Difference between revisions of "AISM 2010"

From Openresearch
Jump to: navigation, search
(New page: {{Event |Acronym=AISM 2010 |Title=8th Australian Information Security Management Conference |Series=8th AISM |Type=Conference |Field=Information science |Superevent=2010 secau Security Con...)
 
Line 14: Line 14:
 
|Submission deadline=2010/09/01
 
|Submission deadline=2010/09/01
 
}}
 
}}
 +
'''INFORMING SECURITY'''
 +
 
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate.
 
Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate.
  
Papers are invited in the following areas, but not limited to:
 
 
 
Information Security Management
 
 
Data Security
 
  
Application Security
+
''Papers are invited in the following areas, but not limited to:''
  
Security Policy  
+
* Information Security Management
 +
* Data Security
 +
* Application Security
 +
* Security Policy  
 +
* Authentication & Authorisation
 +
* Privacy
 +
* Software Protection
 +
* Mobile Security
 +
* Network Security
 +
* Risk Assessment
 +
* Secure Development
 +
* Internet Security
  
Authentication & Authorisation
 
  
Privacy
+
''Important Dates:''
  
Software Protection
+
* Paper Submission Deadline:    September 1, 2010
 +
* Acceptance Notification:  September 17-24, 2010
 +
* Camera ready papers:  October 15, 2010
 +
* Early Bird Registration:  October 1, 2010
  
Mobile Security
 
 
Network Security
 
 
Risk Assessment
 
 
Secure Development
 
 
Internet Security
 
 
 
secau Security Research Centre, Edith Cowan University,
 
  
 +
'''secau Security Research Centre, Edith Cowan University'''
  
  
Line 55: Line 53:
  
 
Congress Organiser: Ms Lisa McCormack
 
Congress Organiser: Ms Lisa McCormack
 +
 +
'''For further information email l.mccormack@ecu.edu.au'''

Revision as of 05:47, 13 April 2010

AISM 2010
8th Australian Information Security Management Conference
Event in series 8th AISM
Subevent of 2010 secau Security Congress
Dates 2010/11/30 (iCal) - 2010/12/02
Homepage: conferences.secau.org
Location
Location: Perth, Western Australia, Australia
Loading map...

Important dates
Submissions: 2010/09/01
Table of Contents


INFORMING SECURITY

Information security is centred on the core aims of security namely maintaining confidentiality, availability and integrity. In the present climate of rapid change, increasing reliance on remote access to information and the wide uptake of online services, it is more important than ever to discuss and discover new threats and their possible countermeasures. The aim of the Australian Information Security Management Conference 2010 is to encourage the dissemination of current research to all those with a stake in the security of information including security practitioners, academics, law enforcement and management who are all cordially invited to participate.


Papers are invited in the following areas, but not limited to:

  • Information Security Management
  • Data Security
  • Application Security
  • Security Policy
  • Authentication & Authorisation
  • Privacy
  • Software Protection
  • Mobile Security
  • Network Security
  • Risk Assessment
  • Secure Development
  • Internet Security


Important Dates:

  • Paper Submission Deadline: September 1, 2010
  • Acceptance Notification: September 17-24, 2010
  • Camera ready papers: October 15, 2010
  • Early Bird Registration: October 1, 2010


secau Security Research Centre, Edith Cowan University


Conference Chair: Dr Chris Bolan

Congress Chair: Professor Craig Valli

Executive Chair: Professor Murray Lampard

Congress Organiser: Ms Lisa McCormack

For further information email l.mccormack@ecu.edu.au

Facts about "AISM 2010"
AcronymAISM 2010 +
End dateDecember 2, 2010 +
Event typeConference +
Has coordinates-31° 57' 10", 115° 51' 38"Latitude: -31.952711111111
Longitude: 115.86048055556
+
Has location cityPerth +
Has location countryCategory:Australia +
Has location stateWestern Australia +
Homepagehttp://conferences.secau.org +
IsAEvent +
Ordinal8 +
Start dateNovember 30, 2010 +
Subevent of2010 secau Security Congress +
Submission deadlineSeptember 1, 2010 +
Title8th Australian Information Security Management Conference +