DIMACS Workshop on Secure Cloud Computing

March 27 - 28, 2014
DIMACS Center, CoRE Building, Rutgers University

Organizers:
Vinod Ganapathy, Rutgers University, vinodg at cs. rutgers.edu
Ari Juels
Tom Ristenpart, University of Wisconsin, rist at cs dot wisc dot edu
Presented under the auspices of the DIMACS Special Focus on Cybersecurity.

Workshop Program:

Thursday, March 27, 2014

 8:30 -  9:00  Breakfast and Registration

 9:00 -  9:15  Opening Remarks
               Welcome Message from the organizers: Vinod Ganapathy, Ari Juels, and Tom Ristenpart
 
 9:15 - 10:25  Thursday keynote address: Practical Challenges and Opportunities in Cloud Security Theory: Semantics, Humans and Metrics
               by Greg Shannon, CMU/CERT

10:25 - 11:00  Verifiable Cloud Outsourcing for Network Functions
               Vyas Sekar, CMU

11:00 - 11:30  Break

11:30 - 12:05  CloudFlow: Cloud-wide policy enforcement using fast VM introspection
               Radu Sion, Stony Brook 

12:05 - 12:45  Verifying the Correctness of Remote Executions: from Theoretical Possibility to near Practicality
               Michael Walfish, NYU

12:45 -  2:00  Lunch

 2:00 -  2:10  Director's Welcome 
               Rebecca Wright, Director of DIMACS

 2:10 -  2:45  Take Back the Cloud: Towards End-User Control of Cloud Services
               Ahmad-Reza Sadeghi, TU Darmstadt

 2:45 -  3:20  How to Misuse, Use, and Mitigate Side Channels in Virtualized Environments
               Michael Reiter, UNC Chapel Hill

 3:20 -  3:45  Break

 3:45 -  4:20  Security Event Management: Challenges and Opportunities
               Pratyusa Manadhata, HP Labs Princeton

 4:20 -  4:55  Guest OS Purification and Minimization for Virtual Machine Hosting in the Cloud
               Dongyan Xu, Purdue

 4:55 -  5:30  Towards Accountable Clouds
               Andreas Haeberlen, University of Pennsylvania

 5:30          Dinner

Friday, March 28, 2014

 8:30 -  9:00  Breakfast and Registration

 9:00 - 10:10  Friday keynote address: Cloud Security: A Practitioner's Perspective
               J. R. Rao, IBM TJ Watson

10:10 - 10:45  Practical Oblivious Computation
               Elaine Shi, University of Maryland

10:45 - 11:00  Break

11:00 - 11:35  Automating Isolation and Least Privilege in Web Services
               Michael Freedman, Princeton University

11:35 - 12:10  SilverLine: Preventing Data Leaks from Compromised Web Applications
               Nick Feamster, Georgia Tech

12:10 -  1:15  Lunch

 1:15 -  1:50  New Abstractions for Responsible Big-Data Management
               Roxana Geambasu, Columbia University

 1:50 -  2:25  Searchable Symmetric Encryption: Locality Lower Bounds and Constructions for Large Indexes & Richer Queries
               David Cash, Rutgers University 


Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on March 26, 2014.