posted by user: scampbell_lbl_gov || 2943 views || tracked by 2 users: [display]

CLHS 2015 : Second Workshop on the Changing Landscape in HPC Security

FacebookTwitterLinkedInGoogle

Link: https://commons.lbl.gov/display/CLHS/CLHS+2015
 
When Jun 15, 2015 - Jun 15, 2015
Where Portland, OR, USA
Submission Deadline Mar 6, 2015
Categories    HPC   computer security   network security   intrusion detection
 

Call For Papers

Second Workshop on the Changing Landscape in HPC Security, 2015
Co-located with ACM HPDC June 15-16, Portland, OR, USA


The intention of this workshop is to provide an arena for researchers
and practitioners to share their recent advances in HPC security, to
learn from one another, and to provide a vehicle for grassroots
communication between these two communities regarding their respective
data and theory needs.

Important dates:

Paper Submission Due: March 06, 2015
Notification of Acceptance: March 20, 2015
Camera Ready Version Due: April 1, 2015
Workshop: June 16, 2015

Overview:

As user needs drive technological and organizational changes, providing
effective and non-intrusive security within a HPC environment provides a
number of challenges for both researchers and operational personnel.
While the complexity of the aggregate system increases dramatically, the
need for timely and accurate decision making about user activity remains
unchanged. This growing complexity is balanced against a backdrop of
routine user and application attacks, which remain surprisingly
effective over time.

This workshop will focus on the problems inherent in securing
contemporary large-scale compute and storage systems. In particular we
are looking at the unusual ecosystem that HPC provides - what makes it
different than other large scale distributed computing environments and
how this has driven how, where and why security is done. In addition we
want to address the problem of high noise, low value attacks in the
overall design and implementation of security services. What can be
done to increase the effectiveness of attack detection when you are not
just looking for scanners, IRC bots and spam relays?

While these specific areas are interesting starting points for papers
and presentations, any original and interesting topic will be considered.

Web Site:
https://commons.lbl.gov/display/CLHS/CLHS+2015

Workshop Format and Topics

The format of the workshop will be a combination of research/state of
the art papers, as well as discussion sections where specific topics
will be brought up. This format is intentional as to provide the
maximum opportunity for communication between researchers and analysts.

Besides the general class of problems described in the overview, we
invite the submission of original work that is related to the topics
below. The papers can be either short (4 pages) position papers, or long
(8 pages) research papers.

Accounting and Audit
Authentication
Cloud Security
Data and Application Security
Data/System Integrity
Database Security
Identity Management
Intrusion and Attack Detection
Intrusion and Attack Response
Secure Networking
Secure System Design
Security Monitoring & Management
Security in Untrusted & Adversarial Environments and Systems
Security of Grid and Cluster Architectures
Security Visualization

Please note that these example topics are in the context of the unique
set of problems and difficulties within the HPC space.

For the State of of the Practice papers, the focus will be on the
resolution of specific issues - ideally those identified in the Overview
section, but really any significant problem which is endemic to the HPC
domain. Within the paper an explanation and exploration of the issue,
resolution description and a numerical analysis showing that the
proposed issue resolution was successful.

In addition to the paper presentations, there will be one or two
discussion sessions as well.

Submission instructions:

Authors are invited to submit papers with unpublished, original work of
not more than 8 pages of double column text using single spaced 10 point
size on 8.5 x 11 inch pages (including all text, figures, and
references), as per ACM 8.5 x 11 manuscript guidelines (document
templates can be found at
http://www.acm.org/sigs/publications/proceedings-templates). Papers will
be peer-reviewed, and accepted papers will be published in the workshop
proceedings as part of the ACM digital library.

Submission site for papers is
https://easychair.org/conferences/?conf=clhs2015

Organizers

Scott Campbell, National Energy Research Scientific Computing Center
(NERSC), LBNL, USA
Adam Slagell, National Center for Supercomputing Applications
(NCSA), USA

Programme Committee

TBD

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
ICCX 2024   CFP: 'The Human and the Machine: AI and the Changing World'
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CSEIT 2024   11th International Conference on Computer Science, Engineering and Information Technology
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
WiMoNe 2024   16th International Conference on Wireless & Mobile Networks
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
NeTCoM 2024   16th International Conference on Networks & Communications