posted by user: yacine || 2573 views || tracked by 7 users: [display]

SHPCS 2010 : 5th Workshop on Security and High Performance Computing Systems


When Jun 28, 2010 - Jul 2, 2010
Where Caen, France
Abstract Registration Due Apr 15, 2010
Submission Deadline Feb 28, 2010
Notification Due Mar 20, 2010
Final Version Due Apr 15, 2010
Categories    security

Call For Papers

5th Workshop on Security and High Performance Computing Systems
(SHPCS 2010)


As part of "The International Conference on High Performance Computing &
Simulation - HPCS 2010"
In conjunction with "The 6th International Wireless Communications and
Mobile Computing Conference - IWCMC 2010" (

June 28 - July 2, 2010
Caen, Normandy, France


Providing high performance computing and security is a challenging task.
Internet, operating systems and distributed environments currently
suffer from poor security support and cannot resist common attacks.
Adding security measures typically degrade performance. This workshop
addresses relationships between security and high performance computing
systems in three directions. First, it considers how to add security
properties (authentication, confidentiality, integrity, non-repudiation,
access control) to high performance computing systems. In this case,
safety properties can also be addressed, such as availability and fault
tolerance for high performance computing systems. Second, it covers how
to use high performance computing systems to solve security problems.
For instance, a grid computation can break an encryption code, or a
cluster can support high performance intrusion detection.
More generally, this topic addresses every efficient use of a high
performance computing systems to improve security. Third, it
investigates the tradeoffs between maintaining high performance and
achieving security in computing systems and solutions to balance the two
objectives. In all these directions, various performance analyses or
monitoring techniques can be conducted to show the efficiency of a
security infrastructure.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of computer and
network security, as well as case studies and implementation experiences.
Papers should have practical relevance to the construction, evaluation,
application, or operation of secure systems.

The Workshop topics include (but are not limited to) the following:
* Access Control
* Accounting and Audit
* Anonymity
* Applied Cryptography
* Authentication
* Cloud Security
* Commercial and Industry Security
* Cryptographic Protocols
* Data and Application Security
* Data/System Integrity
* Database Security
* Digital Rights Management
* Formal Verification of Secure Systems
* Identity Management
* Inference/Controlled Disclosure
* Information Warfare
* Intellectual Property Protection
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Key Management
* Privacy-Enhancing Technology
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security for Mobile Code
* Security for Specific Domains (e.g., E-Government, E-Business, P2P)
* Security in IT Outsourcing
* Security in Mobile and Wireless Networks
* Security in Untrusted & Adversarial Environments and Systems
* Security in Operating Systems
* Security Location Services
* Security of Grid and Cluster Architectures
* Security Visualization
* Smartcards
* Trust Management Policies
* Trust Models
* Web Security
* Web Services Security

Submitted papers must not have been published or simultaneously
submitted elsewhere. Submission should include a cover page with
authors' names, affiliation addresses, fax numbers, phone numbers, and
email addresses.
Please, indicate clearly the corresponding author and include up to 6
keywords from the above list of topics and an abstract of no more than
400 words. The full manuscript should be at most 7 pages using the
two-column IEEE format. Additional pages will be charged at additional
fee. Please include page numbers on all submissions to make it easier
for reviewers to provide helpful comments. Submit a PDF copy of your
full manuscript via using the conference web site submission link at:

Only PDF files will be accepted. Each paper will receive a minimum of
three reviews. Papers will be selected based on their originality,
relevance, technical clarity and presentation. Authors of accepted
papers must guarantee that their papers will be registered and presented
at the workshop. Accepted papers will be published in the conference
proceedings which will be made available at the time of the meeting.
If you have any questions about paper submission or the workshop, please
contact the organizer.

Paper Submissions: ------------------------------------- February 28, 2010
Acceptance Notification: ------------------------------- March 20, 2010
Camera Ready Papers and Registration Due: -------------- April 15, 2010

Related Resources

ICMSTTL--EI Compendex and Scopus 2020   2020 The 2nd International Conference on Mathematics, Science and Technology Teaching and Learning (ICMSTTL 2020)--EI Compendex, Scopus
AVC 2020   Advances in Vision Computing: An International Journal
PerIoT 2020   Software Approaches to Improve the Performance of IoT Systems - Applied Sciences (IF 2.217)
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
BDSIC--EI Compendex, Scopus 2020   2020 2nd International Conference on Big-data Service and Intelligent Computation (BDSIC 2020)--EI Compendex, Scopus
BIoT 2020   International Conference on Blockchain and Internet of Things
SBAC-PAD 2020   International Symposium on Computer Architecture and High Performance Computing
CCNET 2020   7th International Conference on Computer Networks & Communications
HP3C--ACM, Ei and Scopus 2020   ACM--2020 4th International Conference on High Performance Compilation, Computing and Communications (HP3C 2020)--Scopus and Ei Compendex
ISSRE 2020   The 31st International Symposium on Software Reliability Engineering