SHPCS 2015 - 10th International Workshop on Security and High Performance Computing Systems (SHPCS 2015)
Date2015-07-20 - 2015-07-24
Deadline2015-03-31
VenueAmsterdam, Netherlands, The
Keywords
Websitehttps://hpcs2015.cisedu.info
Topics/Call fo Papers
Providing high performance computing and security is a challenging task. Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks. Adding security measures typically degrade performance. This workshop addresses relationships between security, high performance and distributed computing systems in four directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems. Second, it addresses vulnerabilities and security threats (and remediation) targeting HPC, grid, cloud and mobile environments. Third, it covers how to use HPC systems to solve security problems. For instance, a grid computation can break an encryption code, a cluster can support high performance intrusion detection or a distributed formal verification system. More generally, this topic addresses every efficient use of a high performance computing systems to improve security. Fourth, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various formal analyses, as well as performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure.
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.
The SHPCS Workshop topics of interest include (but are not limited to) the following:
Access Control
Accounting and Audit
Anonymity
Applied Cryptography
Authentication
Mobile Security
Commercial and Industry Security
Cryptographic Protocols
Data and Application Security
Data/System Integrity
Database Security
Digital Rights Management
Formal Verification of Secure Systems
Identity Management
Inference/Controlled Disclosure
Information Warfare
Intellectual Property Protection
Intrusion and Attack Detection
Intrusion and Attack Response
Key Management
Privacy-Enhancing Technology
Secure Networking
Secure System Design
Security Monitoring & Management
Security for Mobile Code
Security for Specific Domains (e.g., E-Government, E-Business, P2P)
Security in IT Outsourcing
Security in Mobile and Wireless Networks
Security in Untrusted & Adversarial Environments and Systems
Security in Operating Systems
Security Location Services
Security of Grid and Cluster Architectures
Security Visualization
Smartcards
Trust Management Policies
Trust Models
Web Security
Web Services Security
The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.
The SHPCS Workshop topics of interest include (but are not limited to) the following:
Access Control
Accounting and Audit
Anonymity
Applied Cryptography
Authentication
Mobile Security
Commercial and Industry Security
Cryptographic Protocols
Data and Application Security
Data/System Integrity
Database Security
Digital Rights Management
Formal Verification of Secure Systems
Identity Management
Inference/Controlled Disclosure
Information Warfare
Intellectual Property Protection
Intrusion and Attack Detection
Intrusion and Attack Response
Key Management
Privacy-Enhancing Technology
Secure Networking
Secure System Design
Security Monitoring & Management
Security for Mobile Code
Security for Specific Domains (e.g., E-Government, E-Business, P2P)
Security in IT Outsourcing
Security in Mobile and Wireless Networks
Security in Untrusted & Adversarial Environments and Systems
Security in Operating Systems
Security Location Services
Security of Grid and Cluster Architectures
Security Visualization
Smartcards
Trust Management Policies
Trust Models
Web Security
Web Services Security
Other CFPs
- International Workshop on Autonomic High Performance Computing (AHPC 2015)
- International Workshop on Parallel/Portfolio Satisfiability Solving (WPSS 2015)
- 6th International Workshop on Modeling and Simulation of Peer-to-Peer and Autonomic Systems (MOSPAS 2015)
- 5th International Workshop on New Algorithms and Programming Models for the Manycore Era (APMM 2015)
- International Workshop on High Performance Platform Management (HPPM 2015)
Last modified: 2015-03-08 15:04:57