7th Workshop on Security and High Performance Computing Systems
(SHPCS 2012)

As part of
The International Conference on High Performance Computing & Simulation -
(HPCS 2012)

July 2-6, 2012
Madrid, Spain

SUBMISSION DEADLINE: February 11, 2012

Providing high performance computing and security is a challenging task.
Internet, operating systems and distributed environments currently suffer
from poor security support and cannot resist common attacks.  Adding
security measures typically degrade performance.  This workshop addresses
relationships between security and high performance computing systems in
three directions.

First, it considers how to add security properties (authentication,
confidentiality, integrity, non-repudiation, access control) to high
performance computing systems.  In this case, safety properties can
also be addressed, such as availability and fault tolerance for high
performance computing systems.  Second, it covers how to use high
performance computing systems to solve security problems.  For
instance, a grid computation can break an encryption code, or a
cluster can support high performance intrusion detection. More
generally, this topic addresses every efficient use of a high
performance computing systems to improve security.  Third, it
investigates the tradeoffs between maintaining high performance and
achieving security in computing systems and solutions to balance the
two objectives.  In all these directions, various performance analyses
or monitoring techniques can be conducted to show the efficiency of a
security infrastructure.

The workshop seeks submissions from academia and industry presenting novel
research on all theoretical and practical aspects of computer and network
security, as well as case studies and implementation experiences. Papers
should have practical relevance to the construction, evaluation,
application, or operation of secure systems.

The Workshop topics include (but are not limited to) the following:
* Access Control
* Accounting and Audit
* Anonymity
* Applied Cryptography
* Authentication
* Cloud Security
* Commercial and Industry Security
* Cryptographic Protocols
* Data and Application Security
* Data/System Integrity
* Database Security
* Digital Rights Management
* Formal Verification of Secure Systems
* Identity Management
* Inference/Controlled Disclosure
* Information Warfare
* Intellectual Property Protection
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Key Management
* Privacy-Enhancing Technology
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security for Mobile Code
* Security for Specific Domains (e.g., E-Government, E-Business, P2P)
* Security in IT Outsourcing
* Security in Mobile and Wireless Networks
* Security in Untrusted & Adversarial Environments and Systems
* Security in Operating Systems
* Security Location Services
* Security of Grid and Cluster Architectures
* Security Visualization
* Smartcards
* Trust Management Policies
* Trust Models
* Web Security
* Web Services Security


Submitted papers must not have been published or simultaneously
submitted elsewhere.  Submission should include a cover page with
authors' names, affiliation addresses, fax numbers, phone numbers, and
email addresses.  Please, indicate clearly the corresponding author
and include up to 6 keywords from the above list of topics and an
abstract of no more than 400 words.  The full manuscript should be at
most 7 pages using the two-column IEEE format. Additional pages will
be charged at additional fee.

Please include page numbers on all submissions to make it easier for
reviewers to provide helpful comments.  Submit a PDF copy of your full
manuscript using the submission link at the workshop web page.

Only PDF files will be accepted.  Each paper will receive a minimum of
three reviews.  Papers will be selected based on their originality,
relevance, technical clarity and presentation.  Authors of accepted
papers *** must guarantee *** that their papers will be registered and
presented at the workshop. If you have any questions about paper
submission or the workshop, please contact the organizer.

Accepted papers will be published in the conference proceedings which will
be made available at the time of the meeting.

Authors of selected papers will be invited to submit an extended
version of their work for a special issue in a ISI Journal (the last
special issue is going to be published in the journal of “Future
Generation Computer Systems” - Elsevier).

Paper Submissions: ---------------------------------- February 11, 2012
Acceptance Notification: -------------------------------- March 14, 2012
Camera Ready Papers and Registration Due: -----------------  April 14, 2012


Luca Spalazzi
Dipartimento di Ingegneria dell'Informazione
Università Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY, EU
Phone: 	+39 071 2204829
Fax:  	+39 071 2204474
Email: 	spalazzi@dii.univpm.it

Esma Aïmeur
Département d'Informatique et de Recherche Opérationnelle
Université de Montréal
C.P. 6128, Succ. Centre-Ville,
Montréal H3C 3J7 (QC), Canada
Phone:	+1 (514) 343-6794
Fax: 	+1 (514) 343-5834
Email: 	Aimeur@iro.umontreal.ca

Yacine Zemali
Laboratoire d'Informatique Fondamentale d'Orléans
Université d'Orleans - Ensi de Bourges
10 Boulevard Lahitolle
F-18020 Bourges Cedex, FRANCE, EU
Phone: 	+33 (0)2 48 48 40 94
Fax:  	+33 (0)2 48 48 40 50
Email: 	yacine.zemali@ensi-bourges.fr

International Program Committee:
All submitted papers will be reviewed by the workshop technical
program committee members following similar criteria used in HPCS.

* Jemal H. Abawajy	Deakin University, Australia
* Akshai Aggarwal	University of Windsor, Canada*
* Massimo Benerecetti	Universita degli studi di Napoli "Federico II", Italy*
* Mathieu Blanc	Commissariat à l'Energie Atomique (CEA), France*
* Gianluca Capuzzi	TeamSystem Ancona s.r.l., Italy
* Ioanna Dionysiou University of Nicosia, Cyprus
* Stefan Edelkamp	University of Bremen, Germany*
* Hannes Federrath	University of Hamburg, Germany
* Dieter Hutter	DFKI GmbH, Germany*
* Martin G. Jaatun	SINTEF ICT, Norway
* Jean-Francois Lalande	LIFO, Universite d'Orleans, France
* Alessio Merlo	University of Genoa, Italy
* Jose A. Onieva González	Universidad de Málaga, Spain
* Francesco Pagliarecci	Universita Politecnica delle Marche, Italy
* Josef Pieprzyk	Macquarie University, NSW, Australia*
* Françoise Sailhan Conservatoire National des Arts et Métiers
                              (Cnam), France*
* Waleed Smari	     University of Dayton, USA
* Simone Tacconi	Polizia di Stato, Italy
* Carolyn Talcott	SRI International, USA *
* Soon Tee Teoh	San Jose State University, USA*
* Christian Toinard LIFO, Université d'Orleans, France
* Markus Ullmann	Federal Office for Information Security & University of
	                        Applied Sciences Bonn-Rhine-Sieg, Germany
* Javier Garcia Villalba Complutense University of Madrid, Spain
* Toshihiro Yamauchi Okayama University, Okayama, Japan
* Zonghua Zhang	NICT, Japan*
(* pending acceptance)

If you have any questions about conference paper submission, please
contact Conference Program Chair: Waleed W. Smari, Dept. of Electrical
and Computer Engineering, University of Dayton, 300 College Park,
Dayton, OH 45469-0226, USA, Voice: (937) 681-0098, Fax: (937)
255-4511, Email: smari@arys.org or consult the conference web site at