Difference between revisions of "AISM 2010"
(New page: {{Event |Acronym=AISM 2010 |Title=8th Australian Information Security Management Conference |Series=8th AISM |Type=Conference |Field=Information science |Superevent=2010 secau Security Con...) |
|||
(One intermediate revision by one other user not shown) | |||
Line 2: | Line 2: | ||
|Acronym=AISM 2010 | |Acronym=AISM 2010 | ||
|Title=8th Australian Information Security Management Conference | |Title=8th Australian Information Security Management Conference | ||
− | | | + | |Ordinal=8 |
|Type=Conference | |Type=Conference | ||
|Field=Information science | |Field=Information science | ||
Line 8: | Line 8: | ||
|Start date=2010/11/30 | |Start date=2010/11/30 | ||
|End date=2010/12/02 | |End date=2010/12/02 | ||
+ | |Submission deadline=2010/09/01 | ||
|Homepage=conferences.secau.org | |Homepage=conferences.secau.org | ||
|City=Perth | |City=Perth | ||
|State=Western Australia | |State=Western Australia | ||
|Country=Australia | |Country=Australia | ||
− | |||
}} | }} | ||
+ | '''INFORMING SECURITY''' | ||
+ | |||
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate. | Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ''Papers are invited in the following areas, but not limited to:'' | |
− | Risk Assessment | + | * Information Security Management |
+ | * Data Security | ||
+ | * Application Security | ||
+ | * Security Policy | ||
+ | * Authentication & Authorisation | ||
+ | * Privacy | ||
+ | * Software Protection | ||
+ | * Mobile Security | ||
+ | * Network Security | ||
+ | * Risk Assessment | ||
+ | * Secure Development | ||
+ | * Internet Security | ||
− | |||
− | + | ''Important Dates:'' | |
+ | * Paper Submission Deadline: September 1, 2010 | ||
+ | * Acceptance Notification: September 17-24, 2010 | ||
+ | * Camera ready papers: October 15, 2010 | ||
+ | * Early Bird Registration: October 1, 2010 | ||
− | |||
+ | '''secau Security Research Centre, Edith Cowan University''' | ||
Latest revision as of 15:50, 19 November 2020
AISM 2010 | |
---|---|
8th Australian Information Security Management Conference
| |
Ordinal | 8 |
Subevent of | 2010 secau Security Congress |
Dates | 2010/11/30 (iCal) - 2010/12/02 |
Homepage: | conferences.secau.org |
Location | |
Location: | Perth, Western Australia, Australia |
Loading map... | |
Important dates | |
Submissions: | 2010/09/01 |
Table of Contents | |
INFORMING SECURITY
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate.
Papers are invited in the following areas, but not limited to:
- Information Security Management
- Data Security
- Application Security
- Security Policy
- Authentication & Authorisation
- Privacy
- Software Protection
- Mobile Security
- Network Security
- Risk Assessment
- Secure Development
- Internet Security
Important Dates:
- Paper Submission Deadline: September 1, 2010
- Acceptance Notification: September 17-24, 2010
- Camera ready papers: October 15, 2010
- Early Bird Registration: October 1, 2010
secau Security Research Centre, Edith Cowan University
Conference Chair: Dr Chris Bolan
Congress Chair: Professor Craig Valli
Executive Chair: Professor Murray Lampard
Congress Organiser: Ms Lisa McCormack
Acronym | AISM 2010 + |
End date | December 2, 2010 + |
Event type | Conference + |
Has coordinates | -31° 57' 21", 115° 51' 38"Latitude: -31.955894444444 Longitude: 115.86058611111 + |
Has location city | Perth + |
Has location country | Category:Australia + |
Has location state | Western Australia + |
Homepage | http://conferences.secau.org + |
IsA | Event + |
Ordinal | 8 + |
Start date | November 30, 2010 + |
Subevent of | 2010 secau Security Congress + |
Submission deadline | September 1, 2010 + |
Title | 8th Australian Information Security Management Conference + |