First Franco American Workshop On CyberSecurity
First Franco-American Workshop on CyberSecurity
October 17-18, 2013, Lyon, France, Campus Scientifique de la Doua Bâtiment Nautibus, Salle de réunion, 2ème étage
Project PUF1
Thursday 17, 2013
1:30 PM – 1:45 PM | Opening |
|
|
1:45PM – 2:15 PM | Authorization Policies for Materialized Views (Sarah Naït Bahloul, Emmanuel Coquery, Mohand-Saïd Hacid) |
|
|
2:15 PM – 2:45 PM | Challenges of Security Risks in Service-Oriented Architectures (Youakim Badr, Soumya Banerjee) |
|
|
2:45 PM – 3:15 PM | EEXCESS or the challenge of privacy-preserving quality recommendations (Benjamin Habegger, Nadia Bennani, Elöd Egyed szigmond, Omar Hasan) |
|
|
3:15 PM – 3:30 PM | Coffee Break |
|
|
3:30 PM – 4:15 PM | A Self-Stabilizing Algorithm for Maximal p-Star Decomposition of General Graphs (B. Neggazi, V. Turau, M. Haddad, H. Kheddouci) |
|
|
4:15 PM – 5:00 PM | Applying Digital Rights management to Service systems (Z. Su, Frédérique Biennier, W.F. Ouedraogo) |
|
|
5:00 PM – 5:45 PM | Adapting the Model Driven Security strategy to generate contextual security policy for multi-cloud systems (W.F. Ouedraogo, Frédérique Biennier, Parisa Ghodous) |
Friday 18, 2013
8:30 AM – 9:00 AM | ECGK: An efficient clustering scheme for group key management in MANETs (Kaouther Drira, Hamida Seba, Hamamache Kheddouci) |
|
|
9:00 AM – 9:30 AM | A Privacy Preserving Prediction-based Routing Protocol for Mobile Delay Tolerant Networks (Omar Hasan) |
|
|
9:30 AM – 10:15 AM | Toward Cloud Security Certification (Ernesto Damiani) |
|
|
10:30 AM – 11:15 AM | Autonomic Cyber Security: Design, Analysis and Evaluation (Salim Hariri, Jerzy Rosenblit, Youssif Alnashif, Ali Akoglu) |
|
|
11:15 AM – 12:00 AM | A Preventive and Reactive Analysis Security Tool (Mike Valenzuela) |
|
|
12:00 PM – 1:30 PM | Lunch |
|
|
1:30 PM – 2:15 PM | Resilient Cloud Services (Hemayamini Kurra) |
|
|
2:15 PM – 3:00 PM | Robust Byzantine Fault Tolerant State Machine Replication Protocols (Sonia Benmokhtar) |
|
|
3:00 PM – 3:45 PM | An Intelligence Analyst’s Preventive Security Tool for Cybersecurity (Michael Valenzuela) |
|
|
3:45 PM – 4:30 PM | Access control for data integration in presence of data dependencies (Mehdi Haddad, Mohand-Saïd Hacid) |
|
|
4:30 PM – 5:30 PM | Discussions |
1Cybersecurity Collaboratory: Cyberspace Threat Identification, Analysis and Proactive Response