see the workshop site:
https://commons.lbl.gov/
for more details.
------------------------------
Call for Papers
Workshop on Changing Landscapes in HPC Security
CLHS13
https://commons.lbl.gov/
in conjunction with ACM HPDC
New York, USA, June 18, 2013
------------------------------
Providing effective and non-intrusive security within a HPC
environment provides a number of challenges for both researchers and
operational personnel. What constitutes HPC has expanded to include
cloud computing, 100G networking, cross-site integration, and web 2.0
based interfaces for job submission and reporting, increasing the
complexity of the aggregate system dramatically. This growing
complexity and it's new issues is set against a backdrop of routine
user and application attacks, which remain surprisingly effective over
time.
The CLHS workshop will focus on the problems inherent in securing
contemporary large-scale compute and storage systems. To provide some
clarification we have broken this out into four general areas or
questions. First is Attribution: who is doing what in terms of
process activity and/or network traffic? Second is looking beyond the
interactive nodes: what is going on in the computing pool? Third
involves job scheduler activity and usage: what is being run, how has
it is been submitted and is this activity abnormal? Finally a more
philosophical topic of why securing complex systems is so difficult
and what can be done about it. While these specific areas are
interesting starting points for papers and presentations, any original
and interesting topic will be considered.
This year there will be two separate tracks for paper submission:
* Research Paper track
* State of the Practice
We will ask participants in the research paper track to add a section
describing in some detail their ongoing and future data needs. This
is principally to help researchers articulate the details of their
data oriented needs, as well as improving communications between data
generators and consumers.
For the State of of the Practice papers, the focus will be on the
resolution of specific issues - ideally those identified in the
Overview section, but really any significant problem which is endemic
to the HPC domain. Within the paper an explanation and exploration of
the issue, resolution description and a numerical analysis showing
that the proposed issue resolution was successful. Like in the
Research Papers track, it would be desirable to add a section on data
resources that might be available to researchers - either individually
or in larger sets.
Complete Information can be found in the CFP:
https://commons.lbl.gov/
- ------------------------------
Important Dates:
Abstract submission: February 4th, 2013 (11:59PM PST)
Paper submission: February 11th, 2013 (11:59PM PST)
Acceptance notification: March 18th, 2013
Final papers due: April 15th, 2013
- ------------------------------
Topics:
* Accounting and Audit
* Authentication
* Cloud Security
* Data and Application Security
* Data/System Integrity
* Identity Management
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security in Untrusted & Adversarial Environments and Systems
* Security of Grid and Cluster Architectures
* Security Visualization
- ------------------------------
Program Committee:
Mine Altunay, Fermi National Accelerator Laboratory
Galen Wesley Arnold, National Center for Supercomputing Applications
David Bailey, Lawrence Berkeley National Lab
RuthAnne Bevier, Caltech
Scott Campbell, National Energy Research Scientific Computing Center
Carrie Gates, CA Technologies
Bill Kramer, National Center for Supercomputing Applications
Alex Malin, Los Alamos National Lab
Jim Marsteller, Pittsburgh Supercomputing Center
Jim Mellander, National Energy Research Scientific Computing Center
Sean Peisert, University of California Davis
Gene Rackow, Argonne National Lab
Aashish Sharma, Lawrence Berkeley National Lab
Robin Sommer, International Computer Science Institute
Von Welch, Indiana University
No comments:
Post a Comment