<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:"Segoe UI";
        panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
        {font-family:inherit;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
h4
        {mso-style-priority:9;
        mso-style-link:"Heading 4 Char";
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
span.Heading4Char
        {mso-style-name:"Heading 4 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 4";
        font-family:"Times New Roman",serif;
        font-weight:bold;}
span.papertitle
        {mso-style-name:papertitle;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri",sans-serif;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:18.0pt">5<sup>th</sup> IEEE Workshop on Security and Privacy in the Cloud (SPC 2019)<o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">The 5<sup>th</sup> IEEE Workshop on Security and Privacy in the Cloud (SPC 2019) will be held on June 12, 2019 at the Hilton Washington, D.C., National Mall in Washington, D.C., in conjunction with the IEEE Conference on Communications
 and Network Security. A detailed tentative program can be found below. Registration is now open at
<a href="https://cns2019.ieee-cns.org/registration">https://cns2019.ieee-cns.org/registration</a>.<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">We look forward to seeing many of you at the workshop!<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Massimiliano Albanese & Pierangela Samarati<o:p></o:p></p>
<p class="MsoNormal">IEEE SPC Chairs<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<table class="MsoNormalTable" border="0" cellspacing="3" cellpadding="0">
<tbody>
<tr>
<td colspan="2" style="background:#336699;padding:.05in .05in .05in .05in">
<h4 style="margin-top:0in"><span style="font-family:inherit;color:white;font-weight:normal">Program Overview<o:p></o:p></span></h4>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">7:00-9:00<span style="font-family:"Times New Roman",serif"><o:p></o:p></span></p>
</td>
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Registration & Breakfast</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">9:00-9:10<o:p></o:p></p>
</td>
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Opening Remarks</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">9:10-10:00<o:p></o:p></p>
</td>
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Technical Session 1</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">10:00-10:30<o:p></o:p></p>
</td>
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Networking Break</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">10:30-12:00<o:p></o:p></p>
</td>
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Keynote Talk & Panel</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">12:00-13:00<o:p></o:p></p>
</td>
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Lunch Break</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">13:00-14:30<o:p></o:p></p>
</td>
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Technical Session 2</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">14:30-15:00<o:p></o:p></p>
</td>
<td style="background:#D6D6D6;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Networking Break</span></em><o:p></o:p></p>
</td>
</tr>
<tr style="box-sizing: border-box">
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal">15:00-15:50<o:p></o:p></p>
</td>
<td style="background:#EEEEEE;padding:0in 6.0pt 0in 6.0pt;box-sizing: border-box">
<p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif;color:#2200CC">Technical Session 3</span></em><o:p></o:p></p>
</td>
</tr>
</tbody>
</table>
<h4 style="margin-top:6.0pt;box-sizing: border-box;margin-bottom:0.5rem;font-size:1.5rem" id="S1569568515">
<span style="font-family:inherit;color:#0011AA;font-weight:normal"><o:p> </o:p></span></h4>
<h4 style="margin-top:6.0pt"><span style="font-family:inherit;color:#0011AA;font-weight:normal">Technical Session 1<o:p></o:p></span></h4>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=1439777&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Talal Halabi</span></a> (Montreal Polytechnic
 School); <a href="https://www.edas.info/showPerson.php?p=137912&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Martine Bellaïche</span></a> (École Polytechnique, Canada)<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">A Framework Architecture for Agentless Cloud Endpoint Security Monitoring</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=145297&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Issa Traore</span></a> and <a href="https://www.edas.info/showPerson.php?p=1674160&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Asem
 Ghaleb</span></a> (University of Victoria, Canada); <a href="https://www.edas.info/showPerson.php?p=1674161&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Karim Ganame</span></a> (Streamscan, Canada)<o:p></o:p></span></p>
<h4 style="margin-top:6.0pt;box-sizing: border-box;margin-bottom:0.5rem;font-size:1.5rem" id="S1569568520">
<span style="font-family:inherit;color:#0011AA;font-weight:normal"><o:p> </o:p></span></h4>
<h4 style="margin-top:6.0pt"><span style="font-family:inherit;color:#0011AA;font-weight:normal">Keynote Talk & Panel<o:p></o:p></span></h4>
<p class="MsoNormal" style="text-indent:22.5pt"><b><span style="font-family:"Segoe UI",sans-serif;color:#212529">Sushil Jajodia<o:p></o:p></span></b></p>
<h4 style="margin-top:6.0pt"><span style="font-family:inherit;color:#0011AA;font-weight:normal"><o:p> </o:p></span></h4>
<h4 style="margin-top:6.0pt"><span style="font-family:inherit;color:#0011AA;font-weight:normal">Technical Session 2<o:p></o:p></span></h4>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=1482338&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Qinlong Huang</span></a>, <a href="https://www.edas.info/showPerson.php?p=1581756&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Nan
 Li</span></a>, <a href="https://www.edas.info/showPerson.php?p=1671630&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Zhicheng Zhang</span></a> and <a href="https://www.edas.info/showPerson.php?p=198728&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Yixian
 Yang</span></a> (Beijing University of Posts and Telecommunications, P.R. China)<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Using structural diversity to enforce strong authentication of mobiles to the cloud</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=1041753&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Samy Kambou</span></a> (Imt Atlantique, France); <a href="https://www.edas.info/showPerson.php?p=603923&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Ahmed
 Bouabdallah</span></a> (Institut Mines Telecom / IMT Atlantique & IRISA, France)<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Symmetric Kullback-Leibler Divergence of Softmaxed Distributions for Anomaly Scores</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=1576233&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Bruno Andriamanalimanana</span></a>, <a href="https://www.edas.info/showPerson.php?p=317147&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Ali
 Tekeoglu</span></a>, <a href="https://www.edas.info/showPerson.php?p=1648348&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Korkut Bekiroglu</span></a>, <a href="https://www.edas.info/showPerson.php?p=98352&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Saumendra
 Sengupta</span></a>, <a href="https://www.edas.info/showPerson.php?p=1576231&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Chen-Fu Chiang</span></a>, <a href="https://www.edas.info/showPerson.php?p=1640117&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Michael
 Reale</span></a> and <a href="https://www.edas.info/showPerson.php?p=1576232&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Jorge Novillo</span></a> (SUNY Polytechnic Institute, USA)<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Cloud Computing in the Quantum Era</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=507471&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Mustafa Kaiiali</span></a> (Queen's University
 Belfast, United Kingdom (Great Britain)); <a href="https://www.edas.info/showPerson.php?p=89396&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Sakir Sezer</span></a> (Queen's University Belfast & CTO Titan IC,
 United Kingdom (Great Britain)); <a href="https://www.edas.info/showPerson.php?p=1653592&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Ayesha Khalid</span></a> (Queens University Belfast, United Kingdom (Great
 Britain))<o:p></o:p></span></p>
<h4 style="margin-top:6.0pt;box-sizing: border-box;margin-bottom:0.5rem;font-size:1.5rem" id="S1569568529">
<span style="font-family:inherit;color:#0011AA;font-weight:normal"><o:p> </o:p></span></h4>
<h4 style="margin-top:6.0pt"><span style="font-family:inherit;color:#0011AA;font-weight:normal">Technical Session 3<o:p></o:p></span></h4>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=746521&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Giovanni Di Crescenzo</span></a> (Perspecta Labs,
 USA); <a href="https://www.edas.info/showPerson.php?p=1673930&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Matluba Khodjaeva</span></a> (CUNY John Jay College of Criminal Justice, USA); <a href="https://www.edas.info/showPerson.php?p=1673931&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Delaram
 Kahrobaei</span></a> (York University, United Kingdom (Great Britain)); <a href="https://www.edas.info/showPerson.php?p=1525295&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Vladimir Shpilrain</span></a> (CUNY
 Graduate Center, USA<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:12.0pt;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span class="papertitle"><b><i><span style="font-family:"Segoe UI",sans-serif;color:#212529">GPU Algorithms for K-anonymity in Microdata</span></i></b></span><b><span style="font-family:"Segoe UI",sans-serif;color:#212529"><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0in;margin-right:12.0pt;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;background:#EEEEEE">
<span style="font-family:"Segoe UI",sans-serif;color:#212529"><a href="https://www.edas.info/showPerson.php?p=764369&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Flavio Lombardi</span></a> (IAC-CNR, Italy); <a href="https://www.edas.info/showPerson.php?p=1224161&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Agusti
 Solanas</span></a> (Rovira i Virgili University, Spain); <a href="https://www.edas.info/showPerson.php?p=201553&c=25874" target="_self" title="Show person"><span style="color:#2200CC">Roberto Di Pietro</span></a> (Hamad Bin Khalifa University, Qatar); <a href="https://www.edas.info/showPerson.php?p=1671830&c=25874" target="_self" title="Show person"><span style="color:#2200CC;text-decoration:none">Leonardo
 Jero</span></a> (Roma Tre, Italy)<o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>