Program

9:05 – 10:00 Invited Speakers Session 1 – Trusted Computing

10:00 – 10:30 Coffee Break

10:30 – 11:00 Invited Speakers Session 2 – Trusted Computing

11:00 – 12:00 PhD Defense Replay

12:00 – 12:30 Short Presentations Session 1

  • Verifiable Message-Locked Encryptionpaper / slides
    Sébastien Canard, Fabien Laguillaumie and Marie Paindavoine

12:30 – 14:00 Lunch Break

14:00 – 14:15 Report of the Organizing Committee

14:15 – 15:00 Short Presentations Session 2

  • A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations – paper
    Nesrine Kaaniche, Maryline Laurent and Sébastien Canard
  • Towards Management of Chains of Trust for Multi-Clouds with Intel SGX – paper / slides
    Houssem Kanzari and Marc Lacoste
  • Dynamic Topology Extraction in Cloud Infrastructures
    Pernelle Mensah

15:00 – 15:30 Invited Speakers Session 3 – Data Confidentiality

15:30 – 16:00 Coffee Break

16:00 – 16:30 Short Presentations Session 3

  • AL-SAFE: A Secure Self-Adaptable Application-Level Firewall for IaaS Cloudspaper / slides[pptx]
    Anna Giannakou, Christine Morin, Louis Rilling and Jean-Louis Pazat
  • Including Security Monitoring in Cloud SLApaper / slides
    Amir Teshome Wonjiga, Louis Rilling and Christine Morin

16:30 – 17:00 Invited Speakers Session 4 – Data Confidentiality

17:00 End of SEC2 2016

Comments are closed