(Paper due date extended to Dec. 12, 2008)
[Advanced Program] [General Information] [Scope] [Topics of Interest] [Important Dates] [Submission and Publication] [Organizing Committees]
The SSN workshop will occupy one full day of the International Parallel and Distributed Processing Symposium (IPDPS) 2009. There will be no separate registration for the workshop. All accepted papers will be published in the same printed abstract volume and CD-ROM proceedings as other workshops and the IPDPS 2009 conference by the IEEE Computer Society Press and the IEEE online library.
The proliferation of Internet services and applications is bringing systems and network security issues to the fore. The past few years have seen significant increase in cyber attacks on the Internet, resulting in degraded confidence and trusts in the use of Internet and computer systems. There is an increasing demand for measures to guarantee the privacy, integrity, and availability of resources in distributed systems, such as Grid and P2P systems. The attacks, including DDoS, email virus, and worms, are getting more sophisticated, spreading faster, and causing more damages. The attacks originally exploited the weakness of the individual protocols and operating systems, but now also have started to attack the basic infrastructure of the Internet. There is a consensus that a key contributing factor leading to cyber threats is the lack of integrated and cohesive strategies that extend beyond the network level, to protect the applications and devices at system level as well. Many techniques, algorithms, protocols and tools have been developed in the different aspects of cybersecurity, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems.
This workshop aims to bring together the technologies and researchers who share interest in the area of network and distributed system security. The main purpose is to promote discussions of research and relevant activities in security-related subjects. It also aims at increasing the synergy between academic and industry professionals working in this area.
The workshop seeks papers that address theoretical, experimental, and work in-progress in the area of cybersecurity at the system and network levels. Topics covered by the workshop will include, but are not limited to, the following:
Papers due: |
|
Author notification: |
|
Camera-ready final papers due: |
Feb. 15, 2009 |
Workshop (and IPDPS): |
May 29 (May 25-29), 2009 |
Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submitted manuscripts may not exceed 15 single-spaced pages using 12-point size font on 8.5x11 inch pages, including figures, tables, and references. Please use the standard 1-inch margin. Authors may submit additional material as an appendix to their submission, but there is no guarantee that this material will influence the review process. The final version may have a different format and you may be asked reduce the length of your paper if it is accepted.
We strongly encourage authors to submit papers electronically in PDF format via EDAS. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will register and attend the workshop to present the work.
Each submitted paper will be peer reviewed and the comments will be provided to the authors. The accepted papers will be published in the same printed abstract volume and CD-ROM proceedings as other workshops and the IPDPS 2009 conference by the IEEE Computer Society Press and IEEE online library.
|
|
|
Bin Xiao
|
|
Kevin Butler |
Pennsylvania State University, USA |
|
|
|
|
|
|
Song Fu |
|
|
|
|
|
|
|
|
|
Alex Liu | Michigan State University, USA |
|
|
Gianluigi Me |
Università di Roma "Tor Vergata", Italy |
|
|
|
|
|
|
|
|
|
Gjøvik University College, Norway |
|
|
Wietse Venema | IBM T.J. Watson Research Center, USA |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|