征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

Providing high performance computing and security is a challenging task.  Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks.  Adding security measures typically degrade performance.  This workshop addresses relationships between security, high performance and distributed computing systems in four directions.  First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems.  Second, it addresses vulnerabilities and security threats (and remediation) targeting HPC, grid, cloud and mobile environments. Third, it covers how to use HPC systems to solve security problems.  For instance, a grid computation can break an encryption code, a cluster can support high performance intrusion detection or a distributed formal verification system. More generally, this topic addresses every efficient use of a high performance computing systems to improve security.  Fourth, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various formal analyses, as well as performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure. 

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences.  Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. 

征稿信息

征稿范围

The SHPCS Workshop topics of interest include (but are not limited to) the following:  

  • Access Control

  • Accounting and Audit

  • Anonymity

  • Applied Cryptography

  • Authentication

  • Mobile Security

  • Commercial and Industry Security

  • Cryptographic Protocols

  • Data and Application Security

  • Data/System Integrity

  • Database Security

  • Digital Rights Management

  • Formal Verification of Secure Systems

  • Identity Management

  • Inference/Controlled Disclosure

  • Information Warfare

  • Intellectual Property Protection

  • Intrusion and Attack Detection

  • Intrusion and Attack Response

  • Key Management

  • Privacy-Enhancing Technology

  • Secure Networking

  • Secure System Design

  • Security Monitoring & Management

  • Security for Mobile Code

  • Security for Specific Domains (e.g., E-Government, E-Business, P2P)

  • Security in IT Outsourcing

  • Security in Mobile and Wireless Networks

  • Security in Untrusted & Adversarial Environments and Systems

  • Security in Operating Systems

  • Security Location Services

  • Security of Grid and Cluster Architectures

  • Security Visualization

  • Smartcards

  • Trust Management Policies

  • Trust Models

  • Web Security

  • Web Services Security

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    07月18日

    2016

    07月22日

    2016

  • 07月22日 2016

    注册截止日期

联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询