

{"id":110,"date":"2016-06-23T17:39:37","date_gmt":"2016-06-23T15:39:37","guid":{"rendered":"https:\/\/sec2-2016.inria.fr\/?page_id=110"},"modified":"2016-10-06T12:50:21","modified_gmt":"2016-10-06T10:50:21","slug":"english-program","status":"publish","type":"page","link":"https:\/\/sec2-2016.inria.fr\/en\/english-program\/","title":{"rendered":"Program"},"content":{"rendered":"<p><\/p>\n<h2 class=\"breadcrumbs\">9:00 \u2013 9:05 Introduction<\/h2>\n<h2>9:05 \u2013 10:00 Invited Speakers Session 1 \u2013 Trusted Computing<\/h2>\n<ul>\n<li><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/10\/totel-presentation.pdf\" target=\"_blank\"><strong>Anomaly Based Intrusion Detection in Distributed Applications without Global Clock<\/strong><\/a><br \/>\n\u00c9ric Totel<\/li>\n<li><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/kurmus-presentation.pdf\" target=\"_blank\"><strong>Approaches to Container Isolation in the Cloud via Kernel Attack Surface Reduction<\/strong><\/a><br \/>\nAnil Kurmus<\/li>\n<\/ul>\n<h2>10:00 \u2013 10:30 Coffee Break<\/h2>\n<h2>10:30 \u2013 11:00 Invited Speakers Session 2 \u2013 Trusted Computing<\/h2>\n<ul>\n<li><strong><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/10\/onen-presentation.pdf\" target=\"_blank\">Verifiability for Cloud Storage and Computation<\/a>\u00a0<\/strong>&#8211;\u00a0<a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/onen-presentation.pptx\" target=\"_blank\">pptx<\/a><br \/>\nMelek \u00d6nen<\/li>\n<\/ul>\n<h2>11:00 \u2013 12:00 PhD Defense Replay<\/h2>\n<ul>\n<li>\n<p xml:lang=\"fr\"><strong><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/lefray-presentation.pdf\" target=\"_blank\">Security for Virtualized Distributed Systems: from Modelization to Deployment<\/a><br \/>\n<\/strong>Arnaud Lefray<strong><br \/>\n<\/strong><\/p>\n<\/li>\n<\/ul>\n<h2>12:00 \u2013 12:30 Short Presentations Session 1<\/h2>\n<ul>\n<li><strong>Verifiable Message-Locked Encryption<\/strong> &#8211; <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/paindavoine-paper.pdf\" target=\"_blank\">paper<\/a> \/ <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/paindavoine-presentation.pdf\" target=\"_blank\">slides<\/a><br \/>\nS\u00e9bastien Canard, Fabien Laguillaumie and\u00a0Marie Paindavoine<\/li>\n<\/ul>\n<h2>12:30 \u2013 14:00 Lunch Break<\/h2>\n<h2>14:00 \u2013 14:15 Report of the Organizing Committee<\/h2>\n<h2>14:15 \u2013 15:00 Short Presentations Session 2<\/h2>\n<ul>\n<li><strong>A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations<\/strong>\u00a0&#8211; <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/kaaniche-paper.pdf\" target=\"_blank\">paper<\/a><br \/>\nNesrine Kaaniche, Maryline Laurent and S\u00e9bastien Canard<\/li>\n<li><strong>Towards Management of Chains of Trust for Multi-Clouds with Intel SGX<\/strong>\u00a0&#8211; <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/kanzari-paper.pdf\" target=\"_blank\">paper<\/a>\u00a0\/ <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/kanzari-presentation.pdf\" target=\"_blank\">slides<\/a><br \/>\nHoussem Kanzari and\u00a0Marc Lacoste<\/li>\n<li><strong>Dynamic Topology Extraction in Cloud Infrastructures<\/strong><br \/>\nPernelle Mensah<\/li>\n<\/ul>\n<h2>15:00 \u2013 15:30 Invited Speakers Session 3 \u2013 Data Confidentiality<\/h2>\n<ul>\n<li><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/sirdey-presentation.pdf\" target=\"_blank\"><strong>Towards Practical Homomorphic Cryptocomputing<\/strong><\/a><br \/>\nRenaud Sirdey<\/li>\n<\/ul>\n<h2>15:30 \u2013 16:00 Coffee Break<\/h2>\n<h2>16:00 \u2013 16:30 Short Presentations Session 3<\/h2>\n<ul>\n<li><strong>AL-SAFE: A Secure Self-Adaptable Application-Level Firewall for IaaS Clouds<\/strong> &#8211; <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/giannakou-paper.pdf\" target=\"_blank\">paper<\/a> \/ <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/giannakou-presentation.pptx\" target=\"_blank\">slides[pptx]<\/a><br \/>\nAnna Giannakou, Christine Morin, Louis Rilling and Jean-Louis Pazat<\/li>\n<li><strong>Including Security Monitoring in Cloud SLA<\/strong> &#8211; <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/teshome-paper.pdf\" target=\"_blank\">paper<\/a> \/ <a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/09\/teshome-presentation.pdf\" target=\"_blank\">slides<\/a><br \/>\nAmir Teshome Wonjiga,\u00a0Louis Rilling and Christine Morin<\/li>\n<\/ul>\n<h2>16:30 \u2013 17:00 Invited Speakers Session 4 \u2013 Data Confidentiality<\/h2>\n<ul>\n<li><a href=\"https:\/\/sec2-2016.inria.fr\/files\/2016\/10\/riviere-presentation.pdf\" target=\"_blank\"><strong>Efficient Confidentiality Preservation for Cloud-Supported Content-Based Publish\/Subscribe<\/strong><\/a><br \/>\n\u00c9tienne Rivi\u00e8re<\/li>\n<\/ul>\n<h2>17:00 End of SEC2 2016<\/h2>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>9:00 \u2013 9:05 Introduction 9:05 \u2013 10:00 Invited Speakers Session 1 \u2013 Trusted Computing Anomaly Based Intrusion Detection in Distributed Applications without Global Clock \u00c9ric Totel Approaches to Container Isolation in the Cloud via Kernel Attack Surface Reduction Anil Kurmus 10:00 \u2013 10:30 Coffee Break 10:30 \u2013 11:00 Invited Speakers\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/sec2-2016.inria.fr\/en\/english-program\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":734,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-110","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/users\/734"}],"replies":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":14,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":145,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/110\/revisions\/145"}],"wp:attachment":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}