4th Workshop on Cybersecurity

October 15-17, 2015 – Chicago, USA

 

 

 

 

http://liris.cnrs.fr/cyber/images/LOGOPUF-RGB.jpg

 

 

 

 

 

Cybersecurity Collaboratory

Cyberspace Threat Identification, Analysis and

Proactive Response

http://liris.cnrs.fr/cyber/images/ThomsonReuters.png

Venue:

Student Services Building

Conference Room A

1200 W. Harrison Street

Chicago, IL 60607

 

October 15, 2015 -- TUTORIALS

8:30 am – 9:00 am

BREAKFAST

9:00 am – 10:15 am

Title: Graph parameters and Security

Author: Hamamache Kheddouci, Université Claude Bernard Lyon 1

Email: hamamache.kheddouci@liris.cnrs.fr

10:15 am – 11:30am

Title: Formal approaches to data security

Author: Mohand-Saïd Hacid, Université Claude Bernard Lyon 1

Email: mohand-said.hacid@liris.cnrs.fr

 

COFFEE BREAK

12:00 am – 12:15pm

Title: Cloud Computing and Security

Author: Salim Hariri, University of Arizona

Email: hariri@ece.arizona.edu

 

Lunch Break

2:00 pm – 3:15pm

Title:  Tutorial on Identity Management Systems

Author: Youakim Badr, INSA de Lyon

Email: youakim.badr@liris.cnrs.fr

3:15 pm – 4:30pm

Title: Security and Privacy Issues in Multi-Scale Digital Ecosystems

Author: Lionel Brunie, INSA de Lyon

Email: lionel.brunie@liris.cnrs.fr

 

COFFEE BREAK

5:00 pm – 6:15pm

Title: MapReduce programming and application in Cybersecurity

Author: Kungpeng Zhang, University of Maryland

Email: kzhang@rhsmith.umd.edu

 

October 16, 2015

 

BREAKFAST

9:00 am– 10:00 am

Opening: Aris M. Ouksel, Sid Bhattacharya, then Salim Hariri, and Mohand-Saïd Hacid,  officials from French Embassy, and  Representatives from Thompson Reuters

10:00 am– 11:00am

Presentation: Guest Speaker from Industry

 

COFFEE BREAK

11:30 am– 12:30 pm

Title: NSF IGERT on CyberSecurity and CyberSecurity in Health Care

Author: Ranganathan Chandrasekaran

Email: ranga@uic.edu

 

LUNCH BREAK

2:00 pm – 2:30 pm

Title: Securing Materialized Views: a Rewriting-Based Approach

Author: Emmanuel Coquery, Université Claude Bernard Lyon 1

Email: emmanuel.coquery@liris.cnrs.fr

2:30 pm– 3:00 pm

TitleInference Leakage Detection for Authorization Policies over RDF Data

Author: Tarek Sayah, Université Claude Bernard Lyon 1

Email: emmanuel.coquery@liris.cnrs.fr

3:00 pm– 3:30 pm

Title: Time Distortion Anonymization for the Publication of Mobility Data with High Utility

Author: Lionel Brunie, INSA de Lyon

Email: lionel.brunie@liris.cnrs.fr

 

COFFEE BREAK

4:00 pm– 4:30pm

Title: Autonomic Resilient Cloud Management (ARCM) Systems

Author: Cihan Tunc, University of Arizona

Email: cihantunc@email.arizona.edu

4:30 pm– 5:00pm

Title: Examining Location Disclosure Patterns in Mobile Photo Sharing Application: A Case Study of Instagram

Author: Yuheng Hu, University of Illinois at Chicago

Email: yuhenghu@uic.edu

5:00 pm– 5:30pm

Title: Topology control for security policies

Author: Hamamache Kheddouci, Université Claude Bernard Lyon 1

Email: hamamache.kheddouci@liris.cnrs.fr

5:30pm – 6:30 pm

Discussion

 

 

October 17, 2015

8:30 am – 9:00 am

BREAKFAST

9:00 am – 9:30 am

Title: Inference control in data integration systems

Author: Mohand-Saïd Hacid, Université Claude Bernard Lyon 1

Email: mohand-said.hacid@liris.cnrs.fr

9:30 am – 10:00 am

Title: Highly-secure IoT infrastructures

Author: Jesus Horacio Pacheco Ramirez (Jesus Pacheco), U of Arizona

Email: jpacheco@email.arizona.edu

10:00 am – 10:15 am

COFFEE BREAK

10:15 am – 10:45am

Title: Anomaly Behavior Analysis of Wireless Networks

Author: Pratik Satam, University of Arizona

Email: pratiksatam@email.arizona.edu

10:45 am – 11:15am

Title: Intentionality Detection Capabilities in Commercial Security Products

Author: Doug Lundquist, University of Illinois at Chicago

Email: dlundq1@uic.edu

11:15 am – 12:15 pm

Discussion