Difference between revisions of "AISM 2010"
(New page: {{Event |Acronym=AISM 2010 |Title=8th Australian Information Security Management Conference |Series=8th AISM |Type=Conference |Field=Information science |Superevent=2010 secau Security Con...) |
|||
Line 14: | Line 14: | ||
|Submission deadline=2010/09/01 | |Submission deadline=2010/09/01 | ||
}} | }} | ||
+ | '''INFORMING SECURITY''' | ||
+ | |||
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate. | Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ''Papers are invited in the following areas, but not limited to:'' | |
− | Security Policy | + | * Information Security Management |
+ | * Data Security | ||
+ | * Application Security | ||
+ | * Security Policy | ||
+ | * Authentication & Authorisation | ||
+ | * Privacy | ||
+ | * Software Protection | ||
+ | * Mobile Security | ||
+ | * Network Security | ||
+ | * Risk Assessment | ||
+ | * Secure Development | ||
+ | * Internet Security | ||
− | |||
− | + | ''Important Dates:'' | |
− | + | * Paper Submission Deadline: September 1, 2010 | |
+ | * Acceptance Notification: September 17-24, 2010 | ||
+ | * Camera ready papers: October 15, 2010 | ||
+ | * Early Bird Registration: October 1, 2010 | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | '''secau Security Research Centre, Edith Cowan University''' | ||
Line 55: | Line 53: | ||
Congress Organiser: Ms Lisa McCormack | Congress Organiser: Ms Lisa McCormack | ||
+ | |||
+ | '''For further information email l.mccormack@ecu.edu.au''' |
Revision as of 05:47, 13 April 2010
AISM 2010 | |
---|---|
8th Australian Information Security Management Conference
| |
Event in series | 8th AISM |
Subevent of | 2010 secau Security Congress |
Dates | 2010/11/30 (iCal) - 2010/12/02 |
Homepage: | conferences.secau.org |
Location | |
Location: | Perth, Western Australia, Australia |
Loading map... | |
Important dates | |
Submissions: | 2010/09/01 |
Table of Contents | |
INFORMING SECURITY
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate.
Papers are invited in the following areas, but not limited to:
- Information Security Management
- Data Security
- Application Security
- Security Policy
- Authentication & Authorisation
- Privacy
- Software Protection
- Mobile Security
- Network Security
- Risk Assessment
- Secure Development
- Internet Security
Important Dates:
- Paper Submission Deadline: September 1, 2010
- Acceptance Notification: September 17-24, 2010
- Camera ready papers: October 15, 2010
- Early Bird Registration: October 1, 2010
secau Security Research Centre, Edith Cowan University
Conference Chair: Dr Chris Bolan
Congress Chair: Professor Craig Valli
Executive Chair: Professor Murray Lampard
Congress Organiser: Ms Lisa McCormack
For further information email l.mccormack@ecu.edu.au
Acronym | AISM 2010 + |
End date | December 2, 2010 + |
Event type | Conference + |
Has coordinates | -31° 57' 10", 115° 51' 38"Latitude: -31.952711111111 Longitude: 115.86048055556 + |
Has location city | Perth + |
Has location country | Category:Australia + |
Has location state | Western Australia + |
Homepage | http://conferences.secau.org + |
IsA | Event + |
Ordinal | 8 + |
Start date | November 30, 2010 + |
Subevent of | 2010 secau Security Congress + |
Submission deadline | September 1, 2010 + |
Title | 8th Australian Information Security Management Conference + |