Workshop Security Policies in Cloud Environment (PoliCE’2014)
Preliminary Program (pdf)
Wednesday May 14th
Tutorial I - “Verification of Computing Policies and Other Hard Problems“,
Mohamed Gouda, University of Texas at Austin, USA
11:00 – 13:00
Session - Security challenges
Chair: Dr. Mohamed Jmaiel, ENIS, Tunisia.
Modeling an intrusion detection architecture based on MAS with CBR for solving a problem of learning new attacks
Mohssine El Ajjouri, Siham Benhadou and Hicham Medromi.
A proposal approach of detection intrusion in Wireless Sensor Networks
An architecture based on trust for collaborative access control models.
Samira Haguouche and Zahi Jarir
Security Policy Interaction for Collaborative Telediagnosis in the Cloud
Meryeme Ayache, Mohammed Erradi and Bernd Freisleben.
Self-adaptive security for mobiles agents: Using the sensitivity of the services requested by mobile agent and the host’s trust degree
An Extended Role Based Access Control Model With Privacy: Application to E-Health
Yassine Chafik and Ouzzif Mohammed.
12:45 – 14:00
Tutorial II - "Signature-free security: Communication and Agreement in the Presence of Byzantine Processes",
Michel Raynal, INRIA/IRISA, France
Tutorial III - "Mobile and Embedded Security and Privacy",
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, CASED, Germany