A propos de DGA Maîtrise de l’information

Click to download brochure:

Call for Paper

Data protection facing cyber threats

Data processed in information systems are profoundly disrupted by the emergence of cyberspace. They are dematerialized and hosted in virtualized cloud architectures. Flows increase will continue with the 5th generation of telecommunications technology and the proliferation of connected objects. Ubiquity reaches both users (multiplicity of identities) and equipment (diversity of service flows). Big Data can produce enriched and sometimes sensitive data from supposedly neutral data.

These evolutions have to face the multidimensional explosion of cyber-threats. Attackers, increasingly numerous in organized structures, use widely accessible tools.

The legislation provides a framework, as will be the case in the EU from May 2018 thanks to the European regulation on the protection of personal data. But the threat is not limited to privacy. Denials of service, sites disfigurations or falsifications contribute to disinformation. Data exfiltration or racket by data blocking have become permanent threats.

The C&ESAR 2017 conference proposes to address data protection in this new landscape. Past strategies, based on a static definition of authorized flows, are unsatisfactory. Data protection must also increasingly integrate detection into its definition, design, use, operating and organization. New approaches also have to take into account the training of the ecosystem through challenges in representative scenarios.

As a consequence, three types of communication proposals are expectedles communications peuvent être rédigées en français ou en anglais. Les critères de sélection seront principalement le respect du thème de la conférence et de cet appel à communications, la clarté et l’effort pédagogique. Les exposés techniques seront considérés dans la mesure où ils présentent aussi un état de l’art d’un domaine et non uniquement un résultat particulier. Les communications ne doivent pas être à vocation commerciale. Les communications acceptées seront publiées dans les actes du colloque.

  • Protection : feedback on the cyber protection of data of the main sectors of activity: health, transport, energy, banking, information networks, telecom, …; The new challenges of data protection: privacy, integrity, reliability …;
  • Threat : New forms of threat; Tools to capitalize the threat and countermeasures; The evolution of
    generations of malwares; The market for tools and for attacks services ;
  • Outlook: : Data protection strategies (ORBAC model, evolution to contextualized flow control); Integration of detection; Learning techniques (machine learning, …), processing of the exponential
    growing of data; Training by exercises and challenges (Red Team, Pentest),

Submission process

  • First phase: the proposals (3 to 6 pages) shall be submitted by (update) (July 22th) July 24th, 2017 at the latest via in PDF file format. Each submission shall include a title, the category of communication (educational, general, specialized), the authors’ names and affiliation, the email address of the corresponding author, an abstract (10 lines max.), and a list of keywords. The authors will be notified of their proposal acceptance by September 2nd , 2017.

  • Second phase : the authors shall send the camera-ready version of their paper (8 to 16 pages) by October 2nd, 2017 at the latest, to , cc to The authors whose papers are accepted commit to address reviewers comments in the final version.

  • Instructions for the camera-ready version of the paper : PDF in A4 without page numbering, following the Springer Lecture Notes in Computer Science template
    (LaTeX template: ;
    Word template: ).

    Contact in case of problem.
  • Language and selection criteria: the papers can be written in French or in English. Selection criteria include clarity and educational dimension, as well as the respect of the theme of the conference and the guidelines of this call for papers. Specialized technical papers will be taken into consideration to the extent that they contribute to explaining and analyzing the state of the art or its deficiencies, rather than presenting only individual technical contributions. Accepted papers will be published in both online and printed versions in the proceedings of the conference.

Upload CfP : CESAR_2017_CfP_V3_UK

Important dates

  • Submission of the proposals (long abstracts between 3 to 6 pages): (update) July 24th, 2017
  • Notification to authors: September 6th, 2017
  • Final version (8 to 16 pages): October 2nd, 2017
  • Conference: November 27-29, 2017

Program committee

Boris BALACHEFF ( HP Labs )
Christophe BIDAN ( Centrale-Supélec )
Frédéric CUPPENS ( Télécom Bretagne )
Herve DEBAR ( Télécom SudParis )
Patrick HEBRARD ( DCNS )
Guillaume MEIER ( AIRBUS D&S )
Eric WIATROWSKI ( Orange Cyberdefense )