Cybersecurity Collaboratory

2013-2018

Cyberspace Threat Identification, Analysis and Proactive Response

Agenda

Thursday 17, 2013

1:30 PM - 1:45 PM

Opening

1:45PM - 2:15 PM

Authorization Policies for Materialized Views (Sarah Naït Bahloul, Emmanuel Coquery, Mohand-Saïd Hacid)

2:15 PM - 2:45 PM

Challenges of Security Risks in Service-Oriented Architectures (Youakim Badr, Soumya Banerjee)

2:45 PM - 3:15 PM

EEXCESS or the challenge of privacy-preserving quality recommendations (Benjamin Habegger, Nadia Bennani, Elöd Egyed szigmond, Omar Hasan)

3:15 PM - 3:30 PM

Coffee Break

3:30 PM - 4:15 PM

A Self-Stabilizing Algorithm for Maximal p-Star Decomposition of General Graphs (B. Neggazi, V. Turau, M. Haddad, H. Kheddouci)

4:15 PM - 5:00 PM

Applying Digital Rights management to Service systems (Z. Su, Frédérique Biennier, W.F. Ouedraogo)

5:00 PM - 5:45 PM

Adapting the Model Driven Security strategy to generate contextual security policy for multi-cloud systems (W.F. Ouedraogo, Frédérique Biennier, Parisa Ghodous)

Friday 18, 2013

8:30 AM - 9:00 AM

ECGK: An efficient clustering scheme for group key management in MANETs (Kaouther Drira, Hamida Seba, Hamamache Kheddouci)

9:00 AM - 9:30 AM

A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks (Omar Hasan)

9:30 AM - 10:15 AM

A Preventive and Reactive Analysis Security Tool (Mike Valenzuela)

10:30 AM - 11:15 AM

Toward Cloud Security Certification (Ernesto Damiani)

11:15 AM - 12:00 AM

Autonomic Cyber Security: Design, Analysis and Evaluation (Salim Hariri, Jerzy Rosenblit, Youssif Alnashif, Ali Akoglu)

12:00 PM - 1:30 PM

Lunch

1:30 PM - 2:15 PM

Resilient Cloud Services (Hemayamini Kurra)

2:15 PM - 3:00 PM

Robust Byzantine Fault Tolerant State Machine Replication Protocols (Sonia Benmokhtar)

3:00 PM - 3:45 PM

Access control for data integration in presence of data dependencies (Mehdi Haddad, Mohand-Saïd Hacid)

3:45 PM - 4:30 PM

Discussions