Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anne V. D. M. Kayem
@inproceedings{DBLP:conf/aina/ShahriarKK24, author = {Md Hasan Shahriar and Abrar Hasin Kamal and Anne V. D. M. Kayem}, editor = {Leonard Barolli}, title = {Discovering Personally Identifiable Information in Textual Data - {A} Case Study with Automated Concatenation of Embeddings}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {202}, pages = {145--158}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57916-5\_13}, doi = {10.1007/978-3-031-57916-5\_13}, timestamp = {Mon, 15 Apr 2024 13:38:54 +0200}, biburl = {https://dblp.org/rec/conf/aina/ShahriarKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/IslamKM23, author = {Md. Rakibul Islam and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Christine Strauss and Toshiyuki Amagasa and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Enabling {PII} Discovery in Textual Data via Outlier Detection}, booktitle = {Database and Expert Systems Applications - 34th International Conference, {DEXA} 2023, Penang, Malaysia, August 28-30, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14147}, pages = {209--216}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39821-6\_17}, doi = {10.1007/978-3-031-39821-6\_17}, timestamp = {Sat, 30 Sep 2023 09:38:52 +0200}, biburl = {https://dblp.org/rec/conf/dexa/IslamKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MotlaghKM22, author = {Farzad Nourmohammadzadeh Motlagh and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April 2022, Volume 1}, series = {Lecture Notes in Networks and Systems}, volume = {449}, pages = {140--151}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99584-3\_13}, doi = {10.1007/978-3-030-99584-3\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/MotlaghKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PodlesnyKM22, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Christine Strauss and Alfredo Cuzzocrea and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {CoK: {A} Survey of Privacy Challenges in Relation to Data Meshes}, booktitle = {Database and Expert Systems Applications - 33rd International Conference, {DEXA} 2022, Vienna, Austria, August 22-24, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13426}, pages = {85--102}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-12423-5\_7}, doi = {10.1007/978-3-031-12423-5\_7}, timestamp = {Tue, 21 Mar 2023 20:59:57 +0100}, biburl = {https://dblp.org/rec/conf/dexa/PodlesnyKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/PodlesnyKM21, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, title = {A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {50}, pages = {1--24}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64553-6\_1}, doi = {10.1007/978-3-662-64553-6\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/PodlesnyKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PodlesnyKM21, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Leonard Barolli and Isaac Woungang and Tomoya Enokido}, title = {A Review of Scaling Genome Sequencing Data Anonymisation}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 3}, series = {Lecture Notes in Networks and Systems}, volume = {227}, pages = {491--501}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75078-7\_49}, doi = {10.1007/978-3-030-75078-7\_49}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/PodlesnyKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/PodlesnyKM21a, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Leonard Barolli and Isaac Woungang and Tomoya Enokido}, title = {{GPU} Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {226}, pages = {495--508}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75075-6\_40}, doi = {10.1007/978-3-030-75075-6\_40}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/PodlesnyKM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/MotlaghKPM21, author = {Farzad Nourmohammadzadeh Motlagh and Anne Kayem and Nikolai Jannik Podlesny and Christoph Meinel}, editor = {Eric Pardede and Maria Indrawan{-}Santiago and Pari Delir Haghighi and Matthias Steinbauer and Ismail Khalil and Gabriele Kotsis}, title = {Enabling Co-owned Image Privacy on Social Media via Agent Negotiation}, booktitle = {iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021 - 1 December 2021}, pages = {152--156}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487664.3487685}, doi = {10.1145/3487664.3487685}, timestamp = {Tue, 04 Jan 2022 16:26:56 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/MotlaghKPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KayemPML21, author = {Anne V. D. M. Kayem and Nikolai J. Podlesny and Christoph Meinel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {704--714}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010552207040714}, doi = {10.5220/0010552207040714}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KayemPML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/PodlesnyKM19, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Attribute Compartmentation and Greedy {UCC} Discovery for High-Dimensional Data Anonymization}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {109--119}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300019}, doi = {10.1145/3292006.3300019}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/PodlesnyKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/PodlesnyKM19, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, title = {Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold}, booktitle = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, pages = {556--563}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00110}, doi = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00110}, timestamp = {Sun, 10 Nov 2019 16:47:28 +0100}, biburl = {https://dblp.org/rec/conf/dasc/PodlesnyKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PodlesnyKM19, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Sven Hartmann and Josef K{\"{u}}ng and Sharma Chakravarthy and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {Towards Identifying De-anonymisation Risks in Distributed Health Data Silos}, booktitle = {Database and Expert Systems Applications - 30th International Conference, {DEXA} 2019, Linz, Austria, August 26-29, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11706}, pages = {33--43}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27615-7\_3}, doi = {10.1007/978-3-030-27615-7\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/PodlesnyKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ehealth/PodlesnyKMJ19, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Christoph Meinel and Sven Jungmann}, editor = {Patty Kostkova and Caroline Wood and Arnold Bosman and Floriana Grasso and Michael Edelstein}, title = {How Data Anonymisation Techniques influence Disease Triage in Digital Health: {A} Study on Base Rate Neglect}, booktitle = {Proceedings of the 9th International Conference on Digital Public Health, {PDH} 2019, Marseille, France, November 20-23, 2019}, pages = {55--62}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357729.3357737}, doi = {10.1145/3357729.3357737}, timestamp = {Tue, 26 Nov 2019 10:09:19 +0100}, biburl = {https://dblp.org/rec/conf/ehealth/PodlesnyKMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/KayemVM18, author = {Anne V. D. M. Kayem and C. T. Vester and Christoph Meinel}, title = {Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {38}, pages = {27--60}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58384-5\_2}, doi = {10.1007/978-3-662-58384-5\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/KayemVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/AmbassaKWM18, author = {Pacome Landry Ambassa and Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Privacy Risks in Resource Constrained Smart Micro-Grids}, booktitle = {32nd International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May 16-18, 2018}, pages = {527--532}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/WAINA.2018.00139}, doi = {10.1109/WAINA.2018.00139}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/AmbassaKWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/TorkuraSMK0GM18, author = {Kennedy A. Torkura and Muhammad I. H. Sukmana and Michael Meinig and Anne V. D. M. Kayem and Feng Cheng and Hendrik Graupner and Christoph Meinel}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Securing Cloud Storage Brokerage Systems Through Threat Models}, booktitle = {32nd {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018}, pages = {759--768}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AINA.2018.00114}, doi = {10.1109/AINA.2018.00114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/TorkuraSMK0GM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PodlesnyKSU18, author = {Nikolai J. Podlesny and Anne V. D. M. Kayem and Stephan von Schorlemer and Matthias Uflacker}, editor = {Sven Hartmann and Hui Ma and Abdelkader Hameurlain and G{\"{u}}nther Pernul and Roland R. Wagner}, title = {Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing}, booktitle = {Database and Expert Systems Applications - 29th International Conference, {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11029}, pages = {85--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98809-2\_6}, doi = {10.1007/978-3-319-98809-2\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/PodlesnyKSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/TorkuraSK18, author = {Kennedy A. Torkura and Muhammad I. H. Sukmana and Anne V. D. M. Kayem}, editor = {Jinjun Chen and Laurence T. Yang}, title = {A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Ubiquitous Computing {\&} Communications, Big Data {\&} Cloud Computing, Social Computing {\&} Networking, Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13, 2018}, pages = {932--939}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BDCloud.2018.00137}, doi = {10.1109/BDCLOUD.2018.00137}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/TorkuraSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KayemWM18, author = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Power Systems: {A} Matter of Security and Privacy}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {1--8}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_1}, doi = {10.1007/978-3-319-91427-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KayemWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KayemMW18, author = {Anne V. D. M. Kayem and Christoph Meinel and Stephen D. Wolthusen}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {71--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_5}, doi = {10.1007/978-3-319-91427-5\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KayemMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MarufuKW18, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {103--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_6}, doi = {10.1007/978-3-319-91427-5\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MarufuKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AmbassaKWM18, author = {Pacome L. Ambassa and Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Inferring Private User Behaviour Based on Information Leakage}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {145--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_7}, doi = {10.1007/978-3-319-91427-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AmbassaKWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/71, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5}, doi = {10.1007/978-3-319-91427-5}, isbn = {978-3-319-91426-8}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KayemMW17, author = {Anne V. D. M. Kayem and Christoph Meinel and Stephen D. Wolthusen}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu and Chi{-}Yi Lin}, title = {A Smart Micro-Grid Architecture for Resource Constrained Environments}, booktitle = {31st {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017}, pages = {857--864}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AINA.2017.36}, doi = {10.1109/AINA.2017.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KayemMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/KayemM17, author = {Anne V. D. M. Kayem and Christoph Meinel}, editor = {Djamal Benslimane and Ernesto Damiani and William I. Grosky and Abdelkader Hameurlain and Amit P. Sheth and Roland R. Wagner}, title = {Clustering Heuristics for Efficient t-closeness Anonymisation}, booktitle = {Database and Expert Systems Applications - 28th International Conference, {DEXA} 2017, Lyon, France, August 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10439}, pages = {27--34}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64471-4\_3}, doi = {10.1007/978-3-319-64471-4\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/KayemM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/SakpereK17, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, editor = {Marit Hansen and Eleni Kosta and Igor Nai Fovino and Simone Fischer{-}H{\"{u}}bner}, title = {On Anonymizing Streaming Crime Data: {A} Solution Approach for Resource Constrained Environments}, booktitle = {Privacy and Identity Management. The Smart Revolution - 12th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {526}, pages = {170--186}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-92925-5\_11}, doi = {10.1007/978-3-319-92925-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/SakpereK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KayemSWM16, author = {Anne V. D. M. Kayem and Heinrich Strauss and Stephen D. Wolthusen and Christoph Meinel}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Antonio J. Jara and Yann Bocchi}, title = {Key Management for Secure Demand Data Communication in Constrained Micro-Grids}, booktitle = {30th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016}, pages = {585--590}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WAINA.2016.32}, doi = {10.1109/WAINA.2016.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KayemSWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/Kayem16, author = {Anne V. D. M. Kayem}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Antonio J. Jara and Yann Bocchi}, title = {Graphical Passwords - {A} Discussion}, booktitle = {30th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016}, pages = {596--600}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WAINA.2016.31}, doi = {10.1109/WAINA.2016.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/Kayem16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/AmbassaKWM16, author = {Pacome L. Ambassa and Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Antonio J. Jara and Yann Bocchi}, title = {Privacy Violations in Constrained Micro-Grids: Adversarial Cases}, booktitle = {30th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016}, pages = {601--606}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WAINA.2016.98}, doi = {10.1109/WAINA.2016.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/AmbassaKWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Grigore M. Hav{\^{a}}rneanu and Roberto Setola and Hypatia Nassopoulos and Stephen D. Wolthusen}, title = {Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating}, booktitle = {Critical Information Infrastructures Security - 11th International Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10242}, pages = {137--149}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-71368-7\_12}, doi = {10.1007/978-3-319-71368-7\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/MarufuKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/StraussKW16, author = {Heinrich Strauss and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Grigore M. Hav{\^{a}}rneanu and Roberto Setola and Hypatia Nassopoulos and Stephen D. Wolthusen}, title = {Reliable Key Distribution in Smart Micro-Grids}, booktitle = {Critical Information Infrastructures Security - 11th International Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10242}, pages = {265--270}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-71368-7\_22}, doi = {10.1007/978-3-319-71368-7\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/StraussKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/KayemVM16, author = {Anne V. D. M. Kayem and C. T. Vester and Christoph Meinel}, editor = {Sven Hartmann and Hui Ma}, title = {Automated k-Anonymization and l-Diversity for Shared Data Privacy}, booktitle = {Database and Expert Systems Applications - 27th International Conference, {DEXA} 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9827}, pages = {105--120}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44403-1\_7}, doi = {10.1007/978-3-319-44403-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/KayemVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AmbassaWKM16, author = {Pacome L. Ambassa and Stephen D. Wolthusen and Anne V. D. M. Kayem and Christoph Meinel}, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids}, booktitle = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, pages = {52--68}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61437-3\_4}, doi = {10.1007/978-3-319-61437-3\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AmbassaWKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeldehawaryatAM16, author = {Goitom K. Weldehawaryat and Pacome L. Ambassa and Anesu M. C. Marufu and Stephen D. Wolthusen and Anne V. D. M. Kayem}, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security}, booktitle = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, pages = {69--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61437-3\_5}, doi = {10.1007/978-3-319-61437-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WeldehawaryatAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids}, booktitle = {18th {IEEE} International Conference on High Performance Computing and Communications; 14th {IEEE} International Conference on Smart City; 2nd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}, pages = {1380--1387}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0195}, doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0195}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/MarufuKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a, author = {Ammar Abuelgasim and Anne V. D. M. Kayem}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {108--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_7}, doi = {10.1007/978-3-319-54433-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbuelgasimK16, author = {Ammar Abuelgasim and Anne Kayem}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {An Approach to Personalized Privacy Policy Recommendations on Online Social Networks}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {126--137}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005689701260137}, doi = {10.5220/0005689701260137}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbuelgasimK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MarufuKW16, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {448--456}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005744304480456}, doi = {10.5220/0005744304480456}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MarufuKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SsembatyaK15, author = {Richard Ssembatya and Anne V. D. M. Kayem}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {411--416}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.113}, doi = {10.1109/WAINA.2015.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SsembatyaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SakpereKN15, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem and Thabo Ndlovu}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {A Usable and Secure Crime Reporting System for Technology Resource Constrained Context}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {424--429}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.97}, doi = {10.1109/WAINA.2015.97}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SakpereKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/MarufuKW15, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Erich Rome and Marianthi Theocharidou and Stephen D. Wolthusen}, title = {A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids}, booktitle = {Critical Information Infrastructures Security - 10th International Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9578}, pages = {183--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-33331-1\_15}, doi = {10.1007/978-3-319-33331-1\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/MarufuKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnss/AmbassaKWM15, author = {Pacome L. Ambassa and Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Robin Doss and Selwyn Piramuthu and Wei Zhou}, title = {Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids}, booktitle = {Future Network Systems and Security - First International Conference, {FNSS} 2015, Paris, France, June 11-13, 2015, Proceedings}, series = {Communications in Computer and Information Science}, volume = {523}, pages = {166--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19210-9\_12}, doi = {10.1007/978-3-319-19210-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnss/AmbassaKWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15a, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences}, booktitle = {Information Systems Security and Privacy - First International Conference, {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {576}, pages = {122--136}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27668-7\_8}, doi = {10.1007/978-3-319-27668-7\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SakpereK15, author = {Aderonke Busayo Sakpere and Anne V. D. M. Kayem}, editor = {Olivier Camp and Edgar R. Weippl and Christophe Bidan and Esma A{\"{\i}}meur}, title = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss}, booktitle = {{ICISSP} 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015}, pages = {191--201}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005288901910201}, doi = {10.5220/0005288901910201}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SakpereK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgta/AmbassaWKM15, author = {Pacome L. Ambassa and Stephen D. Wolthusen and Anne V. D. M. Kayem and Christoph Meinel}, title = {Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids}, booktitle = {2015 {IEEE} Innovative Smart Grid Technologies - Asia {(ISGT} Asia), Bangkok, Thailand, November 3-6, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISGT-Asia.2015.7387160}, doi = {10.1109/ISGT-ASIA.2015.7387160}, timestamp = {Thu, 31 Mar 2022 12:07:51 +0200}, biburl = {https://dblp.org/rec/conf/isgta/AmbassaWKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BurkeK14, author = {Mark{-}John Burke and Anne V. D. M. Kayem}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments}, booktitle = {28th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada, May 13-16, 2014}, pages = {833--840}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/WAINA.2014.131}, doi = {10.1109/WAINA.2014.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/BurkeK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/KayemEM14, author = {Anne V. D. M. Kayem and Khalid Elgazzar and Patrick Martin}, editor = {Hendrik Decker and Lenka Lhotsk{\'{a}} and Sebastian Link and Marcus Spies and Roland R. Wagner}, title = {Secure and Efficient Data Placement in Mobile Healthcare Services}, booktitle = {Database and Expert Systems Applications - 25th International Conference, {DEXA} 2014, Munich, Germany, September 1-4, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8644}, pages = {352--361}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10073-9\_29}, doi = {10.1007/978-3-319-10073-9\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/KayemEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/AdamatzkyAADIIJKMOPSSSY13, author = {Andrew Adamatzky and Selim G. Akl and Ram{\'{o}}n Alonso{-}Sanz and Wesley van Dessel and Zuwairie Ibrahim and Andrew Ilachinski and Jeff Jones and Anne V. D. M. Kayem and Genaro Ju{\'{a}}rez Mart{\'{\i}}nez and Pedro Paulo Balbi de Oliveira and Mikhail Prokopenko and Theresa Schubert and Peter M. A. Sloot and Emanuele Strano and Xin{-}She Yang}, title = {Are motorways rational from slime mould's point of view?}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {28}, number = {3}, pages = {230--248}, year = {2013}, url = {https://doi.org/10.1080/17445760.2012.685884}, doi = {10.1080/17445760.2012.685884}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/paapp/AdamatzkyAADIIJKMOPSSSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dev/SsembatyaKM13, author = {Richard Ssembatya and Anne V. D. M. Kayem and Gary Marsden}, editor = {Bill Thies and Amit Nanavati}, title = {On the challenge of adopting standard {EHR} systems in developing countries}, booktitle = {Annual Symposium on Computing for Development, {ACM} {DEV} '13, Bangalore, India - January 11 - 12, 2013}, pages = {23:1--23:2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2442882.2442911}, doi = {10.1145/2442882.2442911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dev/SsembatyaKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KayemDH12, author = {Anne V. D. M. Kayem and Azhar Deshai and Stuart Hammer}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {On anonymizing social network graphs}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320456}, doi = {10.1109/ISSA.2012.6320456}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/KayemDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-2851, author = {Andrew Adamatzky and Selim G. Akl and Ram{\'{o}}n Alonso{-}Sanz and Wesley van Dessel and Zuwairie Ibrahim and Andrew Ilachinski and Jeff Jones and Anne V. D. M. Kayem and Genaro Ju{\'{a}}rez Mart{\'{\i}}nez and Pedro Paulo Balbi de Oliveira and Mikhail Prokopenko and Theresa Schubert and Peter M. A. Sloot and Emanuele Strano and Xin{-}She Yang}, title = {Are motorways rational from slime mould's point of view?}, journal = {CoRR}, volume = {abs/1203.2851}, year = {2012}, url = {http://arxiv.org/abs/1203.2851}, eprinttype = {arXiv}, eprint = {1203.2851}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-2851.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KayemMA11, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl}, title = {Enhancing identity trust in cryptographic key management systems for dynamic environments}, journal = {Secur. Commun. Networks}, volume = {4}, number = {1}, pages = {79--94}, year = {2011}, url = {https://doi.org/10.1002/sec.164}, doi = {10.1002/SEC.164}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KayemMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KayemMA11, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KayemMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KayemAM10, author = {Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin}, title = {Adaptive Cryptographic Access Control}, series = {Advances in Information Security}, volume = {48}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6655-1}, doi = {10.1007/978-1-4419-6655-1}, isbn = {978-0-387-77265-3}, timestamp = {Mon, 20 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/KayemAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Kayem10, author = {Anne Kayem}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {On Monitoring Information Flow of Outsourced Data}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/82\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Kayem10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KayemAM08, author = {Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin}, title = {On replacing cryptographic keys in hierarchical key management systems}, journal = {J. Comput. Secur.}, volume = {16}, number = {3}, pages = {289--309}, year = {2008}, url = {https://doi.org/10.3233/jcs-2008-16303}, doi = {10.3233/JCS-2008-16303}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KayemAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saso/KayemMAP08, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl and Wendy Powley}, editor = {Sven A. Brueckner and Paul Robertson and Umesh Bellur}, title = {A Framework for Self-Protecting Cryptographic Key Management}, booktitle = {Second {IEEE} International Conference on Self-Adaptive and Self-Organizing Systems, {SASO} 2008, 20-24 October 2008, Venice, Italy}, pages = {191--200}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SASO.2008.57}, doi = {10.1109/SASO.2008.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saso/KayemMAP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KayemMA07, author = {Anne V. D. M. Kayem and Patrick Martin and Selim G. Akl}, title = {Heuristics for Improving Cryptographic Key Assignment in a Hierarchy}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {531--536}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.197}, doi = {10.1109/AINAW.2007.197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KayemMA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcs/KayemAM05, author = {Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin}, editor = {S. Q. Zheng}, title = {An Independent Set Approach to Solving the Collaborative Attack Problem}, booktitle = {International Conference on Parallel and Distributed Computing Systems, {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}}, pages = {594--599}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/pdcs/KayemAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.