Workshop Security Policies in Cloud Environment (PoliCE’2014)

Preliminary Program (pdf)

Wednesday May 14th

08:00

Registration

09:00

Tutorial I - Verification of Computing Policies and Other Hard Problems“,

Mohamed Gouda, University of Texas at Austin, USA

10:30

Break

11:00 – 13:00

Session - Security challenges

Chair: Dr. Mohamed Jmaiel,  ENIS, Tunisia.

Modeling an intrusion detection architecture based on MAS with CBR for solving a problem of learning new attacks

Mohssine El Ajjouri, Siham Benhadou and Hicham Medromi.

 

A proposal approach of detection intrusion in Wireless Sensor Networks

 

 

An architecture based on trust for collaborative access control models.

Samira Haguouche and Zahi Jarir

 

Security Policy Interaction for Collaborative Telediagnosis in the Cloud

Meryeme Ayache, Mohammed Erradi and Bernd Freisleben. 

 

Self-adaptive security for mobiles agents: Using the sensitivity of the services requested by mobile agent and the host’s trust degree

 

 

An Extended Role Based Access Control Model With Privacy: Application to E-Health

Yassine Chafik and Ouzzif Mohammed. 

 

12:45 – 14:00

Lunch

14:00

Tutorial II - "Signature-free security: Communication and Agreement in the Presence of  Byzantine Processes",

Michel Raynal, INRIA/IRISA, France

15:30

Break

16:00

Tutorial III - "Mobile and Embedded Security and Privacy",

Ahmad-Reza Sadeghi, Technische Universität Darmstadt, CASED, Germany

Closing