5th Workshop on Security and High Performance Computing Systems

(SHPCS 2010)







As part of

The International Conference on High Performance Computing & Simulation (HPCS 2010)


In conjunction with

The 6th International Wireless Communications and Mobile Computing Conference (IWCMC 2010)



June 28 – July 2, 2010


Caen, Normandy, France





Extended Full Paper Submission Deadline: February 28, 2010





Providing high performance computing and security is a challenging task.  Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks.  Adding security measures typically degrade performance.  This workshop addresses relationships between security and high performance computing systems in three directions.  First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems.  In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems.  Second, it covers how to use high performance computing systems to solve security problems.  For instance, a grid computation can break an encryption code, or a cluster can support high performance intrusion detection.  More generally, this topic addresses every efficient use of a high performance computing systems to improve security.  Third, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives.  In all these directions, various performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure. 


The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer and network security, as well as case studies and implementation experiences.  Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. 




The Workshop topics include (but are not limited to) the following:

·        Access Control

·        Accounting and Audit

·        Anonymity

·        Applied Cryptography

·        Authentication

·        Cloud Security

·        Commercial and Industry Security

·        Cryptographic Protocols

·        Data and Application Security

·        Data/System Integrity

·        Database Security

·        Digital Rights Management

·        Formal Verification of Secure Systems

·        Identity Management

·        Inference/Controlled Disclosure

·        Information Warfare

·        Intellectual Property Protection

·        Intrusion and Attack Detection

·        Intrusion and Attack Response

·        Key Management

·      Privacy-Enhancing Technology

·      Secure Networking

·      Secure System Design

·      Security Monitoring & Management

·      Security for Mobile Code

·      Security for Specific Domains (e.g., E-Government, E-Business, P2P)

·      Security in IT Outsourcing

·      Security in Mobile and Wireless Networks

·      Security in Untrusted & Adversarial Environments and Systems

·      Security in Operating Systems

·      Security Location Services

·      Security of Grid and Cluster Architectures

·      Security Visualization

·      Smartcards

·      Trust Management Policies

·      Trust Models

·      Web Security

·      Web Services Security







Submitted papers must not have been published or simultaneously submitted elsewhere.  Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses.  Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words.  The full manuscript should be at most 7 pages using the two-column IEEE format.  Additional pages will be charged at additional fee.  Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments.  Submit a PDF copy of your full manuscript via using the conference web site submission link at:   http://leibniz.diiga.univpm.it/~spalazzi/caen/submission/ .     


Only PDF files will be accepted.  Each paper will receive a minimum of three reviews.  Papers will be selected based on their originality, relevance, technical clarity and presentation.  Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop.  Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting. 


If you have any questions about paper submission or the workshop, please contact the organizer. 




Paper Submissions: ----------------------------------------- February 28, 2010

Acceptance Notification: ------------------------------------- March 20, 2010

Camera Ready Papers and Registration Due: ----------- April 15, 2010




Luca Spalazzi

Dipartimento di Ingegneria Informatica, Gestionale e dell'Automazione

Università Politecnica delle Marche

Via Brecce Bianche

I-60131 Ancona, ITALY, EU

Phone:     +39 071 2204829

Fax:         +39 071 2204474

Email:      spalazzi@diiga.univpm.it


Yacine Zemali

Laboratoire d’Informatique Fondamentale d’Orléans

Université d'Orleans - Ensi de Bourges

10 Boulevard Lahitolle

F-18020 Bourges Cedex, FRANCE, EU

Phone:     +33 (0)2 48 48 40 94

Fax:         +33 (0)2 48 48 40 50

Email:       yacine.zemali@ensi-bourges.fr


International Program Committee: 

All submitted papers will be reviewed by the workshop technical program committee members following similar criteria used in HPCS. 


·        Jemal H. Abawajy                       Deakin University, Australia

·        Akshai Aggarwal                         University of Windsor, Canada

·        Massimo Benerecetti                   Universita degli studi di Napoli "Federico II", Italy

·        Gianluca Capuzzi                         TeamSystem Ancona s.r.l., Italy

·        Ioanna Dionysiou                         University of Nicosia, Cyprus 

·        Stefan Edelkamp                         University of Bremen, Germany 

·        Hannes Federrath                        University of Regensburg, Germany 

·        Dieter Hutter                                DFKI GmbH, Germany

·        Martin G. Jaatun                          SINTEF ICT, Norway

·        Jean-Francois Lalande                 LIFO, Universite d'Orleans, France

·        John Mylopoulos                         University of Toronto, Canada

·        Jose A. Onieva                            Universidad de Málaga, Spain

·        Francesco Pagliarecci                  Universita Politecnica delle Marche, Italy

·        Françoise Sailhan                         Conservatoire national des arts et métiers (Cnam), France

·        Waleed Smari                              University of Dayton, USA

·        Willy Susilo                                 University of Wollongong, Australia

·        Toshihiro Tabata                          Okayama University, Okayama, Japan

·        Simone Tacconi                           Polizia di Stato, Italy

·        Carolyn Talcott                            SRI International, USA

·        Soon Tee Teoh                            San Jose State University, USA

·        Christian Toinard                         LIFO, Université d'Orleans, France

·        Javier Garcia Villalba                   Complutense University of Madrid, Spain

·        Zonghua Zhang                            NICT, Japan



If you have any questions about conference paper submission, please contact Conference Program Chair:  Waleed W. Smari, Dept. of Electrical and Computer Engineering, University of Dayton, 300 College Park, Dayton, OH 45469-0226, USA, Voice: (937) 681-0098, Fax: (937) 255-4511, Email: smari@arys.org or consult the conference web site at http://cisedu.us/cis/hpcs/10/main/callForPapers.jsp.