BibTeX records: Anne V. D. M. Kayem

download as .bib file

@inproceedings{DBLP:conf/aina/ShahriarKK24,
  author       = {Md Hasan Shahriar and
                  Abrar Hasin Kamal and
                  Anne V. D. M. Kayem},
  editor       = {Leonard Barolli},
  title        = {Discovering Personally Identifiable Information in Textual Data -
                  {A} Case Study with Automated Concatenation of Embeddings},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 38th International Conference on Advanced Information Networking
                  and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024,
                  Volume 4},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {202},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57916-5\_13},
  doi          = {10.1007/978-3-031-57916-5\_13},
  timestamp    = {Mon, 15 Apr 2024 13:38:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/ShahriarKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/IslamKM23,
  author       = {Md. Rakibul Islam and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Christine Strauss and
                  Toshiyuki Amagasa and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Enabling {PII} Discovery in Textual Data via Outlier Detection},
  booktitle    = {Database and Expert Systems Applications - 34th International Conference,
                  {DEXA} 2023, Penang, Malaysia, August 28-30, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14147},
  pages        = {209--216},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39821-6\_17},
  doi          = {10.1007/978-3-031-39821-6\_17},
  timestamp    = {Sat, 30 Sep 2023 09:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/IslamKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MotlaghKM22,
  author       = {Farzad Nourmohammadzadeh Motlagh and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing
                  on Social Media},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April
                  2022, Volume 1},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {449},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99584-3\_13},
  doi          = {10.1007/978-3-030-99584-3\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/MotlaghKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PodlesnyKM22,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Christine Strauss and
                  Alfredo Cuzzocrea and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {CoK: {A} Survey of Privacy Challenges in Relation to Data Meshes},
  booktitle    = {Database and Expert Systems Applications - 33rd International Conference,
                  {DEXA} 2022, Vienna, Austria, August 22-24, 2022, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13426},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-12423-5\_7},
  doi          = {10.1007/978-3-031-12423-5\_7},
  timestamp    = {Tue, 21 Mar 2023 20:59:57 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/PodlesnyKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/PodlesnyKM21,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  title        = {A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {50},
  pages        = {1--24},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64553-6\_1},
  doi          = {10.1007/978-3-662-64553-6\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/PodlesnyKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PodlesnyKM21,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Isaac Woungang and
                  Tomoya Enokido},
  title        = {A Review of Scaling Genome Sequencing Data Anonymisation},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 35th International Conference on Advanced Information Networking
                  and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021,
                  Volume 3},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {227},
  pages        = {491--501},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75078-7\_49},
  doi          = {10.1007/978-3-030-75078-7\_49},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/PodlesnyKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PodlesnyKM21a,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Isaac Woungang and
                  Tomoya Enokido},
  title        = {{GPU} Accelerated Bayesian Inference for Quasi-Identifier Discovery
                  in High-Dimensional Data},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 35th International Conference on Advanced Information Networking
                  and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {226},
  pages        = {495--508},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75075-6\_40},
  doi          = {10.1007/978-3-030-75075-6\_40},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/PodlesnyKM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/MotlaghKPM21,
  author       = {Farzad Nourmohammadzadeh Motlagh and
                  Anne Kayem and
                  Nikolai Jannik Podlesny and
                  Christoph Meinel},
  editor       = {Eric Pardede and
                  Maria Indrawan{-}Santiago and
                  Pari Delir Haghighi and
                  Matthias Steinbauer and
                  Ismail Khalil and
                  Gabriele Kotsis},
  title        = {Enabling Co-owned Image Privacy on Social Media via Agent Negotiation},
  booktitle    = {iiWAS2021: The 23rd International Conference on Information Integration
                  and Web Intelligence, Linz, Austria, 29 November 2021 - 1 December
                  2021},
  pages        = {152--156},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487664.3487685},
  doi          = {10.1145/3487664.3487685},
  timestamp    = {Tue, 04 Jan 2022 16:26:56 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/MotlaghKPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KayemPML21,
  author       = {Anne V. D. M. Kayem and
                  Nikolai J. Podlesny and
                  Christoph Meinel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {704--714},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010552207040714},
  doi          = {10.5220/0010552207040714},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KayemPML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PodlesnyKM19,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Attribute Compartmentation and Greedy {UCC} Discovery for High-Dimensional
                  Data Anonymization},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {109--119},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300019},
  doi          = {10.1145/3292006.3300019},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/PodlesnyKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/PodlesnyKM19,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  title        = {Identifying Data Exposure Across Distributed High-Dimensional Health
                  Data Silos through Bayesian Networks Optimised by Multigrid and Manifold},
  booktitle    = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud
                  and Big Data Computing, Intl Conf on Cyber Science and Technology
                  Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August
                  5-8, 2019},
  pages        = {556--563},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00110},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00110},
  timestamp    = {Sun, 10 Nov 2019 16:47:28 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/PodlesnyKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PodlesnyKM19,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Sven Hartmann and
                  Josef K{\"{u}}ng and
                  Sharma Chakravarthy and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Towards Identifying De-anonymisation Risks in Distributed Health Data
                  Silos},
  booktitle    = {Database and Expert Systems Applications - 30th International Conference,
                  {DEXA} 2019, Linz, Austria, August 26-29, 2019, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11706},
  pages        = {33--43},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27615-7\_3},
  doi          = {10.1007/978-3-030-27615-7\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/PodlesnyKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ehealth/PodlesnyKMJ19,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Christoph Meinel and
                  Sven Jungmann},
  editor       = {Patty Kostkova and
                  Caroline Wood and
                  Arnold Bosman and
                  Floriana Grasso and
                  Michael Edelstein},
  title        = {How Data Anonymisation Techniques influence Disease Triage in Digital
                  Health: {A} Study on Base Rate Neglect},
  booktitle    = {Proceedings of the 9th International Conference on Digital Public
                  Health, {PDH} 2019, Marseille, France, November 20-23, 2019},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357729.3357737},
  doi          = {10.1145/3357729.3357737},
  timestamp    = {Tue, 26 Nov 2019 10:09:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ehealth/PodlesnyKMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/KayemVM18,
  author       = {Anne V. D. M. Kayem and
                  C. T. Vester and
                  Christoph Meinel},
  title        = {Syntactic Anonymisation of Shared Datasets in Resource Constrained
                  Environments},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {38},
  pages        = {27--60},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58384-5\_2},
  doi          = {10.1007/978-3-662-58384-5\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/KayemVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AmbassaKWM18,
  author       = {Pacome Landry Ambassa and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Privacy Risks in Resource Constrained Smart Micro-Grids},
  booktitle    = {32nd International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May
                  16-18, 2018},
  pages        = {527--532},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/WAINA.2018.00139},
  doi          = {10.1109/WAINA.2018.00139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/AmbassaKWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/TorkuraSMK0GM18,
  author       = {Kennedy A. Torkura and
                  Muhammad I. H. Sukmana and
                  Michael Meinig and
                  Anne V. D. M. Kayem and
                  Feng Cheng and
                  Hendrik Graupner and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Securing Cloud Storage Brokerage Systems Through Threat Models},
  booktitle    = {32nd {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018},
  pages        = {759--768},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AINA.2018.00114},
  doi          = {10.1109/AINA.2018.00114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/TorkuraSMK0GM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PodlesnyKSU18,
  author       = {Nikolai J. Podlesny and
                  Anne V. D. M. Kayem and
                  Stephan von Schorlemer and
                  Matthias Uflacker},
  editor       = {Sven Hartmann and
                  Hui Ma and
                  Abdelkader Hameurlain and
                  G{\"{u}}nther Pernul and
                  Roland R. Wagner},
  title        = {Minimising Information Loss on Anonymised High Dimensional Data with
                  Greedy In-Memory Processing},
  booktitle    = {Database and Expert Systems Applications - 29th International Conference,
                  {DEXA} 2018, Regensburg, Germany, September 3-6, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11029},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98809-2\_6},
  doi          = {10.1007/978-3-319-98809-2\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/PodlesnyKSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/TorkuraSK18,
  author       = {Kennedy A. Torkura and
                  Muhammad I. H. Sukmana and
                  Anne V. D. M. Kayem},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {A Cyber Risk Based Moving Target Defense Mechanism for Microservice
                  Architectures},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Ubiquitous Computing {\&} Communications, Big
                  Data {\&} Cloud Computing, Social Computing {\&} Networking,
                  Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom
                  2018, Melbourne, Australia, December 11-13, 2018},
  pages        = {932--939},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BDCloud.2018.00137},
  doi          = {10.1109/BDCLOUD.2018.00137},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/TorkuraSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KayemWM18,
  author       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Power Systems: {A} Matter of Security and Privacy},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_1},
  doi          = {10.1007/978-3-319-91427-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KayemWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KayemMW18,
  author       = {Anne V. D. M. Kayem and
                  Christoph Meinel and
                  Stephen D. Wolthusen},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {A Resilient Smart Micro-Grid Architecture for Resource Constrained
                  Environments},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {71--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_5},
  doi          = {10.1007/978-3-319-91427-5\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KayemMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MarufuKW18,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {The Design and Classification of Cheating Attacks on Power Marketing
                  Schemes in Resource Constrained Smart Micro-Grids},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {103--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_6},
  doi          = {10.1007/978-3-319-91427-5\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MarufuKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AmbassaKWM18,
  author       = {Pacome L. Ambassa and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Inferring Private User Behaviour Based on Information Leakage},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_7},
  doi          = {10.1007/978-3-319-91427-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AmbassaKWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/71,
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5},
  doi          = {10.1007/978-3-319-91427-5},
  isbn         = {978-3-319-91426-8},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/KayemMW17,
  author       = {Anne V. D. M. Kayem and
                  Christoph Meinel and
                  Stephen D. Wolthusen},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu and
                  Chi{-}Yi Lin},
  title        = {A Smart Micro-Grid Architecture for Resource Constrained Environments},
  booktitle    = {31st {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017},
  pages        = {857--864},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AINA.2017.36},
  doi          = {10.1109/AINA.2017.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/KayemMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/KayemM17,
  author       = {Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Djamal Benslimane and
                  Ernesto Damiani and
                  William I. Grosky and
                  Abdelkader Hameurlain and
                  Amit P. Sheth and
                  Roland R. Wagner},
  title        = {Clustering Heuristics for Efficient t-closeness Anonymisation},
  booktitle    = {Database and Expert Systems Applications - 28th International Conference,
                  {DEXA} 2017, Lyon, France, August 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10439},
  pages        = {27--34},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64471-4\_3},
  doi          = {10.1007/978-3-319-64471-4\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/KayemM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/SakpereK17,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  editor       = {Marit Hansen and
                  Eleni Kosta and
                  Igor Nai Fovino and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {On Anonymizing Streaming Crime Data: {A} Solution Approach for Resource
                  Constrained Environments},
  booktitle    = {Privacy and Identity Management. The Smart Revolution - 12th {IFIP}
                  {WG} 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School,
                  Ispra, Italy, September 4-8, 2017, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {526},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-92925-5\_11},
  doi          = {10.1007/978-3-319-92925-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/SakpereK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/KayemSWM16,
  author       = {Anne V. D. M. Kayem and
                  Heinrich Strauss and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Antonio J. Jara and
                  Yann Bocchi},
  title        = {Key Management for Secure Demand Data Communication in Constrained
                  Micro-Grids},
  booktitle    = {30th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
                  March 23-25, 2016},
  pages        = {585--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WAINA.2016.32},
  doi          = {10.1109/WAINA.2016.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/KayemSWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/Kayem16,
  author       = {Anne V. D. M. Kayem},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Antonio J. Jara and
                  Yann Bocchi},
  title        = {Graphical Passwords - {A} Discussion},
  booktitle    = {30th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
                  March 23-25, 2016},
  pages        = {596--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WAINA.2016.31},
  doi          = {10.1109/WAINA.2016.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/Kayem16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AmbassaKWM16,
  author       = {Pacome L. Ambassa and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Antonio J. Jara and
                  Yann Bocchi},
  title        = {Privacy Violations in Constrained Micro-Grids: Adversarial Cases},
  booktitle    = {30th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
                  March 23-25, 2016},
  pages        = {601--606},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WAINA.2016.98},
  doi          = {10.1109/WAINA.2016.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/AmbassaKWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/MarufuKW16,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Grigore M. Hav{\^{a}}rneanu and
                  Roberto Setola and
                  Hypatia Nassopoulos and
                  Stephen D. Wolthusen},
  title        = {Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating},
  booktitle    = {Critical Information Infrastructures Security - 11th International
                  Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10242},
  pages        = {137--149},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-71368-7\_12},
  doi          = {10.1007/978-3-319-71368-7\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/MarufuKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/StraussKW16,
  author       = {Heinrich Strauss and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Grigore M. Hav{\^{a}}rneanu and
                  Roberto Setola and
                  Hypatia Nassopoulos and
                  Stephen D. Wolthusen},
  title        = {Reliable Key Distribution in Smart Micro-Grids},
  booktitle    = {Critical Information Infrastructures Security - 11th International
                  Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10242},
  pages        = {265--270},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-71368-7\_22},
  doi          = {10.1007/978-3-319-71368-7\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/StraussKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/KayemVM16,
  author       = {Anne V. D. M. Kayem and
                  C. T. Vester and
                  Christoph Meinel},
  editor       = {Sven Hartmann and
                  Hui Ma},
  title        = {Automated k-Anonymization and l-Diversity for Shared Data Privacy},
  booktitle    = {Database and Expert Systems Applications - 27th International Conference,
                  {DEXA} 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9827},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44403-1\_7},
  doi          = {10.1007/978-3-319-44403-1\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/KayemVM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmbassaWKM16,
  author       = {Pacome L. Ambassa and
                  Stephen D. Wolthusen and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Physical Attestation and Authentication to Detect Cheating in Resource
                  Constrained Smart Micro-grids},
  booktitle    = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  pages        = {52--68},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61437-3\_4},
  doi          = {10.1007/978-3-319-61437-3\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AmbassaWKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeldehawaryatAM16,
  author       = {Goitom K. Weldehawaryat and
                  Pacome L. Ambassa and
                  Anesu M. C. Marufu and
                  Stephen D. Wolthusen and
                  Anne V. D. M. Kayem},
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation
                  and Security},
  booktitle    = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61437-3\_5},
  doi          = {10.1007/978-3-319-61437-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeldehawaryatAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/MarufuKW16,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Circumventing Cheating on Power Auctioning in Resource Constrained
                  Micro-Grids},
  booktitle    = {18th {IEEE} International Conference on High Performance Computing
                  and Communications; 14th {IEEE} International Conference on Smart
                  City; 2nd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages        = {1380--1387},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0195},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2016.0195},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/MarufuKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16a,
  author       = {Ammar Abuelgasim and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {A Snow-Ball Algorithm for Automating Privacy Policy Configuration
                  in Social Media},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {108--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_7},
  doi          = {10.1007/978-3-319-54433-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbuelgasimK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbuelgasimK16,
  author       = {Ammar Abuelgasim and
                  Anne Kayem},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {An Approach to Personalized Privacy Policy Recommendations on Online
                  Social Networks},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {126--137},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005689701260137},
  doi          = {10.5220/0005689701260137},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbuelgasimK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MarufuKW16,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Fault-tolerant Distributed Continuous Double Auctioning on Computationally
                  Constrained Microgrids},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {448--456},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005744304480456},
  doi          = {10.5220/0005744304480456},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MarufuKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SsembatyaK15,
  author       = {Richard Ssembatya and
                  Anne V. D. M. Kayem},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido and
                  Jong Hyuk Park},
  title        = {Secure and Efficient Mobile Personal Health Data Sharing in Resource
                  Constrained Environments},
  booktitle    = {29th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South
                  Korea, March 24-27, 2015},
  pages        = {411--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/WAINA.2015.113},
  doi          = {10.1109/WAINA.2015.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SsembatyaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SakpereKN15,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem and
                  Thabo Ndlovu},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido and
                  Jong Hyuk Park},
  title        = {A Usable and Secure Crime Reporting System for Technology Resource
                  Constrained Context},
  booktitle    = {29th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South
                  Korea, March 24-27, 2015},
  pages        = {424--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/WAINA.2015.97},
  doi          = {10.1109/WAINA.2015.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SakpereKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/MarufuKW15,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Erich Rome and
                  Marianthi Theocharidou and
                  Stephen D. Wolthusen},
  title        = {A Distributed Continuous Double Auction Framework for Resource Constrained
                  Microgrids},
  booktitle    = {Critical Information Infrastructures Security - 10th International
                  Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9578},
  pages        = {183--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-33331-1\_15},
  doi          = {10.1007/978-3-319-33331-1\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/MarufuKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnss/AmbassaKWM15,
  author       = {Pacome L. Ambassa and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Robin Doss and
                  Selwyn Piramuthu and
                  Wei Zhou},
  title        = {Secure and Reliable Power Consumption Monitoring in Untrustworthy
                  Micro-grids},
  booktitle    = {Future Network Systems and Security - First International Conference,
                  {FNSS} 2015, Paris, France, June 11-13, 2015, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {523},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19210-9\_12},
  doi          = {10.1007/978-3-319-19210-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnss/AmbassaKWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SakpereK15a,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Supporting Streaming Data Anonymization with Expressions of User Privacy
                  Preferences},
  booktitle    = {Information Systems Security and Privacy - First International Conference,
                  {ICISSP} 2015, Angers, France, February 9-11, 2015, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {576},
  pages        = {122--136},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27668-7\_8},
  doi          = {10.1007/978-3-319-27668-7\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SakpereK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SakpereK15,
  author       = {Aderonke Busayo Sakpere and
                  Anne V. D. M. Kayem},
  editor       = {Olivier Camp and
                  Edgar R. Weippl and
                  Christophe Bidan and
                  Esma A{\"{\i}}meur},
  title        = {Adaptive Buffer Resizing for Efficient Anonymization of Streaming
                  Data with Minimal Information Loss},
  booktitle    = {{ICISSP} 2015 - Proceedings of the 1st International Conference on
                  Information Systems Security and Privacy, ESEO, Angers, Loire Valley,
                  France, 9-11 February, 2015},
  pages        = {191--201},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005288901910201},
  doi          = {10.5220/0005288901910201},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SakpereK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgta/AmbassaWKM15,
  author       = {Pacome L. Ambassa and
                  Stephen D. Wolthusen and
                  Anne V. D. M. Kayem and
                  Christoph Meinel},
  title        = {Robust snapshot algorithm for power consumption monitoring in computationally
                  constrained micro-grids},
  booktitle    = {2015 {IEEE} Innovative Smart Grid Technologies - Asia {(ISGT} Asia),
                  Bangkok, Thailand, November 3-6, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISGT-Asia.2015.7387160},
  doi          = {10.1109/ISGT-ASIA.2015.7387160},
  timestamp    = {Thu, 31 Mar 2022 12:07:51 +0200},
  biburl       = {https://dblp.org/rec/conf/isgta/AmbassaWKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BurkeK14,
  author       = {Mark{-}John Burke and
                  Anne V. D. M. Kayem},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {K-Anonymity for Privacy Preserving Crime Data Publishing in Resource
                  Constrained Environments},
  booktitle    = {28th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2014 Workshops, Victoria, BC, Canada,
                  May 13-16, 2014},
  pages        = {833--840},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/WAINA.2014.131},
  doi          = {10.1109/WAINA.2014.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/BurkeK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/KayemEM14,
  author       = {Anne V. D. M. Kayem and
                  Khalid Elgazzar and
                  Patrick Martin},
  editor       = {Hendrik Decker and
                  Lenka Lhotsk{\'{a}} and
                  Sebastian Link and
                  Marcus Spies and
                  Roland R. Wagner},
  title        = {Secure and Efficient Data Placement in Mobile Healthcare Services},
  booktitle    = {Database and Expert Systems Applications - 25th International Conference,
                  {DEXA} 2014, Munich, Germany, September 1-4, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8644},
  pages        = {352--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10073-9\_29},
  doi          = {10.1007/978-3-319-10073-9\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/KayemEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/AdamatzkyAADIIJKMOPSSSY13,
  author       = {Andrew Adamatzky and
                  Selim G. Akl and
                  Ram{\'{o}}n Alonso{-}Sanz and
                  Wesley van Dessel and
                  Zuwairie Ibrahim and
                  Andrew Ilachinski and
                  Jeff Jones and
                  Anne V. D. M. Kayem and
                  Genaro Ju{\'{a}}rez Mart{\'{\i}}nez and
                  Pedro Paulo Balbi de Oliveira and
                  Mikhail Prokopenko and
                  Theresa Schubert and
                  Peter M. A. Sloot and
                  Emanuele Strano and
                  Xin{-}She Yang},
  title        = {Are motorways rational from slime mould's point of view?},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {28},
  number       = {3},
  pages        = {230--248},
  year         = {2013},
  url          = {https://doi.org/10.1080/17445760.2012.685884},
  doi          = {10.1080/17445760.2012.685884},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paapp/AdamatzkyAADIIJKMOPSSSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dev/SsembatyaKM13,
  author       = {Richard Ssembatya and
                  Anne V. D. M. Kayem and
                  Gary Marsden},
  editor       = {Bill Thies and
                  Amit Nanavati},
  title        = {On the challenge of adopting standard {EHR} systems in developing
                  countries},
  booktitle    = {Annual Symposium on Computing for Development, {ACM} {DEV} '13, Bangalore,
                  India - January 11 - 12, 2013},
  pages        = {23:1--23:2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2442882.2442911},
  doi          = {10.1145/2442882.2442911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dev/SsembatyaKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KayemDH12,
  author       = {Anne V. D. M. Kayem and
                  Azhar Deshai and
                  Stuart Hammer},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {On anonymizing social network graphs},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320456},
  doi          = {10.1109/ISSA.2012.6320456},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/KayemDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-2851,
  author       = {Andrew Adamatzky and
                  Selim G. Akl and
                  Ram{\'{o}}n Alonso{-}Sanz and
                  Wesley van Dessel and
                  Zuwairie Ibrahim and
                  Andrew Ilachinski and
                  Jeff Jones and
                  Anne V. D. M. Kayem and
                  Genaro Ju{\'{a}}rez Mart{\'{\i}}nez and
                  Pedro Paulo Balbi de Oliveira and
                  Mikhail Prokopenko and
                  Theresa Schubert and
                  Peter M. A. Sloot and
                  Emanuele Strano and
                  Xin{-}She Yang},
  title        = {Are motorways rational from slime mould's point of view?},
  journal      = {CoRR},
  volume       = {abs/1203.2851},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.2851},
  eprinttype    = {arXiv},
  eprint       = {1203.2851},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-2851.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KayemMA11,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl},
  title        = {Enhancing identity trust in cryptographic key management systems for
                  dynamic environments},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {1},
  pages        = {79--94},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.164},
  doi          = {10.1002/SEC.164},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KayemMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KayemMA11,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Efficient Enforcement of Dynamic Access Control Policies for Outsourced
                  Data},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/07\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KayemMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KayemAM10,
  author       = {Anne V. D. M. Kayem and
                  Selim G. Akl and
                  Patrick Martin},
  title        = {Adaptive Cryptographic Access Control},
  series       = {Advances in Information Security},
  volume       = {48},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6655-1},
  doi          = {10.1007/978-1-4419-6655-1},
  isbn         = {978-0-387-77265-3},
  timestamp    = {Mon, 20 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/KayemAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Kayem10,
  author       = {Anne Kayem},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {On Monitoring Information Flow of Outsourced Data},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/82\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Kayem10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KayemAM08,
  author       = {Anne V. D. M. Kayem and
                  Selim G. Akl and
                  Patrick Martin},
  title        = {On replacing cryptographic keys in hierarchical key management systems},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {289--309},
  year         = {2008},
  url          = {https://doi.org/10.3233/jcs-2008-16303},
  doi          = {10.3233/JCS-2008-16303},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KayemAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saso/KayemMAP08,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl and
                  Wendy Powley},
  editor       = {Sven A. Brueckner and
                  Paul Robertson and
                  Umesh Bellur},
  title        = {A Framework for Self-Protecting Cryptographic Key Management},
  booktitle    = {Second {IEEE} International Conference on Self-Adaptive and Self-Organizing
                  Systems, {SASO} 2008, 20-24 October 2008, Venice, Italy},
  pages        = {191--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SASO.2008.57},
  doi          = {10.1109/SASO.2008.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saso/KayemMAP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/KayemMA07,
  author       = {Anne V. D. M. Kayem and
                  Patrick Martin and
                  Selim G. Akl},
  title        = {Heuristics for Improving Cryptographic Key Assignment in a Hierarchy},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {531--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.197},
  doi          = {10.1109/AINAW.2007.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/KayemMA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/KayemAM05,
  author       = {Anne V. D. M. Kayem and
                  Selim G. Akl and
                  Patrick Martin},
  editor       = {S. Q. Zheng},
  title        = {An Independent Set Approach to Solving the Collaborative Attack Problem},
  booktitle    = {International Conference on Parallel and Distributed Computing Systems,
                  {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}},
  pages        = {594--599},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcs/KayemAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics