People‎ > ‎

Christophe Feltus

Dr.-Eng. Christophe Feltus is graduated as an Electromechanics Engineer from the Institut Supérieur Industriel des Art et Métiers Pierrard (Belgium) and Doctor of Science (Computer Science) from the University of Namur (Belgium). He worked for several years in private companies as: Production Head at Pfizer SA in Jette, Project Coordinator at Nizet Entreprise in Louvain-la-Neuve, and Assessor for the Civil Belgium Aviation Administration in Brussels, Belgium. Than he joined the Public Research Centre Henri Tudor in the Grand-Duchy of Luxembourg in 1999 to work in the field of Service Science and Innovation. There he has taken part in projects related to IT security, IT governance, business IT/alignment and enterprise architecture modeling. In 2015, the Public Research Centre Gabriel Lippmann and the Public Research Centre Henri Tudor have merged to become the Luxembourg Institute of Science and Technology. His research interests include IT security, responsibility and enterprise modeling, enterprise architecture, Businss IT alignment and access right management

Christophe's PhD title is:Aligning Access Rights to Governance Needs with the Responsibility MetaModel (ReMMo) in the Frame of Enterprise Architecture

Supervision

  • Supervisor: Michaël Petit
  • Co-supervisors: Eric Dubois
  • Members of the steering committee: Yves Pigneur, Claire Lobet-Maris and Morris Sloman
  • Members of the jury: Najid Habra (Chair), Michaël Petit, Eric Dubois, Yves Pigneur, Erik Proper, Jean-Noël Colin and Claire Lobet-Maris.

Abstract

Nowadays the economy relies on companies evolving in an increasingly highly regulated environment, having their operations strongly formalised and controlled, and being often organised following a bureaucratic approach. In such a context, aligning the business operations with the appropriate IT infrastructure is a challenging and critical activity. Without efficient business/IT alignment, these companies face the risk not to be able to deliver their business services satisfactorily and that their image is seriously altered and jeopardised. Among the many challenges of business/IT alignment is the access rights management which should be conducted considering the rising governance needs, such as taking into account the business actors' responsibility. Unfortunately, in this domain, we have observed that no solution, model and method, fully considers and integrates the new needs yet. Therefore, the thesis proposes firstly to define an expressive Responsibility metamodel, named ReMMo, which allows representing the existing responsibilities at the business layer and, thereby, allows engineering the access rights required to perform these responsibilities, at the application layer. Secondly, the Responsibility metamodel has been integrated with ArchiMate to enhance its usability and benefits from the enterprise architecture formalism. Finally, a method has been proposed to define the access rights more accurately, considering the alignment of ReMMo and RBAC. The research was realised following a design science and action design based research method and the results have been evaluated through an extended case study at the Centre Hospitalier de Luxembourg.

Christophe's main publications are:

      • Bernard Di Renzo, Christophe Feltus, Développement et expérimentation d’un modèle de gestion collaborative des pratiques informatiques à l’usage des petites et moyennes entreprises, 8ième colloque de l’Association Information et Management (AIM2003), 21-23/5/2003, Grenoble, France.

      • Bernard Di Renzo, Christophe Feltus, Process assessment for use in very small enterprises: the NOEMI assessment methodology, European Software Process Improvement (EUROSPI’2003), Ed. Richard Messnarz, 10-12/12/2003, Graz, Austria. ISBN 3-901351-84-1.

      • Bernard Di Renzo, Christophe Feltus, Sylvie Prime, NOEMI, Collaborative management for ICT process improvement in SME: experience report, European Software Process Improvement (EUROSPI’2004), 10-12/11/2004, in Norvegian University of Science and Technology (NTNU), Trondheim, Norway. ISSN: 1503-416

      • Christophe Feltus, Djamel Khadraoui, Filipe Costa Pinto, OpenSST based Clearing Mechanism for e-Business, International Conference on Information & Communication Technologies: from Theory to Applications (IEEE ICTTA2004), 24-28/4/2004, Damascus, Syria. ISBN: 0-7803-8482-2, DOI : 10.1109/ICTTA.2004.1307628

      • Christophe Feltus, Djamel Khadraoui, Alexandre Dulaunoy, Solution standard de compensation appliqué à une architecture e-Business sécurisée, Les Nouvelles TEchnnologies de la Répartition (NOTERE’2004), 27-30/6/2004, Saidia, Morocco.

      • Christophe Feltus, Ghislain Sillaume, Collaborative Development of Open Source E-Learning Platforms, Online Educa Berlin 2004, 1-3/12/2004, Berlin, Germany. ISBN 3-9808909-53.

      • André Rifaut, Christophe Feltus, Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach, Regulations Modelling and their Validation & Verification (REMO2V’2006), an International Workshop of the 18th Conference on Advanced Information Systems Engineering (CAISE2006), pp. 831-837, 6/6/2006, Luxembourg, Grand-Duchy of Luxembourg. ISBN 978-2-87037-525-9.

      • Christophe Feltus, André Rifaut, An Ontology for Requirements Analysis of Managers’ Policies in Financial Institutions, Interoperability for Enterprise & Software Applications (I-ESA2007), 28-30/3/2007, Madeira, Portugal. 

      • Christophe Feltus, Djamel Khadraoui, Benoît de Rémont, André Rifaut, Business Governance based Policy Regulation for Security Incident Response, International Conference on Risks and Security of Internet and Systems (IEEE CRISIS2007), 2-5/7/2007, Marrakech, Morocco.

      • Christophe Feltus, Preliminary Literature Review of Policy Engineering Methods - Toward Responsibility Concept, International Conference on Information & Communication Technologies: from Theory to Applications (IEEE ICTTA2008), 7-11/4/2008, Damascus, Syria.

      • Jocelyn Aubert, Benjamin Gâteau, Christophe Incoul, Christophe Feltus, SIM : An Innovative Business-Oriented Approach for a Distributed Access Management, International Conference on Information & Communication Technologies: from Theory to Applications (IEEE ICTTA2008), 7-11/4/2008, Damascus, Syria.

      • Benjamin Gâteau, Christophe Feltus, Jocelyn Aubert, Christophe Incoul, An Agent-based Framework for Identity Management: The Unsuspected Relation with ISO/IEC 15504, IEEE International Conference on Research Challenges in Information Science (IEEE RCIS 2008), 3-6/6/2008, Marrakech, Morocco. 

      • Benjamin Gâteau, Djamel Khadraoui, Christophe Feltus, Benoît de Rémont, Multi-Agents based Architecture for IS Security Incident Reaction, 6th IEEE International Conference on Computer Science, 2008 IEEE International Conference on Research, Innovation & Vision for the Future (IEEE RIVF 2008), 14-16/7/2008, Ho Chi Minh City, Vietnam.

      • Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus, If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network, Third International Conference on Risks and Security of Internet and Systems (CRISIS 2008), 28-30/10/2008, Tozeur, Tunisia. (SCOPUS)

      • Christophe Feltus, Michaël Petit, Georges Ataya, Definition and Validation of a Business IT Alignment Method for Enterprise Governance Improvement in the Context of Processes Based Organizations, 2008 Corporate Governance of IT International Conference, 1-2/12/2008,Wellington, New Zealand. Ed. Dr Brian Cusack, ISBN 978-1-877314-73-5.

      • Christophe Feltus, Michaël Petit, Building a Responsibility Model Including Accountability, Capability and Commitment, Fourth International Conference on Availability, Reliability and Security (“ARES 2009 – The International Dependability Conference”) IEEE, 16-19/3/2009, Fukuoka, Japan.

      • Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, and Marc Camy, Methodology to Align Business and IT Policies: Use case from an IT Company, 1st International Workshop on Organizational Security Aspects (OSA 2009), an International Workshop of the Fourth International Conference on Availability, Reliability and Security (“ARES 2009 – The International Dependability Conference”) IEEE, 16-19/3/2009, Fukuoka, Japan.

      • Christophe Feltus, Michaël Petit, Building a Responsibility Model using Modal Logic - Towards Accountability, Capability and Commitment Concepts, The seventh ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09) IEEE, 10-13/5/2009, Rabat, Morocco.

      • Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau , Who Govern my Responsibilities? SIM: a Methodology to Align Business and IT Policies in the Industrial Field, 13th IFAC Symposium on Information Control Problems in Manufacturing, 3-5/6/2009, Moscow, Russia. 

      • Christophe Feltus, Michaël Petit, François Vernadat, Enhancement of CIMOSA with Responsibility Concept to Conform to Principles of Corporate Governance of IT, 13th IFAC Symposium on Information Control Problems in Manufacturing, 3-5/6/2009, Moscow, Russia.

      • Benjamin Gâteau, Djamel Khadraoui, Christophe Feltus, Multi-Agents System Service based Platform in Telecommunication Security Incident Reaction, Global Information Infrastructure Symposium 2009 (IEEE GIIS 2009), 22-26/6/2009, Hammamet, Tunisia.     

      •  Christophe Feltus, Michaël Petit, Eric Dubois, Strengthening Employee’s Responsibility to Enhance Governance of IT - COBIT RACI Chart Case Study, The 1st ACM Workshop on Information Security Governance (ACM WISG 2009) held in conjunction with the 16th ACM Conference on Computer and Communications Security (ACM CCS 2009), 13/11/2009, Chicago, Illinois, USA.

      • Christophe Feltus, Djamel Khadraoui, Jocelyn Aubert, A Security Decision-Reaction Architecture for Heterogeneous Distributed Network, Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”) IEEE, 15-18/2/2010, Krakow, Poland. 

      • Cédric Bonhomme, Christophe Feltus, Djamel Khadraoui, A Multi-Agent based Decision Mechanism for Incident Reaction in Telecommunication Network, The eighth ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-10), IEEE, 16-19/5/2010, Hammamet, Tunisia. Poster.

      • Christophe Feltus, Djamel Khadraoui, Cédric Bonhomme, Electric Blackout Prevention: Toward a Computer-Mediated Weather Alert Broadcasting Solution, International Conference on Society and Information Technologies: ICSIT 2010, collocated with The 16th International Conference on Information Systems Analysis and Synthesis: ISAS 2010 and The 8th International Conference on Computing, Communications and Control Technologies: CCCT 2010, 6-9/4/2010, Orlando, Florida, USA.Christophe Feltus, Conceptual Trusted Incident-Reaction Architecture, The 6th International Network Conference 2010 (INC2010), 6-8/6/2010, Heidelberg, Germany.

      • Christophe Feltus, Michaël Petit, Morris Sloman, Enhancement of Business IT Alignment by Including Responsibility Components in RBAC, 5th International Workshop on Business/IT Alignment and Interoperability (BUSITAL 2010), an International Workshop of the 22th Conference on Advanced Information Systems Engineering (CAISE2010), 7-11/6/2010,  Hammamet, Tunisia.

      • Christophe Feltus, Eric Dubois, Michaël Petit, Conceptualizing a Responsibility based Approach for Elaborating and Verifying RBAC Policies Conforming with CobiT Framework Requirements, Third International Workshop on Requirements Engineering and Law (RELAW10), in conjunction with the 18th IEEE International Requirements Engineering Conference (RE2010), 27/9-1/10/2010, Sydney, Australia. 

      • Christophe Feltus, Michaël Petit, Eric Dubois, ReMoLa: Responsibility Model Language to Align Access Rights with Business Process Requirements, Fifth IEEE International Conference on Research Challenges in Information Science (IEEE RCIS 2011), 19-21/5/2011, Guadeloupe - French West Indies, France 

      • Guy Guemkam, Christophe Feltus, Cédric Bonhomme, Pierre Schmitt, Benjamin Gâteau, Djamel Khadraoui, Zahia Guessoum, Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions, Sixth IEEE Conference on Network Architecture and Information System Security (IEEE SAR/SSI2011), 18-21/5/2011, La Rochelle, France.

      • Cédric Bonhomme, Christophe Feltus, Michaël Petit, Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management, Sixth International Conference on Availability, Reliability and Security (“ARES 2011 – The International Dependability Conference”) IEEE 22-26/8/2011, Vienna, Austria.

      • Guy Guemkam, Christophe Feltus, Cédric Bonhomme, Pierre Schmitt, Djamel Khadraoui, Zahia Guessoum, Reputation based Dynamic Responsibility to Agent for Critical Infrastructure, IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 22-27/8/2011, Lyon, France.

      • Christophe Feltus, Abdelaziz Khadraoui, Anastasiya Yurchyshyna, Michel Léonard, Eric Dubois, Responsibility aspects in service engineering for e-Government, Interoperability for Enterprise Systems and Applications conference (I-ESA'12) Workshop Service Science and the Next Wave in Enterprise Interoperability, 20-21/3/12, Valencia, Spain. 

      • Christophe Feltus, Eric Dubois, Erik Proper, Iver Band, Michaël Petit, Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for Access Rights Management, 5th ACM International Conference on Security of Information and Networks (ACM SIN 2012), 22-27/10/2012, Jaipur, Rajastan, India. ISBN: 978-1-4503-1668-2

      • Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui, Organizational Security Architecture for Critical Infrastructure, 8th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2013), an International Workshop of the eight International Conference on Availability, Reliability and Security (“ARES 2013 – The International Dependability Conference”) IEEE, 2-6/9/2013, Regensburg, Germany.

      • Eric Grandry, Christophe Feltus, Eric Dubois, Conceptual Integration of Enterprise Architecture Management and Security Risk Management, The Fifth Workshop on Service oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE’2013), an International Workshop of the 17th IEEE International EDOC Conference (IEEE EDOC 2013), 9-13/9/2013, Vancouver, BC, Canada. 

      • Djamel Khadraoui, Christophe Feltus, Critical Infrastructures Governance - Exploring SCADA Cybernetics through Architectured Policy Semantic, IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), 13-16/10/2013, Manchester, United Kingdom. 

      • Christophe Feltus, Industry Program Panel, The 6th ACM International Conference on Security of Information and Networks (ACM SIN 2013), 26-28/11/2013, Aksaray, Turkey.

      • Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui, Metamodel for Reputation based Agents System - Case Study for Electrical Distribution SCADA Design, The 6th ACM International Conference on Security of Information and Networks (ACM SIN 2013), 26-28/11/2013, Aksaray, Turkey. ISBN 978-1-4503-2498-4 http://dx.doi.org/10.1145/2523514.2523543

      • Christophe Feltus, Djamel Khadraoui, On Designing Automatic Reaction Strategy for Critical Infrastructure SCADA System, 6th ACM International Conference on Security of Information and Networks (ACM SIN 2013), 26-28/11/2013, Aksaray, Turkey. Poster. http://dx.doi.org/10.1145/2523514.2523583 

      • Christophe Feltus, Djamel Khadraoui, Conviction Model Insight for Incident Reaction Architecture Monitoring based on Automatic Sensors Alert Detection, The 6th ACM International Conference on Security of Information and Networks (ACM SIN 2013), 26-28/11/2013, Aksaray, Turkey. ISBN 978-1-4503-2498-4 http://dx.doi.org/10.1145/2523514.2523523

      • Christophe Feltus, Moussa Ouedraogo, Djamel Khadraoui, Towards Cyber-Security Protection of Critical Infrastructures by Generating Security Policy for SCADA Systems, The 1st International Conference on Information and Communication Technologies for Disaster Management (ICT-DM'2014), 24-25/3/2014, Algiers, Algeria.

      • Christophe Feltus, Damien Nicolas, Claude Poupart, Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration, The 7th ACM International Conference on Security of Information and Networks (ACM SIN 2014), 9-11/11/2014, Glasgow, United Kingdom.

      • Hervé Cholez, Christophe Feltus, Towards an Innovative Systemic Approach of Risk Management, The 7th ACM International Conference on Security of Information and Networks (ACM SIN 2014), 9-11/11/2014, Glasgow, United Kingdom.

      • Nicolas Mayer, Eric Grandry, Christophe Feltus, Elio Goettelmann, Towards the ENTRI Framework: Security Risk Management enhanced by the use of Enterprise Architectures, 5th International Workshop on Information Systems Security Engineering, (WISSE 2015), an International Workshop of the 27th Conference on Advanced Information Systems Engineering (CAISE2015), 8/6/2015, Stockholm, Sweden.

      • Christophe Feltus, François-Xavier Fontaine, Eric Grandry, Towards Systemic Risk Management in the frame of Business Service Ecosystem, 2nd International Workshop on Advances in Services DEsign based on the Notion of Capability (ASDENCA 2015), an International Workshop of the 27th Conference on Advanced Information Systems Engineering (CAISE2015), 9/6/2015, Stockholm, Sweden.

      • Christophe Feltus, Eric Dubois, Michaël Petit, Alignment of ReMMo with RBAC to Manage Access Rights in the Frame of Enterprise Architecture, IEEE Ninth International Conference on Research Challenges in Information Science (IEEE RCIS 2015), 13-15/5/2015, Athens, Greece. Djamel Khadraoui, Christophe Feltus, Designing Security Policies for Complex SCADA Systems Protection, The Fifth International Conference on Advanced Communications and Computation (INFOCOMP 2015), 21-26/6/2015, Brussels, Belgium

      • André Rifaut, Christophe Feltus, Slim Turki, Analysis of the Impact of Ethical Issues on the Management of the Access Rights, The 8th ACM International Conference on Security of Information and Networks (ACM SIN 2015), 8-10/9/2015 Sochi, Russia. (To appear)

       Other conferences

      • Christophe Feltus, ISO/IEC 29382 - the new standard for ICT Governance, itSMF-NL Spring 2008 Conference "Best Practices in IT Management: BEYOND ITIL, BEYOND CONTROL", 22/4/2008, Ede, Nederland.

      • Christophe Feltus, ISO/IEC 29382 versus ISO/IEC 27000, Eurosec' 2008, 19ème Forum européen sur la sécurité de l'information, 18/9/2008, Paris, France.

      • Christophe Feltus, Introducing ISO/IEC 38500: Corporate Governance in ICT, ITSMF Jaarcongres 2008, 27-28/10/2008, Nijkerk, Nederlands.

      • Christophe Feltus, Building a Responsibility Model Including Obligation/Accountability, Capability and Commitment to Enhance Governance of Information Technology. Staff seminars 30/11/2009, University of Namur, Belgium.

      • Christophe Feltus, Aligning Organisational responsibility with IT Access rights, Inter-organisational Interoperability and Business-IT Alignment: Which complementarity?, INTEROP Scientifc days of the "Université de la Grande région", HEC-Management School of the University of Liege, 25/5/2011, Liège, Belgium.

      • Christophe Feltus, Iver Band, ArchiMate® and Security, Joint Workshop with the Archimate Forum - The Open Group Conference, 30/1-3/2/2012, San Francisco, California, USA.

      Journal

      • Bernard Di Renzo, Mathieu Farcot, Christophe Feltus, Evaluation de la qualité des processus informatiques en petites et moyennes entreprises : méthode NOEMI, ISI Qualité numéro spécial, Ingénierie des systèmes d'information, Networking and Information Systems,  RSTI-Série ISI volume 9, issue 5-6, 2004, pp.51-68.  Ed. Hermès-Lavoisier. doi:10.3166/isi.9.5-6.51-68

      • Abdelaziz Khadraoui, Christophe Feltus, Services Specification and Services Compliance, How to Consider the Responsibility Dimension?, in Journal of Service Science Research - "Challenges and Advances on Service Quality Aspects", Springer, volume 4, issue 1, pp. 123-142.

      • Benjamin Gâteau, Moussa Ouedraogo, Christophe Feltus, Guy Guemkam, Gregoire Danoy, Marcin Seredinsky, Samee U. Khan, Djamel Khadraoui, Pascal Bouvry, Adopting Trust and Assurance as indicators for the reassignment of responsibilities in Multi-agent Systems, Special issue "Intelligent Computing in Large-Scale Environments", The Knowledge Engineering Review (KER), Cambridge University Press (CUP), ISSN: 0269-8889, volume 30, issue 2.

      • Christophe Feltus and Djamel Khadraoui, Designing Security Policies for Complex SCADA Systems Management and Protection, International Journal of Information Technology and Management. (To appear)

      Book chapter

      • Michaël Petit, Christophe Feltus, François Vernadat, Enterprise Architecture Enhanced with Responsibility to Manage Access Right - Case Study in an EU Institution, 5th IFIP WG8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2012), Rostock, Germany, in Lecture Notes in Business Information Processing, ed. Kurt Sandkuhl, Ulf Seigerroth and Janis Stirna, 132-147 (2012), volume 0134, http://dx.doi.org/10.1007/978-3-642-34549-4_10.

      • Abdelaziz Khadraoui, Damien Nicolas, Christophe Feltus, Prosumer's Responsibilities?... On Stage to a Dedicated Framework for Services Sharing and Compliance in the Healthcare Domain. In Frameworks of IT Prosumption for Business Development, Ed. Małgorzata Pańkowska, 73-84 (2014), accessed August 12, 2013. doi:10.4018/978-1-4666-4313-0.ch006

      White Paper

      • Iver Band, Wilco Engelsman, Chrisophe Feltus, Sonia González Paredes, Jim Hietala, Henk Jonkers, Sebastien Massart, Modeling Enterprise Risk Management and Security with the ArchiMate® Language, A White Paper Published by The Open Group, January 2015

Christophe is involved in the following committees:

  • Member of the Program Committee of the Forth International Conference on Availability, Reliability and Security (ARES 2009), 16-19/3/2009, Fukuoka, Japan.
  • Member of the Program Committee of the First International Workshop on Organizational Security Aspects (OSA 2009) an International Workshop of Forth International Conference on Availability, Reliability and Security (ARES 2009), 16-19/3/2009, Fukuoka, Japan. 
  • Member of the Program Committee of the the Forth Workshop on Frontiers of Availability, Reliability and Security (FARES 2009) an International Workshop of Forth International Conference on Availability, Reliability and Security (ARES 2009), 16-19/3/2009, Fukuoka, Japan.
  • Member of the Technical Program Committees of the 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009), 9-12/11/2009, London, United Kingdom. 
  • Member of the Technical Program Committees of the Seventh ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09) IEEE, 10-13/5/2009, Rabat, Morocco.
  • Member of the Program Committee of the Fifth International Conference on Availability, Reliability and Security (ARES 2010), 15-18/2/2010, Krakow, Poland. 
  • Member of the Program Committee of the Second International Workshop on Organizational Security Aspects (OSA 2010) an International Workshop of Fifth International Conference on Availability, Reliability and Security (ARES 2010), 15-18/2/2010, Krakow, Poland.
  • Member of the International Program Committee of the Eighth International Network Conference 2010, (INC2010), 6-8/7/2010, ACM Germany, Heidelberg, Germany.
  • Member of the Technical Program Committees of the 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), 8-11/11/2010, London, United Kingdom.
  • Member of the Technical Program Committees of the 5th International Conference for Internet Technology and Secured Transactions (ICITST-2011), 11-14/12/2011, Abu Dhabi, United Arab Emirate. 
  • Member of the Program Committee of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), 22-26/8/2011, Vienna, Austria.
  • Member of the Program Committee of the Third International Workshop on Organizational Security Aspects (OSA 2011), in conjunction with ARES 2011, 22-26/8/2011, Vienna, Austria. 
  • Member of the Program Committee of the Fifth International Workshop on Secure Software Engineering”, in conjunction with ARES 2011, 22-26/8/2011, Vienna, Austria.
  • Member of the Program Committee of the Seventh International Conference on Availability, Reliability and Security (ARES 2012), 20-24/8/2012, Prague, Czech Republic. ional Workshop on Organizational Security Aspects (OSA 2012), in conjunction with ARES 2011, 20-24/8/2012, Prague, Czech Republic. 
  • Member of the Program Committee of the Sixth International Workshop on Secure Software Engineering”, in conjunction with ARES 2012, 20-24/8/2012, Prague, Czech Republic. 
  • Member of the International Program Committee of the Ninth International Network Conference 2012, (INC2012), 11-12/7/2012, Port Elizabeth, South Africa.
  • Member of the Technical Program Committee of the International Conference on Information Society (i-Society 2012), IEEE, 25-28/6/2012, London, UK.
  • Member of the Program Committee of the Eight International Conference on Availability, Reliability and Security (ARES 2013), 2-6/9/2013, Regensburg, Germany. 
  • Member of the Program Committee of the Fifth International Workshop on Organizational Security Aspects (OSA 2013), in conjunction with ARES 2013, 2-6/9/2013, Regensburg, Germany. 
  • Member of the Program Committee of the Seventh International Workshop on Secure Software Engineering, in conjunction with ARES 2013, 2-6/9/2013, Regensburg, Germany. (SCOPUS)
  • Member of the Technical Program Committee of the Eighth International Conference on Digital Telecommunications (ICDT 2013), 21-26/4/2013, Venice, Italy.
  • Member of the Technical Program Committee of the International Conference on Information Society (i-Society 2013), IEEE, 24-26/6/2013, Toronto, Canada.
  • Industry Program Chair and Member of the Program Committee of the 6th ACM International Conference on Security of Information and Networks (ACM SIN 2013), 26-28/11/2013, Aksaray, Turkey. 
  • Member of the Program Committee of the CAiSE Forum 2013, in conjunction with CAISE 2013 (25th International Conference on Advanced Information Systems Engineering), 17-21/6/2013, Valencia, Spain.
  • Member of the Program Committee of the IJSSE 2013, Special Issue of International Journal of Secure Software Engineering, IGI Global, 2013.
  • Additional Reviewers of the 32nd International Conference on Conceptual Modeling (ER 2013), 11-13/11/2013, Hong Kong, China.
  • Member of the International Program Committee of the Tenth International Network Conference 2014, (INC2014), TBC, Plymouth, United Kingdom.
  • Member of the Program Committee of INFORSID 2014 (32th congress), 20-23/5/2014, Lyon, France.
  • Member of the Technical Program Committee of the Ninth International Conference on Digital Telecommunications (ICDT 2014), 23-27/2/2014, Nice, France.
  • Member of the Program Committee of the Ninth International Conference on Availability, Reliability and Security (ARES 2014), 8-12/9/2014, Fribourg, Switzerland. 
  • Member of the Program Committee of the 7th ACM International Conference on Security of Information and Networks (ACM SIN 2014), 8-11/09/2014, Glasgow, United Kingdom.
  • Reviewer of the Journal of Information Security and Applications (JISA), special issue on Security of Information and Networks, Elsevier, 2014.
  • Member of the Technical Program Committee of the International Conference on Information Society (i-Society 2014), IEEE, 10-12/11/2014, London, UK.
  • Conference Committee Member of the 10th International Conference on Cyber Warfare and Security (ICCWS-2015), 24-45/3/2015, Gauteng, South Africa.
  • Member of the Program Committee of the 7th International Conference on Agents and Artificial Intelligence (ICAART 2015), 10-12/1/2015, Lisbon, Portugal.
  • Member of the Technical Program Committee (TPC) of the 7th International Conference on Intelligent Networking and Collaborative Systems INCoS-2015, in Conjunction with 18th NBiS 2015, 2-4/9/2015, Taipei, Taiwan.
  • Member of the Program Committee of the 8th ACM International Conference on Security of Information and Networks (ACM SIN 2015), 8-10/09/2015, Sochi, Russia.
  • Member of the Program Committee of the 10th International Conference on Availability, Reliability and Security (ARES 2015), 24-28/8/2015, Toulouse, France. 
  • Member of the Program Committee of the Workshop on Transformation & Engineering of Enterprises (TEE), co-located with the 17th Conference on Business Informatics (CBI 2015), 13-16/7/2015, Lisbon, Portugal.
  • Member of the Program Committee of the 8th International Conference on Agents and Artificial Intelligence (ICAART 2016), 24-26/2/2016, Rome, Italy.
More information on Christophe and his research can be found at his homepage and linkedin: https://lu.linkedin.com/in/cfeltus