Publications

2017

Rethinking Permissioned Blockchains M. Vukolic, BCC 2017 : The First ACM Workshop on Blockchain, Cryptocurrencies and Contracts (BCC’17), Abu Dhabi, UAE, April 2017. (to appear)

2016

Non-determinism in Byzantine Fault-Tolerant Replication
Christian Cachin, Simon Schubert, Marko Vukolic, 20th International Conference On Principles Of DIstributed Systems (OPODIS’16), Madrid, Spain

 

[ More ]

Usage Control Policy Enforcement in SDN-based Clouds: A Dynamic Availability Service Use Case
Khalifa Toumi, Muhammad Idrees Sabir, Fabien Charmet, Reda Yaich, Gregory Blanc, the 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016), Sydney, Australia

 

[ More ]

Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm
Vincent Migliore, Maria Méndez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, Guy Gogniat, IEEE Transactions on Computers, 2016

 

[ More ]

Overcoming Barriers for Ubiquitous User- Centric Healthcare Services
A. Palesandro, C. G. Guegan, M. Lacoste, N. Bennani, IEEE Cloud Computing, Special Issue on Cloud Computing for Enhanced Living Environments, 2016.

 

[ More ]

Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations
T. Oliveira, R. Mendes and A. Bessani, 20th International Conference On Principles Of DIstributed Systems (OPODIS’16), Madrid, Spain, December 2016.

 

[ More ]

Constant-Size Ciphertext Attribute-based Encryption from Multi-Channel Broadcast Encryption
S. Canard, C. Trinh, Twelth International Conference on Information Systems Security (ICISS 2016), Jaipur, India, December 2016.

 

[ More ]

Verifiable Message-Locked Encryption
S. Canard, F. Laguillaumie, M. Paindavoine, 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 2016.

 

[ More ]

User-Centric Security and Dependability in Cloud of Clouds
M. Lacoste, M. Miettinen, N. Neves, F. Ramos, M. Vukolic, F. Charmet, R. Yaich, K. Obornzynski, G. Vernekar, P. Sousa, IEEE Cloud Computing, Special Issue on Cloud Security, 2016.

 

[ More ]

XFT: Practical Fault Tolerance Beyond Crashes
S. Liu, P. Viotti, C. Cachin, V. Quéma, M. Vukolic, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), Savannah, GA, USA, November 2016.

 

[ More ]

PhishEye: Live Monitoring of Sandboxed Phishing Kits
X. Han, N. Kheir, D. Balzarotti, 23rd ACM conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.

 

[ More ]

A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations
N. Kaaniche, M. Laurent, S. Canard, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Verifiable Message-Locked Encryption
S. Canard, F. Laguillaumie, M. Paindavoine, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Towards Management of Chains of Trust for Multi-Clouds with Intel SGX
H. Kanzari, Marc Lacoste, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Y. Li, N. Cuppens-Boulahia, J.M. Crom, F.Cuppens, V.Frey, 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Ghent, Belgium, May 2016.

 

[ More ]

Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
S.d.Hoogh, B.Schoenmakers, M. Veeningen, Proceedings AFRICACRYPT 2016: International Conference on Cryptology, Morocco, Africa, April 2016.

 

[ More ]

Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants
E.A.P. Alchieri, A. Bessani, F. Greve, J. da Silva Fraga, IEEE Transactions on Dependable and Secure Computing, March 2016.

 

[ More ]

(Literally) above the clouds: virtualizing the network over multiple clouds
M. Alaluna, F. M. V. Ramos, N. Neves, IEEE Conference on Network Softwarization (NetSoft), Seoul, Korea, March 2016.

 

[ More ]

Consensus in a Box: Inexpensive Coordination in Hardware
Z. István, D. Sidler, G. Alonso, M. Vukolić, NSDI 16: 13th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, March 2016.

 

[ More ]

Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
B. Schoenmakers, M. Veeningen, N. de Vreede, Proceedings ACNS 2016, London, UK, January 2016.

 

[ More ]

2015

Similarity Measure for Security Policies in Service Provider Selection
Y. Li, N. Cuppens-Boulahia, J.-M. Crom, F. Cuppens, V. Frey, X. Ji, 11th International Conference on Information Systems Security (ICISS2015), Kolkata, India, December 2015.

 

[ More ]

Towards User-Centric Management of Security and Dependability in Clouds of Clouds
M. Lacoste, F. Charmet, 6th International Conference on E-Democracy, Athens, Greece, December 2015.

 

[ More ]

Separating the WHEAT from the Chaff: An Empirical Design for Georeplicated State Machines
J. Sousa, A. Bessani, The International Symposium on Reliable Distributed Systems, Montreal, Canada, September 2015.

 

[ More ]

The role of cloud services in malicious software: trends and insights?
X. Han, N. Kheir, D. Balzarotti, Paper in proceedings of DIMVA 2015, Milano, Italy, July 2015.

 

[ More ]

How many planet-wide leaders should there be?
S. Liu, M. Vukolic, Distributed Cloud Computing Workshop, Portland, USA, June 2015.

 

[ More ]

Nested Virtualization meets Micro-Hypervisors: Towards a Virtualization Architecture for User-Centric Multi-Clouds
A. Palesandro, M. Lacoste, C. Ghedira-Guegan, N. Bennani, SEC2 2015 (First ComPAS Workshop on Cloud Security), June 2015.

 

[ More ]

Software-Defined Networks: On the Road to the Softwarization of Networking
F. M. V. Ramos, D. Kreutz, P. Veríssimo, Cutter IT Journal, May 2015.

 

[ More ]

On the Consistency of Heterogeneous Composite Objects
A. Bessani, R. Mendes, T. Oliveira, proceedings of the First Workshop on Principles and Practice of Consistency for Distributed Data, March 2015.

 

[ More ]

Deliverables

Period 1

D1.1 "SUPERCLOUD Architecture Specification"

 

[ More ]

D1.2 "SUPERCLOUD Self-Management of Security Specification"

 

[ More ]

D2.1 "Architecture for Secure Computation Infrastructure and Self-Management of VM Security"

 

[ More ]

D3.1 "Architecture for data management"

 

[ More ]

D4.1 "Preliminary Architecture of the Multi-Cloud Network Virtualization Infrastructure"

 

[ More ]

Period 2

D2.2 "Secure Computation Infrastructure and Self-Management of VM Security"

 

[ More ]

D3.2 "Specification of security enablers for data management"

 

[ More ]

D4.2 "Specification of Self-Management of Network Security and Resilience "

 

[ More ]