9:00 – 9:05 Introduction
9:05 – 10:00 Invited Speakers Session 1 – Trusted Computing
- Anomaly Based Intrusion Detection in Distributed Applications without Global Clock
Éric Totel - Approaches to Container Isolation in the Cloud via Kernel Attack Surface Reduction
Anil Kurmus
10:00 – 10:30 Coffee Break
10:30 – 11:00 Invited Speakers Session 2 – Trusted Computing
- Verifiability for Cloud Storage and Computation – pptx
Melek Önen
11:00 – 12:00 PhD Defense Replay
12:00 – 12:30 Short Presentations Session 1
- Verifiable Message-Locked Encryption – paper / slides
Sébastien Canard, Fabien Laguillaumie and Marie Paindavoine
12:30 – 14:00 Lunch Break
14:00 – 14:15 Report of the Organizing Committee
14:15 – 15:00 Short Presentations Session 2
- A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations – paper
Nesrine Kaaniche, Maryline Laurent and Sébastien Canard - Towards Management of Chains of Trust for Multi-Clouds with Intel SGX – paper / slides
Houssem Kanzari and Marc Lacoste - Dynamic Topology Extraction in Cloud Infrastructures
Pernelle Mensah
15:00 – 15:30 Invited Speakers Session 3 – Data Confidentiality
- Towards Practical Homomorphic Cryptocomputing
Renaud Sirdey
15:30 – 16:00 Coffee Break
16:00 – 16:30 Short Presentations Session 3
- AL-SAFE: A Secure Self-Adaptable Application-Level Firewall for IaaS Clouds – paper / slides[pptx]
Anna Giannakou, Christine Morin, Louis Rilling and Jean-Louis Pazat - Including Security Monitoring in Cloud SLA – paper / slides
Amir Teshome Wonjiga, Louis Rilling and Christine Morin
16:30 – 17:00 Invited Speakers Session 4 – Data Confidentiality
- Efficient Confidentiality Preservation for Cloud-Supported Content-Based Publish/Subscribe
Étienne Rivière