

{"id":4,"date":"2011-12-08T11:55:34","date_gmt":"2011-12-08T10:55:34","guid":{"rendered":"http:\/\/project.inria.fr\/template1\/?page_id=4"},"modified":"2016-05-19T00:06:50","modified_gmt":"2016-05-18T22:06:50","slug":"home","status":"publish","type":"page","link":"https:\/\/sec2-2016.inria.fr\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<p><\/p>\n<h1>Presentation<\/h1>\n<p>With Cloud computing new threats on IT systems have emerged, which refrains\u00a0companies and administrations from using Clouds. Notable reasons are: different\u00a0tenants share the same physical resources using infrastructure virtualization,\u00a0clients delegate administration tasks to cloud operators, client only\u00a0administrate virtual resources, and virtualization brings new vulnerabilities.<br \/>\nThe diversity of approaches addressing these threats can be observed in the\u00a0French research community.<\/p>\n<p>The goal of the SEC2 Workshop is, during one day, to gather the French research\u00a0community in Cloud security, in order to show advances in the state of the art,\u00a0to know each other&#8217;s initiatives, and to promote new collaborations to address\u00a0the numerous open challenges.<\/p>\n<p>The <a href=\"https:\/\/sec2-2015.inria.fr\/\" target=\"_blank\">first edition of the SEC2 Workshop<\/a> was organized in conjunction with\u00a0<a href=\"http:\/\/compas15.lifl.fr\/\" target=\"_blank\">Compas&#8217;2015<\/a> and was a great success, with about twenty attendees and 15 talks.<br \/>\nThe goal of this second edition is to follow this success up.<\/p>\n<h1>Format<\/h1>\n<p>Two sessions will be dedicated to invited presentations about reseach activities<br \/>\nrelated to the workshop topics.<\/p>\n<p>One or two remarkable PhD thesis defenses of the past year will be replayed,<br \/>\ninterleaved between these sessions.<\/p>\n<p>A session will also allow PhD students and post-docs to present their research<br \/>\ntopic in 15 minutes. Submission instructions\u00a0and\u00a0publication conditions\u00a0are detailed on the <a href=\"http:\/\/project.inria.fr\/2016sec2\/call-for-contributions\/\">dedicated page<\/a>.<\/p>\n<h1>Topics<\/h1>\n<p>In this second edition, the workshop will focus again on infrastructure-level approaches to secure clouds\u00a0and offer relevant security services to clients. Topics of interest include and are not limited to:<\/p>\n<ul>\n<li>Security of new Cloud models, new virtualization architectures (e.g., edge\u00a0computing, fog computing\u2026)<\/li>\n<li>New threats related to outsourcing and virtualization<\/li>\n<li>Vulnerabilities in hypervisors and new types of virtualization (containers,\u00a0nested virtualization, unikernels\u2026), security by design in hypervisors<\/li>\n<li>Securing hypervisors, virtual machines, and network devices<\/li>\n<li>Introspection techniques<\/li>\n<li>Techniques for isolation and side channel mitigation<\/li>\n<li>Hardware to secure virtual infrastructures<\/li>\n<li>Advanced cryptography to secure data<\/li>\n<li>Integrity of data outsourced in Clouds<\/li>\n<li>Vulnerabilities in SDN (Software-Defined Networking) systems and\u00a0architectures<\/li>\n<li>Security monitoring in Clouds, self-adaptable protection and monitoring<\/li>\n<li>COTS (Component on the shelf) for protection and monitoring<\/li>\n<li>Collaboration between virtualization infrastructure and virtualized\u00a0infrastructure, sharing of security agents between cloud clients and\u00a0operators<\/li>\n<li>Definition, combination, and enforcement of protection and monitoring\u00a0policies<\/li>\n<li>Trade-off between security and resource usage<\/li>\n<li>Service-Level Agreement (SLA) to secure virtualized infrastructures<\/li>\n<\/ul>\n<h1>Location<\/h1>\n<p>The SEC2 2016 Workshop is co-located with <a href=\"http:\/\/compas2016.sciencesconf.org\/\" target=\"_blank\">Compas&#8217;2016<\/a>\u00a0in\u00a0Lorient, France.<\/p>","protected":false},"excerpt":{"rendered":"<p>Presentation With Cloud computing new threats on IT systems have emerged, which refrains\u00a0companies and administrations from using Clouds. Notable reasons are: different\u00a0tenants share the same physical resources using infrastructure virtualization,\u00a0clients delegate administration tasks to cloud operators, client only\u00a0administrate virtual resources, and virtualization brings new vulnerabilities. The diversity of approaches addressing\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/sec2-2016.inria.fr\/en\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":10,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":100,"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/pages\/4\/revisions\/100"}],"wp:attachment":[{"href":"https:\/\/sec2-2016.inria.fr\/en\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}