|
Cybersecurity Collaboratory
2013-2018
Cyberspace Threat Identification, Analysis and Proactive Response
|
|
Agenda
Thursday 17, 2013 |
1:30 PM - 1:45 PM |
Opening |
1:45PM - 2:15 PM |
Authorization Policies for Materialized Views (Sarah Naït Bahloul, Emmanuel Coquery, Mohand-Saïd Hacid) |
2:15 PM - 2:45 PM |
Challenges of Security Risks in Service-Oriented Architectures (Youakim Badr, Soumya Banerjee) |
2:45 PM - 3:15 PM |
EEXCESS or the challenge of privacy-preserving quality recommendations (Benjamin Habegger, Nadia Bennani, Elöd Egyed szigmond, Omar Hasan) |
3:15 PM - 3:30 PM |
Coffee Break |
3:30 PM - 4:15 PM |
A Self-Stabilizing Algorithm for Maximal p-Star Decomposition of General Graphs (B. Neggazi, V. Turau, M. Haddad, H. Kheddouci) |
4:15 PM - 5:00 PM |
Applying Digital Rights management to Service systems (Z. Su, Frédérique Biennier, W.F. Ouedraogo) |
5:00 PM - 5:45 PM |
Adapting the Model Driven Security strategy to generate contextual security policy for multi-cloud systems (W.F. Ouedraogo, Frédérique Biennier, Parisa Ghodous) |
Friday 18, 2013 |
8:30 AM - 9:00 AM |
ECGK: An efficient clustering scheme for group key management in MANETs (Kaouther Drira, Hamida Seba, Hamamache Kheddouci) |
9:00 AM - 9:30 AM |
A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks (Omar Hasan) |
9:30 AM - 10:15 AM |
A Preventive and Reactive Analysis Security Tool (Mike Valenzuela) |
10:30 AM - 11:15 AM |
Toward Cloud Security Certification (Ernesto Damiani) |
11:15 AM - 12:00 AM |
Autonomic Cyber Security: Design, Analysis and Evaluation (Salim Hariri, Jerzy Rosenblit, Youssif Alnashif, Ali Akoglu) |
12:00 PM - 1:30 PM |
Lunch |
1:30 PM - 2:15 PM |
Resilient Cloud Services (Hemayamini Kurra) |
2:15 PM - 3:00 PM |
Robust Byzantine Fault Tolerant State Machine Replication Protocols (Sonia Benmokhtar) |
3:00 PM - 3:45 PM |
Access control for data integration in presence of data dependencies (Mehdi Haddad, Mohand-Saïd Hacid) |
3:45 PM - 4:30 PM |
Discussions |