Workshop 10-SHCPS

10th International Workshop on Security and High Performance Computing Systems

(SHPCS 2015)


As part of

The International Conference on High Performance Computing & Simulation (HPCS 2015) or

July 20 – July 24, 2015

The Hilton Amsterdam Hotel

Amsterdam, The Netherlands

(Extended Paper Submission Deadline: April 15, 2015)

Submissions could be for full papers, short papers, poster papers, or posters


Providing high performance computing and security is a challenging task. Internet, operating systems and distributed environments currently suffer from poor security support and cannot resist common attacks. Adding security measures typically degrade performance. This workshop addresses relationships between security, high performance and distributed computing systems in four directions. First, it considers how to add security properties (authentication, confidentiality, integrity, non-repudiation, access control) to high performance computing systems and how they can be formally verified both at design-time (formal verification) and at run-time (run-time verification). In this case, safety properties can also be addressed, such as availability and fault tolerance for high performance computing systems. Second, it addresses vulnerabilities and security threats (and remediation) targeting HPC, grid, cloud and mobile environments. Third, it covers how to use HPC systems to solve security problems. For instance, a grid computation can break an encryption code, a cluster can support high performance intrusion detection or a distributed formal verification system. More generally, this topic addresses every efficient use of a high performance computing systems to improve security. Fourth, it investigates the tradeoffs between maintaining high performance and achieving security in computing systems and solutions to balance the two objectives. In all these directions, various formal analyses, as well as performance analyses or monitoring techniques can be conducted to show the efficiency of a security infrastructure.

The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security related to HPC, distributed, network and mobile environments, as well as case studies and implementation experiences. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems.

The SHPCS Workshop topics of interest include (but are not limited to) the following:

  • Access Control

  • Accounting and Audit

  • Anonymity

  • Applied Cryptography

  • Authentication

  • Mobile Security

  • Commercial and Industry Security

  • Cryptographic Protocols

  • Data and Application Security

  • Data/System Integrity

  • Database Security

  • Digital Rights Management

  • Formal Verification of Secure Systems

  • Identity Management

  • Inference/Controlled Disclosure

  • Information Warfare

  • Intellectual Property Protection

  • Intrusion and Attack Detection

  • Intrusion and Attack Response

  • Key Management

  • Privacy-Enhancing Technology

  • Secure Networking

  • Secure System Design

  • Security Monitoring & Management

  • Security for Mobile Code

  • Security for Specific Domains (e.g., E-Government, E-Business, P2P)

  • Security in IT Outsourcing

  • Security in Mobile and Wireless Networks

  • Security in Untrusted & Adversarial Environments and Systems

  • Security in Operating Systems

  • Security Location Services

  • Security of Grid and Cluster Architectures

  • Security Visualization

  • Smartcards

  • Trust Management Policies

  • Trust Models

  • Web Security

  • Web Services Security


You are invited to submit original and unpublished research works on above and other topics related to Security and HPC in each local and distributed application fields (e.g. Grid, mobile). Submitted papers must not have been published or simultaneously submitted elsewhere. Submission should include a cover page with authors' names, affiliation addresses, fax numbers, phone numbers, and email addresses. Please, indicate clearly the corresponding author and include up to 6 keywords from the above list of topics and an abstract of no more than 400 words. The full manuscript should be at most 8 pages using the two-column IEEE format. Additional pages will be charged additional fee. Short papers (up to 4 pages), poster papers and posters (please refer to for the submission details) will also be accepted for submission. Please include page numbers on all preliminary submissions to make it easier for reviewers to provide helpful comments.

Submit a PDF copy of your full manuscript using the Workshop EasyChair submission link at .

Only PDF files will be accepted, submitted via the link above. Each paper will receive a minimum of three reviews. Papers will be selected based on their originality, relevance, technical clarity and presentation. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop.


Accepted papers will be published in the conference proceedings which will be made available at the time of the meeting. Instructions for final manuscript format and requirements will be posted on the HPCS 2015 Conference web site. It is our intent to have the proceedings formally published in hard and soft copies and be available at the time of the conference. The proceedings is projected to be included in the IEEE Digital Library and indexed in major indexing services accordingly.


Authors of selected papers will be invited to submit an extended version of their work for a special issue in an ISI Journal (the last special issue is going to be published in the Journal of Computer Security (JCS) – IoS Press).

If you have any questions about paper submission or the workshop, please contact the organizers.


Paper Submissions (Extended): --------------------------- April 15, 2015

Acceptance Notification: ----------------------------------- April 30 2015

Camera Ready Papers and Registration Due by: -------- May 14, 2015

Conference Dates: ------------------------------------------ July 20 – 24, 2015


Alessio Merlo

Computer Security Lab (CSecLab)

Department of Informatics, Bioengineering, Robotics, and System Engineering

University of Genoa

Viale F. Causa, 13,

I-16145 Genova, Italy

Phone: +39 010 343 2344

Fax: +39 010 353 2948


Luca Spalazzi

Dipartimento di Ingegneria dell’Informazione

Università Politecnica delle Marche

Via Brecce Bianche

I-60131 Ancona, ITALY, EU

Phone: +39 071 2204829

Fax: +39 071 2204474


Mauro Migliardi

DEI - University of Padua

Via Gradenigo, 6/B, I-35131, Padova, Italy

Phone: +39 328 1003221


International Program Committee*:

All submitted papers will be reviewed by the workshop technical program committee members following similar criteria used in HPCS 2015.

  • Sherenaz W. Al-Haj Baddar, University of Jordan, Jordan

  • Alessandro Armando, FBK-Irst, Trento, Italy

  • Felipe Beato, ESAT/COSIC, KU Leuven, Belgium

  • Mathieu Blanc, Commissariat à l'Energie Atomique (CEA), France

  • Matthias Büchler, Technische Universitat, Munchen, Germany

  • Mauro Conti, University of Padua, Italy

  • Jorge Cuellar, Siemens, Germany

  • Mohammad Torabi Dashti, ETH, Zurich, Switzerland

  • Cristiana Degano, Gruppo Sigla s.r.l., Italy

  • Pierpaolo Degano, University of Pisa, Italy

  • Paolo Gasti, New York Institute of Technology, New York, USA

  • Jean-Francois Lalande, INSA Centre Val de Loire, France

  • David Llewellyn-Jones, Liverpool John Moore’s University, UK

  • Mikhail Nesterenko, Kent State University, Ohio, USA

  • Jose A. Onieva González, Universidad de Málaga, Spain

  • Hassan Peyravi, Kent State University, Ohio, USA

  • Christina Pöpper, Ruhr-University Bochum, Germany

  • Muttukrishnan Rajarajan, City University - London, UK

  • Giovanni Russello, University of Auckland, New Zealand

  • Waleed W. Smari, Ball Aerospace & Technologies Corp., OH, USA

  • Luca Vigano’, King’s College, London, UK

For information or questions about Conference's paper submission, tutorials, posters, workshops, special sessions, exhibits, demos, panels and forums organization, doctoral colloquium, and any other information about the conference location, registration, paper formatting, etc., please consult the Conference’s web site at URL: or or contact one of the Conference's organizers.