posted by user: yacine || 10756 views || tracked by 26 users: [display]

SHPCS 2011 : 6th Workshop on Security and High Performance Computing Systems

FacebookTwitterLinkedInGoogle

Link: http://hpcs11.cisedu.info/conference/workshops/workshop-5---shpc
 
When Jul 4, 2011 - Jul 8, 2011
Where Istanbul, Turkey
Submission Deadline Feb 28, 2011
Notification Due Mar 24, 2011
Final Version Due Apr 14, 2011
Categories    security   information security   network security   grid
 

Call For Papers

---------------------------------------------------------------------------
CALL FOR PAPERS

*** NEW DEADLINE ***

6th Workshop on Security and High Performance Computing Systems
(SHPCS 2011)
http://hpcs11.cisedu.info/conference/workshops/workshop-5---shpc
---------------------------------------------------------------------------

As part of "The International Conference on High Performance Computing &
Simulation - HPCS 2011" (http://hpcs11.cisedu.info/)
In conjunction with "The 7th International Wireless Communications and
Mobile Computing Conference - IWCMC 2011" (http://www.iwcmc.org/)

July 4-8, 2011
Istanbul, Turkey


*** EXTENDED SUBMISSION DEADLINE: FEBRUARY 28, 2011 ***



SCOPE AND OBJECTIVES

Providing high performance computing and security is a challenging task.
Internet, operating systems and distributed environments currently
suffer from poor security support and cannot resist common attacks.
Adding security measures typically degrades performance.
This workshop addresses relationships between security and high
performance computing systems in three directions.
First, it considers how to add security properties (authentication,
confidentiality, integrity, non-repudiation, access control) to high
performance computing systems. In this case, safety properties can also
be addressed, such as availability and fault tolerance for high
performance computing systems.
Second, it covers how to use high performance computing systems to solve
security problems. For instance, a grid computation can break an
encryption code, or a cluster can support high performance intrusion
detection. More generally, this topic addresses every efficient use of a
high performance computing systems to improve security.
Third, it investigates the tradeoffs between maintaining high
performance and achieving security in computing systems and solutions to
balance the two objectives.
In all these directions, various performance analyses or monitoring
techniques can be conducted to show the efficiency of a security
infrastructure.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of computer and
network security, as well as case studies and implementation
experiences. Papers should have practical relevance to the construction,
evaluation, application, or operation of secure systems.

The Workshop topics include (but are not limited to) the following:
* Access Control
* Accounting and Audit
* Anonymity
* Applied Cryptography
* Authentication
* Cloud Security
* Commercial and Industry Security
* Cryptographic Protocols
* Data and Application Security
* Data/System Integrity
* Database Security
* Digital Rights Management
* Formal Verification of Secure Systems
* Identity Management
* Inference/Controlled Disclosure
* Information Warfare
* Intellectual Property Protection
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Key Management
* Privacy-Enhancing Technology
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security for Mobile Code
* Security for Specific Domains (e.g., E-Government, E-Business, P2P)
* Security in IT Outsourcing
* Security in Mobile and Wireless Networks
* Security in Untrusted & Adversarial Environments and Systems
* Security in Operating Systems
* Security Location Services
* Security of Grid and Cluster Architectures
* Security Visualization
* Smartcards
* Trust Management Policies
* Trust Models
* Web Security
* Web Services Security

PAPER SUBMISSIONS

Submitted papers must not have been published or simultaneously
submitted elsewhere. Submission should include a cover page with
authors' names, affiliation addresses, fax numbers, phone numbers, and
email addresses. Please, indicate clearly the corresponding author and
include up to 6 keywords from the above list of topics and an abstract
of no more than 400 words. The full manuscript should be at most 7
pages using the two-column IEEE format. Please include page numbers on
all submissions to make it easier for reviewers to provide helpful
comments. Submit a PDF copy of your full manuscript via using the easychair
submission link at:
http://www.easychair.org/conferences/?conf=shpcs11

Only PDF files will be accepted. Each paper will receive a minimum of
three reviews. Papers will be selected based on their originality,
relevance, technical clarity and presentation. Authors of accepted
papers must guarantee that their papers will be registered and presented
at the workshop. Accepted papers will be published in the IEEE Digital
Library after the conference and included in HPCS 2011 proceedings which
will be made available at the time of the meeting.

If you have any questions about paper submission or the workshop, please
contact the organizers.

IMPORTANT DATES

Paper Submissions: ---------------------------------- February 28, 2011
Acceptance Notification: ---------------------------- March 24, 2011
Camera Ready Papers and Registration Due: ----------- April 14, 2011

PROGRAM COMMITTEE

All submitted papers will be reviewed by the workshop technical program
committee members following similar criteria used in HPCS.

* Jemal H. Abawajy, Deakin University, Australia
* Massimo Benerecetti, University of Naples "Federico II", Italy
* Mathieu Blanc, Commissariat à l'Energie Atomique (CEA), France
* Gianluca Capuzzi, TeamSystem Ancona s.r.l., Italy
* Ioanna Dionysiou, University of Nicosia, Cyprus
* Stefan Edelkamp, University of Bremen, Germany
* Hannes Federrath, University of Regensburg, Germany
* Javier Garcia Villalba, Complutense University of Madrid, Spain
* Dieter Hutter, DFKI GmbH, Germany
* Martin G. Jaatun, SINTEF ICT, Norway
* Jean-Francois Lalande, LIFO, Universite d'Orleans, France
* Gaëtan Le Guelvouit, Orange Labs, France
* Jose A. Onieva, Universidad de Málaga, Spain
* Francesco Pagliarecci, Universita Politecnica delle Marche, Italy
* Josef Pieprzyk, Macquarie University, NSW, Australia
* Christophe Rosenberger, GREYC - ENSICAEN, Normandy, France
* Françoise Sailhan, Conservatoire National des Arts et Métiers (CNAM),
France
* Waleed W. Smari, University of Dayton, Ohio, USA
* Simone Tacconi, Polizia di Stato, Italy
* Carolyn Talcott, SRI International, USA
* Soon Tee Teoh, San Jose State University, USA
* Christian Toinard, LIFO, Université d'Orleans, France
* Markus Ullmann, Bundesamt für Sicherheit in der Informationstechnik
(BSI), Germany
* Toshihiro Yamauchi, Okayama University, Okayama, Japan

WORKSHOP ORGANIZERS

Luca Spalazzi
Dipartimento di Ingegneria Informatica, Gestionale e dell'Automazione
Università Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY, EU
Phone: +39 071 2204829
Fax: +39 071 2204474
Email: spalazzi@diiga.univpm.it

Yacine Zemali
Laboratoire d'Informatique Fondamentale d'Orléans
Université d'Orleans - ENSI de Bourges
88 Boulevard Lahitolle
F-18020 Bourges Cedex, FRANCE, EU
Phone: +33 (0)2 48 48 40 94
Fax: +33 (0)2 48 48 40 50
Email: yacine.zemali@ensi-bourges.fr

Related Resources

HPCCT 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
HPCCT--ESCI 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ICCIA--EI 2025   2025 10th International Conference on Computational Intelligence and Applications (ICCIA 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SEAS 2025   14th International Conference on Software Engineering and Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography