Please accept our apologies if you receive multiple copies of this CFP.
=====================================================================
Workshop on Grid Security & Privacy 2005 - Call for Papers
September 2005
Athens, Greece
Held at SecureComm (http://www.securecomm.org/)
Workshop Website: http://gipse.cse.nd.edu/GSP
Scope:
Until recently, application developers could often assume a target
environment that was homogeneous, reliable, secure, and centrally
managed. However, with the advent of collaborative computing and data
sharing, more and more new modes of interaction have evolved resulting
in the need and use of distributed resources for large-scale scientific
research. Work within this community has led to the development of Grid
technologies, which address precisely these problems and which are
seeing widespread and successful adoption for scientific and enterprise
computing. In grid computing, heterogeneous resources distributed
geographically are virtualized as a unified whole. Grid computing, as a
result, provides enormous opportunity in terms of resource sharing,
maximization of resource utilization and virtualization of resources.
Because of its immense potential, not only the scientific community, but
also the enterprise IT communities are excited about the prospect of
grid computing. However, researchers and developers of grid computing
are worried about the possible security issues and implication of
wide-spread use of grid computing. Since, grid computing involves
running of applications in diverse environments, different types of
security issues arise. The goal of the Workshop on Grid Security and
Privacy 2005 is to have a profound understanding of the security issues,
counter measures and research problems that exist in the realm of grid
computing through the sharing of ideas. To achieve this goal, this
workshop solicits original, previously unpublished research
contributions on (but not restricted to) the following subject categories:
* Secure algorithms and protocols over grid
* Grid Sandboxing Techniques
* Policy mapping and virtualization techniques over grid
* Grid Intrusion Detection techniques
* Secure grid solutions and its applications
* Obfuscation and privacy mechanisms over grid
* Grid based auditing techniques
Submission of Papers :
Authors are invited to submit complete and original papers. Papers to be
submitted should not have been previously published in another forum,
and should not be currently under review by another journal or
conference. All submitted papers will be refereed for quality,
correctness, originality and relevance. An accepted paper must be
presented by one of the authors at the workshop venue. These accepted
papers will be published as part of the SecureComm conference
proceedings via CD-ROM. All manuscripts must be limited to 10 pages with
font size 11 in standard IEEE camera ready format (double column). The
Program Committee reserves the right to decline without review any
papers that exceed these length specifications. Submissions also must
include the title, author(s) and affiliation, e-mail address, fax/phone
numbers and postal address. In case of multiple authors, indicate which
author is responsible for correspondence and preparing the camera ready
paper for the proceedings. Electronic submission is required via ps or pdf.
Important Dates:
Paper Submission: April 1, 2005
Notification: May 23, 2005
Camera-Ready: June 10, 2005 (Absolute deadline)
Please contact the workshop co-chairs with any questions.
Dr. Anirban Chakrabarti
Software Engineering and Technology Labs (SETLabs)
Infosys Technologies
Dr. Aaron Striegel
Dept. of Computer Science & Engineering
University of Notre Dame
|