First Franco American Workshop On CyberSecurity

First Franco-American Workshop on CyberSecurity
October 17-18, 2013, Lyon, France, Campus Scientifique de la Doua Bâtiment Nautibus, Salle de réunion, 2ème étage
Project PUF1

Thursday 17, 2013
1:30 PM – 1:45 PM Opening
 
1:45PM – 2:15 PM Authorization Policies for Materialized Views (Sarah Naït Bahloul, Emmanuel Coquery, Mohand-Saïd Hacid)
 
2:15 PM – 2:45 PM Challenges of Security Risks in Service-Oriented Architectures (Youakim Badr, Soumya Banerjee)
 
2:45 PM – 3:15 PM EEXCESS or the challenge of privacy-preserving quality recommendations (Benjamin Habegger, Nadia Bennani, Elöd Egyed szigmond, Omar Hasan)
 
3:15 PM – 3:30 PM Coffee Break
 
3:30 PM – 4:15 PM A Self-Stabilizing Algorithm for Maximal p-Star Decomposition of General Graphs (B. Neggazi, V. Turau, M. Haddad, H. Kheddouci)
 
4:15 PM – 5:00 PM Applying Digital Rights management to Service systems (Z. Su, Frédérique Biennier, W.F. Ouedraogo)
 
5:00 PM – 5:45 PM Adapting the Model Driven Security strategy to generate contextual security policy for multi-cloud systems (W.F. Ouedraogo, Frédérique Biennier, Parisa Ghodous)

 

Friday 18, 2013
8:30 AM – 9:00 AM ECGK: An efficient clustering scheme for group key management in MANETs (Kaouther Drira, Hamida Seba, Hamamache Kheddouci)
 
9:00 AM – 9:30 AM A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks (Omar Hasan)
 
9:30 AM – 10:15 AM Toward Cloud Security Certification (Ernesto Damiani)
 
10:30 AM – 11:15 AM Autonomic Cyber Security: Design, Analysis and Evaluation (Salim Hariri, Jerzy Rosenblit, Youssif Alnashif, Ali Akoglu)
 
11:15 AM – 12:00 AM A Preventive and Reactive Analysis Security Tool (Mike Valenzuela)
 
12:00 PM – 1:30 PM Lunch
 
1:30 PM – 2:15 PM Resilient Cloud Services (Hemayamini Kurra)
 
2:15 PM – 3:00 PM Robust Byzantine Fault Tolerant State Machine Replication Protocols (Sonia Benmokhtar)
 
3:00 PM – 3:45 PM An Intelligence Analyst’s Preventive Security Tool for Cybersecurity (Michael Valenzuela)
 
3:45 PM – 4:30 PM Access control for data integration in presence of data dependencies (Mehdi Haddad, Mohand-Saïd Hacid)
 
4:30 PM – 5:30 PM Discussions

1Cybersecurity Collaboratory: Cyberspace Threat Identification, Analysis and Proactive Response
Tags: