posted by user: dreamersball80 || 8899 views || tracked by 8 users: [display]

SHPCS 2015 : 10th International Workshop on Security and High Performance Computing Systems

FacebookTwitterLinkedInGoogle

Link: http://hpcs2015.cisedu.info/2-conference/hpcs-2015-workshops/hpcs-2015-workshop-10-shcps
 
When Jul 20, 2015 - Jul 24, 2015
Where Amsterdam
Submission Deadline Apr 15, 2015
Notification Due Apr 30, 2015
Final Version Due May 14, 2015
Categories    computer science   security   HPC   mobile security
 

Call For Papers


SCOPE AND OBJECTIVES
Providing high performance computing and security is a challenging task. Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks. Adding security measures typically degrade performance. This workshop addresses relationships between security, high performance and distributed computing systems in four directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems. Second, it addresses vulnerabilities and security threats (and remediation) targeting HPC, grid, cloud and mobile environments. Third, it covers how to use HPC systems to solve security problems. For instance, a grid computation can break an encryption code, a cluster can support high performance intrusion detection or a distributed formal verification system. More generally, this topic addresses every efficient use of a high performance computing systems to improve security. Fourth, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various formal analyses, as well as performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.

The SHPCS Workshop topics of interest include (but are not limited to) the following:
• Access Control
• Accounting and Audit
• Anonymity
• Applied Cryptography
• Authentication
• Commercial and Industry Security
• Cryptographic Protocols
• Data and Application Security
• Data/System Integrity
• Database Security
• Digital Rights Management
• Formal Verification of Secure Systems
• Identity Management
• Inference/Controlled Disclosure
• Information Warfare
• Intellectual Property Protection
• Intrusion and Attack Detection
• Intrusion and Attack Response
• Key Management
• Mobile Security
• Privacy-Enhancing Technology
• Secure Networking
• Secure System Design
• Security Monitoring & Management
• Security for Mobile Code
• Security for Specific Domains (e.g., E-Government, E-Business, P2P)
• Security in IT Outsourcing
• Security in Wireless Networks
• Security in Untrusted & Adversarial Environments and Systems
• Security in Operating Systems
• Security Location Services
• Security of Grid and Cluster Architectures
• Security Visualization
• Smartcards
• Trust Management Policies
• Trust Models
• Web Security
• Web Services Security


INSTRUCTIONS FOR PAPER SUBMISSIONS
You are invited to submit original and unpublished research works on above and other topics related to Security and HPC in each local/distributed application fields (Grid, Cloud, mobile). Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged additional fee. Short papers (up to 4 pages), poster papers and posters will also be accepted for submission. Please include page numbers on all preliminary submissions to make it easier for reviewers to provide helpful comments.

Submit a PDF copy of your full manuscript using the Workshop EasyChair submission link at https://www.easychair.org/conferences/?conf=shpcs2015 .

Only PDF files will be accepted, submitted via the link above. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop.

PROCEEDINGS
Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting. Instructions for final manuscript format and requirements will be posted on the HPCS 2015 Conference web site. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE Digital Library and indexed in major indexing services accordingly.

SPECIAL ISSUE
Authors of selected papers will be invited to submit an extended version of their work for a special issue in an ISI Journal (the last special issue is going to be published in the Journal of Computer Security (JCS) – IoS Press).

If you have any questions about paper submission or the workshop, please contact the organizers.


IMPORTANT DATES
Paper Submissions: ------------------------------------------ April 15, 2015
Acceptance Notification: ------------------------------------ April 30, 2015
Camera Ready Papers and Registration Due by: ---------------- May 14, 2015
Conference Dates: ------------------------------------------ July 20 – 24, 2015


WORKSHOP ORGANIZER
*Alessio Merlo*
Computer Security Lab (CSecLab)
Department of Informatics, Bioengineering, Robotics, and System Engineering
University of Genoa
Viale F. Causa, 13,
I-16145 Genova, Italy.
Phone: +39 010 343 2344
Fax: +39 010 353 2948
Email: alessio.merlo@unige.it

*Luca Spalazzi*
Dipartimento di Ingegneria dell’Informazione
Università Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY, EU
Phone: +39 071 2204829
Fax: +39 071 2204474
Email: spalazzi@dii.univpm.it

*Mauro Migliardi*
DEI - University of Padua
Via Gradenigo, 6/B, I-35131, Padova, Italy
Phone: +39 328 1003221
Email: mauro.migliardi@unipd.it


International Program Committee:

• Alessandro Armando, FBK-IRST, Trento, Italy.
• Felipe Beato, ESAT/COSIC, KU Leuven, Belgium.
• Matthias Büchler, Technische Universitat, Munchen, Germany.
• Mathieu Blanc, Commissariat à l'Energie Atomique (CEA), France.
• Mauro Conti, University of Padua, Italy.
• Jorge Cuellar, Siemens, Germany.
• Pierpaolo Degano, University of Pisa, Italy.
• Paolo Gasti, New York Institute of Technology, USA.
• Jean-François Lalande, LIFO, Universite d'Orleans, France.
• David Llewellyn-Jones, Liverpool John Moore's University, UK.
• Mauro Migliardi, University of Padua, Italy.
• Mikhail Nesterenko, Kent State University, IH, USA.
• Jose Antonio Onieva, Universidad de Málaga, Spain.
• Hassan Peyravi, Kent State University.
• Christina Popper, Rurh Universitat, Bochum, Germany
• Muttukrishnan Rajarajan, City University London, UK.
• Giovanni Russello, University of Auckland, New Zealand.
• Waleed W.Smari, Ball Aerospace & Technologies Corp., OH, USA
• Luca Spalazzi, Universita' Politecnica delle Marche, Italy.
• Mohamad Thorabi Dashti, ETH, Zurich, Switzerland.
• Luca Vigano', King College, London, UK.

All submitted papers will be reviewed by the workshop technical program committee members following similar criteria used in HPCS 2015.

For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: http://hpcs2015.cisedu.info/or http://cisedu.us/rp/hpcs15 or contact one of the Conference's organizers.

Related Resources

HPCCT 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
HPCCT--ESCI 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICCIA--EI 2025   2025 10th International Conference on Computational Intelligence and Applications (ICCIA 2025)
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)