|
4th Workshop
on Cybersecurity October 15-17, 2015 –
Chicago, USA |
|
|
Cybersecurity
Collaboratory
Cyberspace Threat Identification, Analysis and Proactive Response |
Venue:
Student Services Building
Conference Room A
1200 W. Harrison Street
Chicago, IL 60607
October 15, 2015 -- TUTORIALS
8:30 am –
9:00 am |
BREAKFAST |
9:00 am
– 10:15 am |
Title: Graph
parameters and Security Author: Hamamache
Kheddouci, Université Claude Bernard Lyon 1 |
10:15 am
– 11:30am |
Title: Formal
approaches to data security Author: Mohand-Saïd Hacid,
Université Claude Bernard Lyon 1 |
|
COFFEE
BREAK |
12:00 am
– 12:15pm |
Title: Cloud
Computing and Security Author: Salim Hariri, University of
Arizona Email: hariri@ece.arizona.edu |
|
Lunch
Break |
2:00 pm –
3:15pm |
Title: Tutorial
on Identity Management Systems Author: Youakim Badr, INSA
de Lyon Email: youakim.badr@liris.cnrs.fr |
3:15 pm –
4:30pm |
Title: Security
and Privacy Issues in Multi-Scale Digital Ecosystems Author: Lionel Brunie, INSA de Lyon Email: lionel.brunie@liris.cnrs.fr |
|
COFFEE
BREAK |
5:00 pm –
6:15pm |
Title: MapReduce
programming and application in Cybersecurity Author: Kungpeng Zhang, University of
Maryland Email: kzhang@rhsmith.umd.edu |
October 16, 2015
|
BREAKFAST |
9:00 am–
10:00 am |
Opening:
Aris
M. Ouksel, Sid Bhattacharya, then Salim Hariri, and Mohand-Saïd Hacid, officials from French Embassy, and Representatives from Thompson Reuters |
10:00 am–
11:00am |
Presentation: Guest Speaker from
Industry |
|
COFFEE
BREAK |
11:30 am–
12:30 pm |
Title:
NSF
IGERT on CyberSecurity and CyberSecurity in Health Care Author: Ranganathan
Chandrasekaran Email: ranga@uic.edu |
|
LUNCH
BREAK |
2:00 pm
– 2:30 pm |
Title: Securing
Materialized Views: a Rewriting-Based Approach Author: Emmanuel Coquery, Université
Claude Bernard Lyon 1 |
2:30 pm–
3:00 pm |
Title: Inference Leakage Detection for
Authorization Policies over RDF Data Author: Tarek Sayah, Université Claude Bernard
Lyon 1 |
3:00 pm–
3:30 pm |
Title: Time Distortion Anonymization for the
Publication of Mobility Data with High Utility Author: Lionel
Brunie, INSA de Lyon Email: lionel.brunie@liris.cnrs.fr |
|
COFFEE
BREAK |
4:00 pm–
4:30pm |
Title: Autonomic
Resilient Cloud Management (ARCM) Systems Author: Cihan Tunc, University
of Arizona Email: cihantunc@email.arizona.edu |
4:30 pm–
5:00pm |
Author: Yuheng Hu, University of Illinois at Chicago Email: yuhenghu@uic.edu |
5:00 pm–
5:30pm |
Title: Topology
control for security policies Author: Hamamache
Kheddouci, Université Claude Bernard Lyon 1 |
5:30pm –
6:30 pm |
Discussion |
October 17, 2015
8:30 am
– 9:00 am |
BREAKFAST |
9:00 am
– 9:30 am |
Title: Inference
control in data integration systems Author: Mohand-Saïd Hacid,
Université Claude Bernard Lyon 1 |
9:30 am
– 10:00 am |
Title: Highly-secure
IoT infrastructures Author: Jesus Horacio Pacheco Ramirez
(Jesus Pacheco), U of Arizona Email: jpacheco@email.arizona.edu |
10:00 am
– 10:15 am |
COFFEE
BREAK |
10:15 am
– 10:45am |
Title: Anomaly Behavior Analysis of Wireless Networks
Author: Pratik Satam, University of
Arizona |
10:45 am
– 11:15am |
Title: Intentionality
Detection Capabilities in Commercial Security Products Author: Doug Lundquist, University of
Illinois at Chicago
Email: dlundq1@uic.edu |
11:15 am
– 12:15 pm |
Discussion |