Audit; Cloud Security/Survivability Systems; Anti-Virus/Worms; Email/User Security; Mobile Security

    Keynotes/Invited Taklks:
    Measuring Secure Behavior: A Research Commentary; The State of ICS Security: A Year in Review

4th SKM Workshop 2010, October 21-22, 2010, Rutgers University, New Brunswick, NJ, USA
(Host: Rutgers Center for Information Assurance & Center for Discrete Mathematics and Theoretical Computer Science, Rutgers, The State University of New Jersey)

    Workshop Sessions:
    n.a.

    Keynotes/Invited Taklks:
    Strategic Policies for Cyberdeterrence: A Game-Theoretic Framework; Surviving in Cyberspace; …

    Panel Discussions:
    Panel Discussion (representatives from NSF, AFRL, etc)

    Round Table Discussions:
    Round Table Discussion (Oct 22, morning)

3rd SKM Workshop 2008, November 3-4, 2008, Dallas, TX, USA
(Host: Department of Computer Science, School of Engineering & Computer Science, University of Texas at Dallas)

    Workshop Sessions:
    Economics of Secure Knowledge Management; Secure Knowledge Management Architectures; Private Knowledge Management; Other Issues in Secure Knowledge Management

    Panel Discussions:
    Issues Facing Women CyberSecurity Researchers

    Keynotes/Invited Taklks:
    Overview of Department of Homeland Security’s Unified Incident Command Decision Support Initiative; Secure Intellectual Property Management (a corporate view)

2nd SKM Workshop 2006, September 28-29, 2006, Brooklyn, NY, USA
(Host: Department of Computer Science, College of Engineering and Applied Sciences, Stony Brook University)

    Workshop Sessions:
    Information/Knowledge Sharing; Privacy; Knowledge Management in Security; Privacy in Data Mining; Privacy and Culture; Knowledge Management and Security Management; Knowledge Management for Technology; Poster Session

    Keynotes/Invited Taklks:
    The Resilient Enterprise – Convergence of Security, Compliance, Redundancy and Risk; Partnering with the FBI: Exploring a Path to Knowledge Security; The role of cyber security in homeland defense; Information Security, Privacy and Confidentiality, National Science Foundation’s Past and Current Funding Profile and Future Opportunities; Trusting Strangers in 2010; Privacy-Preserving Sharing of Suspicious Content Correlation for Accurate Malicious Traffic Detection; Managing cybersecurity resources; Document Security

1st SKM Workshop 2004, September 23-24, 2004, Amherst, NY, USA
(Host: Center of Excellence in Information Systems Assurance Research and Education, University at Buffalo)

    Workshop Sessions:
    Access Control and Rights; Trust and Privacy; Monitoring, Detection and Intrusion Response; Security in Health Informatics

    Panel Discussions:
    Women and Cyber Security: Gendered Tasks and Inequitable Outcomes

    Invited Talks:
    Secure Knowledge Management; National Cyber Security – Progress and Road Ahead; The Challenges of Secure Knowledge Management; Collaborative Secure Knowledge Management; Economics, psychology, and sociology and the limitations they impose on secure knowledge management; Faster Differentiation of Terrorists and Malicious Cyber Transactions from Good People and Transactions; Some Patterns of Knowledge Management in Secure Environments; Cyber-Identity, Authority and Trust in an Uncertain World

Home » Opportunities » Events

Leave a Reply

Your email address will not be published. Required fields are marked *