Workshop Security Policies in Cloud Environment (POLICE’2013)


Download POLICE'2013 Program

Wednesday May 1rst

17:00 – 20:00

Registration (in the lobby of Kenzy-Farah Hotel)

Thursday May 2nd

08:00 – 08:30

Registration (near the conference room)

08:30 – 08:45

Workshops Opening Session

08:45 – 10:15

Tutorial I - “The Distributed Foundations of Data Management in the Cloud“, Amr El Abbadi, UCSB, USA

10:15 – 10:45

Coffee Break

10:45 – 12:45

Session I - Security policies in the Cloud

Chair: Anis Charfi.


Ensuring Security and Privacy in a Collaborative E-health System Based on Online Social Network

Yahya Benkaouz, Mohammed Erradi


Toward State of Art: B-based Formal Specifications and security challenges in the cloud

Meryeme Ayache and Mohammed Erradi.


Data Security In The Multi-Clouds

Almokhtar Ait Elmrabti, Anas Abou El Kalam and Abdellah Ait Ouahman.


Security Policies Management in Heteregonous Cloud Environment

Sara Najam, Mohammed Ouzzif and Mohamed Erradi.


Distributed Cloud Intrusion Detection and Prevention System

Mohamed Hassani, Adil Lebbat, Saida Tallal and Hicham Medromi.


A new approach to optimize power consumption in Cloud architectures

Nawfal Madani, Adil Lebbat, Saida Tallal and Hicham Medromi. 


12:45 – 14:00


14:00 – 15:30

Tutorial II - “Modern Trends in High-Performance Computing“,

Mootaz Elnnozahy, KAUST, KSA

15:30 – 16:00

Coffee Break

16:00 – 18:00

Session II - Security challenges in the Cloud

Chair: A. H. Kacem.


Policy Management as a Service in a Collaborative Environment

Mohamed Amine Madani and Mohammed Erradi. 


Specification and Enforcement of Security Policies in Business Processes

Anis Charfi and Haolin Zhi.


A Survey on Software Projects Risk Assessment Models

Ziad S. Al Robieh, B. Ahmed and N. kasmi


A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms

Lemoudden Mouaad, Ben Bouazza Naoufal, El Ouahidi Bouabid and Bourget Daniel.


A Survey on VANET Intrusion Detection Systems

Erritali Mohammed and El Ouahidi Bouabid.


Mitigation Black Hole attack in MANET by Extending Network Knowledge

Hicham Zougagh, Ahmed Toumanari, Rachid Latif and Noureddine Idboufker.


An accountable Architecture for Cloud Computing

H. Elham, A. Lebbat, S. Tallal, H. Medromi