Abbrevation
SHPCS
City
Madrid
Country
Spain
Deadline Paper
Start Date
End Date
Abstract

Providing high performance computing and security is a challenging task&#046; Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks&#046; Adding security measures typically degrade performance&#046; This workshop addresses relationships between security and high performance computing systems in three directions&#046; First, it considers how to add security properties (authentication, confidentiality, integrity, non&#8211;repudiation, access control) to high performance computing systems&#046; In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems&#046; Second, it covers how to use high performance computing systems to solve security problems&#046; For instance, a grid computation can break an encryption code, or a cluster can support high performance intrusion detection&#046; More generally, this topic addresses every efficient use of a high performance computing systems to improve security&#046; Third, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives&#046; In all these directions, various performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure&#046;<br>The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer and network security, as well as case studies and implementation experiences&#046; Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems&#046;<br>The Workshop topics include (but are not limited to) the following:<br>* Access Control<br>* Accounting and Audit<br>* Anonymity<br>* Applied Cryptography<br>* Authentication<br>* Cloud Security<br>* Commercial and Industry Security<br>* Cryptographic Protocols<br>* Data and Application Security<br>* Data/System Integrity<br>* Database Security<br>* Digital Rights Management<br>* Formal Verification of Secure Systems<br>* Identity Management<br>* Inference/Controlled Disclosure<br>* Information Warfare<br>* Intellectual Property Protection<br>* Intrusion and Attack Detection<br>* Intrusion and Attack Response<br>* Key Management<br>* Privacy&#8211;Enhancing Technology<br>* Secure Networking<br>* Secure System Design<br>* Security Monitoring &amp; Management<br>* Security for Mobile Code<br>* Security for Specific Domains (e&#046;g&#046;, E&#8211;Government, E&#8211;Business, P2P)<br>* Security in IT Outsourcing<br>* Security in Mobile and Wireless Networks<br>* Security in Untrusted &amp; Adversarial Environments and Systems<br>* Security in Operating Systems<br>* Security Location Services<br>* Security of Grid and Cluster Architectures<br>* Security Visualization<br>* Smartcards<br>* Trust Management Policies<br>* Trust Models<br>* Web Security<br>* Web Services Security<br>