Workshop on Security and High Performance Computing Systems

 As part of
The International Conference on High Performance Computing & Simulation

and in conjunction with
The 5th International Wireless Communications and Mobile Computing Conference (IWCMC 2009)

 Leipzig, Germany
June 21 - 24, 2009

(Submission Deadline: MArch 16, 2009)

Brief Description:
Providing high performance computing and security is a challenging task.  Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks.  Adding security measures typically degrade performance.  This workshop addresses relationships between security and high performance systems in three directions.  First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems.  In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems.  Second, it covers how to use high performance computing systems to solve security problems.  For instance, a grid computation can break an encryption code, or a cluster can support high performance intrusion detection.  More generally, this topic addresses every efficient use of a high performance computing system to improve security.  Third, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives.  In all these directions, various performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of computer and network security, as well as case studies and implementation experiences.  Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. 


This workshop covers (but is not limited to) the following topics:

  • Access Control
  • Accounting and Audit
  • Anonymity
  • Applied Cryptography
  • Authentication
  • Commercial and Industry Security
  • Cryptographic Protocols
  • Data and Application Security
  • Data/System Integrity
  • Database Security
  • Digital Rights Management
  • Formal Verification of Secure Systems
  • Identity Management
  • Inference/Controlled Disclosure
  • Information Warfare
  • Intellectual Property Protection
  • Intrusion and Attack Detection
  • Intrusion and Attack Response
  • Key Management
  • Privacy-Enhancing Technology
  • Secure Networking
  • Secure System Design
  • Security Monitoring & Management
  • Security for Mobile Code
  • Security for Specific Domains (e.g., E-Government, E-Business, P2P)
  • Security in IT Outsourcing
  • Security in Mobile and Wireless Networks
  • Security in Untrusted & Adversarial Environments and Systems
  • Security in Operating Systems
  • Security Location Services
  • Security of Grid and Cluster Architectures
  • Security Visualization
  • Smartcards
  • Trust Management Policies
  • Trust Models

Paper Submissions:
Submitted papers must not have been published or simultaneously submitted elsewhere.  Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses.  Please, indicate clearly the corresponding author and include up to 6 keywords from the above list and an abstract of no more than 350 words.  The full manuscript should be at most 7 pages using the two-column IEEE format.  Additional pages will be charged additional fee.  Please include page numbers on all submissions to make it easier for reviewers to provide helpful comments.  All submissions should be appropriately anonymized (i.e., papers should not contain author names, affiliations, or obvious citations).  Please, submit a PDF copy of your full manuscript using the conference web site submission link at:

Only PDF files will be accepted.  Each paper will receive a minimum of three reviews.  Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.  Initial selection will be based on full papers.  Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop.  Accepted papers will be published in the conference proceedings which will be available at the time of the meeting.

If you have any questions about paper submission or the workshop, please contact the organizers.

Important Dates:

Paper Submissions   March 16, 2009
Acceptance Notification   March 30, 2009
Camera Ready Papers and Registration Due         April 24, 2009

Workshop Organizers:

Ratan Kumar Guha
School of Electrical Engineering and Computer Science,
University of Central Florida,
4000 Central Florida Blvd.,
Orlando, FL 32816, USA
Phone:    +1 (407) 823 2956
Fax:        +1 (407) 823 5419

Luca Spalazzi
Dipartimento di Ingegneria Informatica, Gestionale e dell'Automazione
Università Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY, EU
Phone:    +39 071 2204829
Fax:        +39 071 2204474

Workshop Program Committee:

Jemal H. Abawajy          Deakin University, Australia
Akshai Aggarwal   University of Windsor, Canada
Massimo Benerecetti   Università degli studi di Napoli "Federico II", Italy
Bharat Bhargava   Purdue University, U.S.A.
Gianluca Capuzzi   Università Politecnica delle Marche, Italy
Ioanna Dionysiou   University of Nicosia, Cyprus
Dieter Hutter   DFKI GmbH, Germany
Martin G. Jaatun   SINTEF ICT, Norway
Jean-Francois Lalande   LIFO, Université d'Orleans, France
Mark Manulis   Université Catholique de Louvain, Belgium
Gianluigi Me   University of Rome "Tor Vergata", Italy
John Mylopoulos   University of Toronto, Canada
Jose A. Onieva   Universidad de Málaga, Spain
Francesco Pagliarecci   Università Politecnica delle Marche, Italy
Alexander Pretschner   ETH Zurich, Switzerland
Françoise Sailhan   Conservatoire National des Arts et Métiers (CNAM), France
Damien Sauveron   University of Limoges - CNRS UMR 6172, France
Waleed W. Smari   University of Dayton, USA
Willy Susilo   University of Wollongong, Australia
Toshihiro Tabata   Okayama University, Japan
Simone Tacconi   Polizia di Stato, Italy
Carolyn Talcott   SRI International, USA
Soon Tee Teoh   San Jose State University, USA
Christian Toinard   LIFO, Universite d'Orleans, France
Luis Javier Garcia Villalba   Universidad Complutense de Madrid, Spain
Zonghua Zhang   INRIA, IRCICA, Villeneuve d'Ascq, France

For information or questions about the workshop and the paper submission procedure, please contact the Workshop organizers.

If you have any questions about conference paper submission, please contact Conference Program Chair:  Waleed W. Smari, Dept. of Electrical and Computer Engineering, University of Dayton, 300 College Park, Dayton, OH 45469-0226, USA,  Voice: (937) 229-2795,  Fax: (937) 229-4529,  Email: or consult the conference web site at

For information about the IWCMC conference in general, please contact the General Chair: Mohsen Guizani, (Western Michigan University, The IWCMC Conference web site is at