Viewable by the world
Group Access to CLHS
Can VIEW the space: anonymous , 
Can EDIT the space:
Can ADMINISTER the space:
Individual Access to CLHS
Can VIEW the space: [email protected][email protected]
Can EDIT the space: [email protected][email protected]
Can ADMINISTER the space: [email protected][email protected]

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin

...

Section
Column
width30%
Panel

Submission Link:

https://www.easychair.org/conferences/?conf=clhs2013


Questions?  For any questions or problems feel free to contact:

    Scott Campbell [email protected]

    Aashish Sharma [email protected]

 


 

Program Committee

Mine Altunay, Fermi National Accelerator Laboratory

Galen Wesley Arnold, National Center for Supercomputing Applications

David Bailey, Lawrence Berkeley National Lab

RuthAnne Bevier, Caltech

Scott Campbell, National Energy Research Scientific Computing Center

Carrie Gates, CA Technologies

Bill Kramer, National Center for Supercomputing Applications

Alex Malin, Los Alamos National Lab

Jim Marsteller, Pittsburgh Supercomputing Center

Jim Mellander, National Energy Research Scientific Computing Center

Sean Peisert, University of California Davis

Gene Rackow, Argonne National Lab

Aashish Sharma, Lawrence Berkeley National Lab

Robin Sommer, International Computer Science Institute

Von Welch, Indiana University

Column
width80%
Panel

Changing Landscapes in HPC Security 2013 Call For Papers

Co-located with ACM HPDC 2013
New York City, NY, USA -- June 17-21th, 2013

Panel
borderColorblack
bgColorbeige
titleColorblack
borderWidth4
borderStylesolid
titleImportant Dates
borderStylesolid

  Paper submission: February 25th, 2013

Workshop: June 18, 2013

Providing effective and non-intrusive security within a HPC environment provides a number of challenges for both researchers and operational personnel.  What constitutes HPC has expanded to include cloud computing, 100G networking, cross-site integration, and web 2.0 based interfaces for job submission and reporting, increasing the complexity of the aggregate system dramatically.  This growing complexity and it's new issues is set against a backdrop of routine user and application attacks, which remain surprisingly effective over time.

The CLHS workshop will focus on the problems inherent in securing contemporary large-scale compute and storage systems.  To provide some clarification we have broken this out into four general areas or questions.  First is Attribution: who is doing what in terms of process activity and/or network traffic?  Second is looking beyond the interactive nodes: what is going on in the computing pool?  Third involves job scheduler activity and usage: what is being run, how has it is been submitted and is this activity abnormal?  Finally a more philosophical topic of why securing complex systems is so difficult and what can be done about it.  While these specific areas are interesting starting points for papers and presentations, any original and interesting topic will be considered.  For a complete list of information relating to paper submission details, please see the Paper Submission Details section.

Submission Tracks: This year there will be two separate tracks for paper submission. Authors of submitted papers will specify which track they wish to submit their paper to.

Research Papers Track

Besides the general class of problems described in the overview, the following should be considered a set of example topics that we are looking for in the research section track.

    • Accounting and Audit
    • Authentication
    • Cloud Security
    • Data and Application Security
    • Data/System Integrity
    • Database Security
    • Identity Management
    • Intrusion and Attack Detection
    • Intrusion and Attack Response
    • Secure Networking
    • Secure System Design
    • Security Monitoring & Management
    • Security in Untrusted & Adversarial Environments and Systems
    • Security of Grid and Cluster Architectures
    • Security Visualization

Please note that these example topics are in the context of the unique set of problems and difficulties within the HPC space.  We will ask participants in the research paper track to add a section describing in some detail their ongoing and future data needs.  This is principally to help researchers articulate the details of their data oriented needs as well as improving communications between data generators and consumers.

State of the Practice

For the State of of the Practice papers, the focus will be on the resolution of specific issues - ideally those identified in the Overview section, but really any significant problem which is endemic to the HPC domain.  Within the paper an explanation and exploration of the issue, resolution description and a numerical analysis showing that the proposed issue resolution was successful.  Like in the Research Papers track, it would be desirable to add a section on data resources that might be available to researchers - either individually or in larger sets.

Lightning Round!

The final section track will be a combined lightning round and data exchange where workshop participants can share short presentations on interesting but incomplete works as well as describe what data they have to share or need.  For this there will be no need to sign up ahead of time.  As time allows, additional discussions can be arranged.

 

Include Page
GoogleAnalytics
GoogleAnalytics