CALL FOR PAPERS
Special Issue of the
Journal of Computer Security
on
Security and High Performance Computing Systems
Guest editors:
- Luca Spalazzi (Universit? di Ancona, Italy)
- Luca Vigan? (King's College London, UK)
Editors-in-Chief:
- Prof. Andrew Myers
- Prof. Pierangela Samarati
Paper Submission Deadline: September 15, 2014
SCOPE AND OBJECTIVES
Providing high performance computing and security is a challenging task.
On the one hand, Internet, operating systems and distributed environments
currently suffer from poor security support and cannot resist common
attacks. On the other hand, adding security measures typically degrades
performance. The relationships between security and high performance
computing systems thus raise a number of problems and challenges that are
of interest for this special issue, such as (but not limited to) the
following ones:
1. How to enforce security requirements in high performance computing
systems. For instance, which kind of obfuscation techniques can enforce
privacy in a cloud storage, or how grid security can be verified at
design-time (formal verification) or at run-time (run-time verification).
In this case, safety properties can also be addressed, such as availability
and fault tolerance for high performance computing systems.
2. How to use high performance computing systems to solve security
problems. For instance, a grid computation can break an encryption code,
and a cluster can support high performance intrusion detection or a
distributed formal verification system. More generally, this topic
addresses every efficient use of a high performance computing systems to
improve security.
3. The tradeoffs between maintaining high performance and achieving
security in computing systems and solutions to balance the two objectives.
In all these directions, various formal analyses, as well as performance
analyses or monitoring techniques can be conducted to show the efficiency
of a security infrastructure.
The special issue seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of computer and
network security, as well as case studies and implementation experiences.
Papers should have practical relevance to the construction, evaluation,
application, or operation of secure systems.
The topics of interest include (but are not limited to) the following:
* Access Control
* Accounting and Audit
* Anonymity
* Applied Cryptography
* Authentication
* Cloud Security
* Commercial and Industry Security
* Cryptographic Protocols
* Data and Application Security
* Data/System Integrity
* Database Security
* Digital Rights Management
* Formal Verification of Secure Systems
* Identity Management
* Inference/Controlled Disclosure
* Information Warfare
* Intellectual Property Protection
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Key Management
* Privacy-Enhancing Technology
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security for Mobile Code
* Security for Specific Domains (e.g., E-Government, E-Business, P2P)
* Security in IT Outsourcing
* Security in Mobile and Wireless Networks
* Security in Untrusted & Adversarial Environments and Systems
* Security in Operating Systems
* Security Location Services
* Security of Grid and Cluster Architectures
* Security Visualization
* Smartcards
* Trust Management Policies
* Trust Models
* Web Security
* Web Services Security
PAPER SUBMISSIONS
Authors are requested to submit their manuscript electronically in the form
of a PDF file to the journal?s editorial management system at
http://mstracker.com/submit1. php?jc=jcs.
Submitted papers must not have been published or simultaneously submitted
elsewhere. If the paper is extended from a workshop or conference paper, it
must contain at least 25% new material with "brand" new ideas and results.
The authors should prepare a single PDF file collating:
- A cover letter including authors (names, affiliation addresses, phone
numbers, email addresses), a clear and self-explanatory abstract (no longer
than 200 words), some keywords from the above list of topics, the novel
added value with respect to any previous publications extended by the
manuscript under submission, a clear statement that the paper is intended
for this special issue. Please, also indicate clearly the corresponding
author(s).
- The manuscript under submission.
- Previous papers of which the manuscript being submitted is an extension,
if any.
The full manuscript must be formatted according to the Manuscript
Submission and Author Instruction at
http://www.iospress.nl/ journal/journal-of-computer- security/?tab=submission-of- manuscripts
.
Please, include page numbers on all submissions to make it easier for
reviewers to provide helpful comments.
Each paper will receive a minimum of three reviews. Papers will be
selected based on their originality, contributions, technical clarity and
presentation, language, significance to the readership of the journal,
relevance to the special issue, and quality and significance of research
hypothesis, assertions, and conclusions.
IMPORTANT DATES
Paper Submissions: September 15, 2014
1st Notifications and Reviewers Comments: November 15, 2014
2nd Revision Submission: December 6, 2014
2nd Notifications and Reviewers Comments: January 24, 2014
Revised Camera Ready Papers: February 21, 2015
Accepted papers are expected to appear in the 2nd Quarter of 2015
(Tentative).
GUEST EDITORS
Luca Spalazzi
Dipartimento di Ingegneria dell?Informazione
Universit? Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY
Phone: +39 071 2204829
Fax: +39 071 2204474
Luca Vigan?
Department of Informatics
King?s College London
Strand
London WC2R 2LS, UK
Phone: +44 020 7848 2078
If you have any questions about paper submission or the special issue,
please contact the Guest Editors at the address hpcsec14@gmail.com
Special Issue of the
Journal of Computer Security
on
Security and High Performance Computing Systems
Guest editors:
- Luca Spalazzi (Universit? di Ancona, Italy)
- Luca Vigan? (King's College London, UK)
Editors-in-Chief:
- Prof. Andrew Myers
- Prof. Pierangela Samarati
Paper Submission Deadline: September 15, 2014
SCOPE AND OBJECTIVES
Providing high performance computing and security is a challenging task.
On the one hand, Internet, operating systems and distributed environments
currently suffer from poor security support and cannot resist common
attacks. On the other hand, adding security measures typically degrades
performance. The relationships between security and high performance
computing systems thus raise a number of problems and challenges that are
of interest for this special issue, such as (but not limited to) the
following ones:
1. How to enforce security requirements in high performance computing
systems. For instance, which kind of obfuscation techniques can enforce
privacy in a cloud storage, or how grid security can be verified at
design-time (formal verification) or at run-time (run-time verification).
In this case, safety properties can also be addressed, such as availability
and fault tolerance for high performance computing systems.
2. How to use high performance computing systems to solve security
problems. For instance, a grid computation can break an encryption code,
and a cluster can support high performance intrusion detection or a
distributed formal verification system. More generally, this topic
addresses every efficient use of a high performance computing systems to
improve security.
3. The tradeoffs between maintaining high performance and achieving
security in computing systems and solutions to balance the two objectives.
In all these directions, various formal analyses, as well as performance
analyses or monitoring techniques can be conducted to show the efficiency
of a security infrastructure.
The special issue seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of computer and
network security, as well as case studies and implementation experiences.
Papers should have practical relevance to the construction, evaluation,
application, or operation of secure systems.
The topics of interest include (but are not limited to) the following:
* Access Control
* Accounting and Audit
* Anonymity
* Applied Cryptography
* Authentication
* Cloud Security
* Commercial and Industry Security
* Cryptographic Protocols
* Data and Application Security
* Data/System Integrity
* Database Security
* Digital Rights Management
* Formal Verification of Secure Systems
* Identity Management
* Inference/Controlled Disclosure
* Information Warfare
* Intellectual Property Protection
* Intrusion and Attack Detection
* Intrusion and Attack Response
* Key Management
* Privacy-Enhancing Technology
* Secure Networking
* Secure System Design
* Security Monitoring & Management
* Security for Mobile Code
* Security for Specific Domains (e.g., E-Government, E-Business, P2P)
* Security in IT Outsourcing
* Security in Mobile and Wireless Networks
* Security in Untrusted & Adversarial Environments and Systems
* Security in Operating Systems
* Security Location Services
* Security of Grid and Cluster Architectures
* Security Visualization
* Smartcards
* Trust Management Policies
* Trust Models
* Web Security
* Web Services Security
PAPER SUBMISSIONS
Authors are requested to submit their manuscript electronically in the form
of a PDF file to the journal?s editorial management system at
http://mstracker.com/submit1.
Submitted papers must not have been published or simultaneously submitted
elsewhere. If the paper is extended from a workshop or conference paper, it
must contain at least 25% new material with "brand" new ideas and results.
The authors should prepare a single PDF file collating:
- A cover letter including authors (names, affiliation addresses, phone
numbers, email addresses), a clear and self-explanatory abstract (no longer
than 200 words), some keywords from the above list of topics, the novel
added value with respect to any previous publications extended by the
manuscript under submission, a clear statement that the paper is intended
for this special issue. Please, also indicate clearly the corresponding
author(s).
- The manuscript under submission.
- Previous papers of which the manuscript being submitted is an extension,
if any.
The full manuscript must be formatted according to the Manuscript
Submission and Author Instruction at
http://www.iospress.nl/
.
Please, include page numbers on all submissions to make it easier for
reviewers to provide helpful comments.
Each paper will receive a minimum of three reviews. Papers will be
selected based on their originality, contributions, technical clarity and
presentation, language, significance to the readership of the journal,
relevance to the special issue, and quality and significance of research
hypothesis, assertions, and conclusions.
IMPORTANT DATES
Paper Submissions: September 15, 2014
1st Notifications and Reviewers Comments: November 15, 2014
2nd Revision Submission: December 6, 2014
2nd Notifications and Reviewers Comments: January 24, 2014
Revised Camera Ready Papers: February 21, 2015
Accepted papers are expected to appear in the 2nd Quarter of 2015
(Tentative).
GUEST EDITORS
Luca Spalazzi
Dipartimento di Ingegneria dell?Informazione
Universit? Politecnica delle Marche
Via Brecce Bianche
I-60131 Ancona, ITALY
Phone: +39 071 2204829
Fax: +39 071 2204474
Luca Vigan?
Department of Informatics
King?s College London
Strand
London WC2R 2LS, UK
Phone: +44 020 7848 2078
If you have any questions about paper submission or the special issue,
please contact the Guest Editors at the address hpcsec14@gmail.com
No comments:
Post a Comment