Prof Anne Kayem
Associate Professor in Cyber-Security (E&R)
(Streatham) 3600
01392 723600
Overview
I am an Associate Professor in Cyber-Security and lead of the Privacy AnaLytics (PAL) Group. I hold a PhD in Computer Science obtained from Queen's University, Canada in 2009.
Research Interests
- Privacy Analytics
- Usable (Human-Centered) Security and Privacy
- Green-IT Security/Privacy
- Security Education
Research Overview
In line with my research interests, I study various problems that fall under the banner of privacy analytics. My main goal is to design algorithms and models to analyse data to determine whether or not privacy violating information exists therein. This is especally important in enabling privacy preserving data analytics and/or machine learning. I also study issues related to usability, education, and energy efficiency in relation to designing computational and human-centered privacy solutions.
More information can be accessed here.
Research Openings
We have openings for PhDs, and Research/Student Assistants. If you are interested in and passionate about working with us, please feel free to contact me.
You might also find it useful to look at the following funding resources such as EPSRC DTP, and Commonwealth Scholarships, and contact me to discuss developing a proposal.
Publications
Copyright Notice: Any articles made available for download are for personal use only. Any other use requires prior permission of the author and the copyright holder.
| 2024 | 2023 | 2022 | 2021 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2008 | 2007 |
2024
- Shahriar MH, Kamal AH, Kayem AVDM. (2024) Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings, Advanced Information Networking and Applications, Springer Nature Switzerland, 145-158, DOI:10.1007/978-3-031-57916-5_13. [PDF]
2023
- Islam MR, Kayem AVDM, Meinel C. (2023) Enabling PII Discovery in Textual Data via Outlier Detection, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 14147 LNCS, pages 209-216, DOI:10.1007/978-3-031-39821-6_17.
- Podlesny NJ, Kayem AVDM, Meinel C. (2023) De-anonymising Individuals Through Unique Patterns in Movement Data, Lecture Notes in Networks and Systems, volume 711 LNNS, pages 1167-1184, DOI:10.1007/978-3-031-37717-4_77.
2022
- Motlagh FN, Kayem AVDM, Meinel C. (2022) A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media, ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, volume 449, pages 140-151, DOI:10.1007/978-3-030-99584-3_13. [PDF]
- Podlesny NJ, Kayem AVDM, Meinel C. (2022) CoK: A Survey of Privacy Challenges in Relation to Data Meshes, DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2022, PT I, volume 13426, pages 85-102, DOI:10.1007/978-3-031-12423-5_7. [PDF]
2021
- Kayem A, Podlesny N, Meinel C. (2021) On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service, Proceedings of the 18th International Conference on Security and Cryptography, DOI:10.5220/0010552200002998.
- Motlagh FN, Kayem A, Podlesny NJ, Meinel C. (2021) Enabling Co-owned Image Privacy on Social Media via Agent Negotiation, ACM International Conference Proceeding Series, pages 152-156, DOI:10.1145/3487664.3487685.
- Podlesny NJ, Kayem AVDM, Meinel C. (2021) GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data, Lecture Notes in Networks and Systems, volume 226 LNNS, pages 495-508, DOI:10.1007/978-3-030-75075-6_40.
- Podlesny NJ, Kayem AVDM, Meinel C. (2021) A Review of Scaling Genome Sequencing Data Anonymisation, Lecture Notes in Networks and Systems, volume 227, pages 491-501, DOI:10.1007/978-3-030-75078-7_49.
- Podlesny NJ, Kayem AVDM, Meinel C. (2021) A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1-24, DOI:10.1007/978-3-662-64553-6_1.
- Kayem AVDM, Podlesny NJ, Meinel C. (2021) On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service, SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, pages 704-714, DOI:10.5220/0010552207040714. [PDF]
2019
- Podlesny NJ, Kayem AVDM, Meinel C. (2019) Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymisation, PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pages 109-119, DOI:10.1145/3292006.3300019. [PDF]
- Podlesny NJ, Kayem AVDM, Meinel C. (2019) Towards Identifying De-anonymisation Risks in Distributed Health Data Silos, DATABASE AND EXPERT SYSTEMS APPLICATIONS, PT I, volume 11706, pages 33-43, DOI:10.1007/978-3-030-27615-7_3. [PDF]
- Podlesny NJ, Kayem AVDM, Meinel C. (2019) Identifying Data Exposure across Distributed High-Dimensional Health Data Silos through Bayesian Networks optimised by Multigrid and Manifold, IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), pages 556-563, DOI:10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00110. [PDF]
- Podlesny NJ, Kayem AVDM, Meinel C, Jungmann S. (2019) How Data Anonymisation Techniques influence Disease Triage in Digital Health: A study on Base Rate Neglect, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON DIGITAL PUBLIC HEALTH (DPH '19), pages 55-62, DOI:10.1145/3357729.3357737. [PDF]
2018
- Kayem A. (2018) Welcome message from the INTRICATE-SEC 2018 workshop chair, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018, volume 2018-January, DOI:10.1109/WAINA.2018.00036.
- Kayem AVDM, Wolthusen SD, Meinel C. (2018) Power Systems: A Matter of Security and Privacy, Smart Micro-Grid Systems Security and Privacy, Springer Nature, 1-8, DOI:10.1007/978-3-319-91427-5_1.
- Kayem AVDM, Wolthusen SD, Meinel C. (2018) Power systems: A matter of security and privacy, Advances in Information Security, DOI:10.1007/978-3-319-91427-5_1.
- Ambassa PL, Kayem AVDM, Wolthusen SD, Meinel C. (2018) Inferring private user behaviour based on information leakage, Advances in Information Security, 145-159, DOI:10.1007/978-3-319-91427-5_7.
- Kayem AVDM, Meinel C, Wolthusen SD. (2018) A resilient smart micro-grid architecture for resource constrained environments, Advances in Information Security, 71-101, DOI:10.1007/978-3-319-91427-5_5.
- Marufu AMC, Kayem AVDM, Wolthusen SD. (2018) The design and classification of cheating attacks on power marketing schemes in resource constrained smart micro-grids, Advances in Information Security, 103-144, DOI:10.1007/978-3-319-91427-5_6.
- Kayem AVDM, Wolthusen SD, Meinel C. (2018) Preface.
- Kayem AVDM, Vester CT, Meinel C. (2018) Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 27-60, DOI:10.1007/978-3-662-58384-5_2.
- Strauss H, Kayem AVDM, Wolthusen SD. (2018) Reliable Key Distribution in Smart Micro-Grids, CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), volume 10242, pages 265-270, DOI:10.1007/978-3-319-71368-7_22. [PDF]
- Marufu AMC, Kayem AVDM, Wolthusen SD. (2018) Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating, CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), volume 10242, pages 137-149, DOI:10.1007/978-3-319-71368-7_12. [PDF]
- Ambassa PL, Kayem AVDM, Wolthusen S, Meinel C. (2018) Privacy Risks in Resource Constrained Smart Micro-Grids, 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), pages 527-532, DOI:10.1109/WAINA.2018.00139. [PDF]
- Torkura KA, Sukmana MIH, Meinig M, Kayem AVDM, Cheng F, Meinel C, Graupner H. (2018) Securing Cloud Storage Brokerage Systems Through Threat Models, PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), pages 759-768, DOI:10.1109/AINA.2018.00114. [PDF]
- Podlesny NJ, Kayem AVDM, von Schorlemer S, Uflacker M. (2018) Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing, DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2018, PT I, volume 11029, pages 85-100, DOI:10.1007/978-3-319-98809-2_6. [PDF]
- Sakpere AB, Kayem AVDM. (2018) On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments, PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, volume 526, pages 170-186, DOI:10.1007/978-3-319-92925-5_11. [PDF]
- Torkura KA, Sukmana MIH, Kayem AVDM, Cheng F, Meinel C. (2018) A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures, 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, pages 932-939, DOI:10.1109/BDCloud.2018.00137. [PDF]
2017
- Marufu AMC, Kayem AVDM, Wolthusen SD. (2017) Circumventing cheating on power auctioning in resource constrained micro-grids, Proceedings - 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, pages 1380-1387, DOI:10.1109/HPCC-SmartCity-DSS.2016.0195.
- Kayem AVDM, Meinel C, Wolthusen SD. (2017) A Smart Micro-Grid Architecture for Resource Constrained Environments, 2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), pages 857-864, DOI:10.1109/AINA.2017.36. [PDF]
- Abuelgasim A, Kayem AVDM. (2017) A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media, INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP 2016), volume 691, pages 108-129, DOI:10.1007/978-3-319-54433-5_7. [PDF]
- Weldehawaryat GK, Ambassa PL, Marufu AMC, Wolthusen SD, Kayem AVDM. (2017) Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security, SECURITY OF INDUSTRIAL CONTROL SYSTEMS AND CYBER-PHYSICAL SYSTEMS, volume 10166, pages 69-86, DOI:10.1007/978-3-319-61437-3_5. [PDF]
- Ambassa PL, Wolthusen SD, Kayem AVDM, Meinel C. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids, SECURITY OF INDUSTRIAL CONTROL SYSTEMS AND CYBER-PHYSICAL SYSTEMS, volume 10166, pages 52-68, DOI:10.1007/978-3-319-61437-3_4. [PDF]
- Kayem AVDM, Meinel C. (2017) Clustering Heuristics for Efficient t-closeness Anonymisation, DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, volume 10439, pages 27-34, DOI:10.1007/978-3-319-64471-4_3. [PDF]
2016
- Kayem A, Martin P, Elgazzar K, Meinel C. (2016) Operating Secure Mobile Healthcare Services over Constrained Resource Networks, Emergent Computation, Springer Nature, 361-391, DOI:10.1007/978-3-319-46376-6_16.
- Abuelgasim A, Kayem A. (2016) An approach to personalized privacy policy recommendations on online social networks, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pages 126-137, DOI:10.5220/0005689701260137.
- Marufu AMC, Kayem AVDM, Wolthusen S. (2016) Fault-Tolerant distributed continuous double auctioning on computationally constrained microgrids, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pages 448-456, DOI:10.5220/0005744304480456.
- Kayem AVDM, Wolthusen SD, Meinel C. (2016) Message from the INTRICATE-SEC 2016 Workshop Chairs, Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, DOI:10.1109/WAINA.2016.193.
- Ambassa PL, Kayem AVDM, Wolthusen SD, Meinel C. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases, IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), pages 601-606, DOI:10.1109/WAINA.2016.98. [PDF]
- Kayem AVDM. (2016) Graphical Passwords - A Discussion, IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), pages 596-600, DOI:10.1109/WAINA.2016.31. [PDF]
- Kayem A, Strauss H, Wolthusen SD, Meinel C. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids, IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), pages 585-590, DOI:10.1109/WAINA.2016.32. [PDF]
- Marufu AMC, Kayem AVDM, Wolthusen SD. (2016) A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids, CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, volume 9578, pages 183-196, DOI:10.1007/978-3-319-33331-1_15. [PDF]
- Kayem AVDM, Vester CT, Meinel C. (2016) Automated k-Anonymization and l-Diversity for Shared Data Privacy, DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, volume 9827, pages 105-120, DOI:10.1007/978-3-319-44403-1_7. [PDF]
- Marufu AMC, Kayem AVDM, Wolthusen SD. (2016) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), pages 1380-1387, DOI:10.1109/HPCC-SmartCity-DSS.2016.77. [PDF]
2015
- Kayem A. (2015) Message from the INTRICATE-SEC 2015 Workshop Chairs, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2015, DOI:10.1109/WAINA.2015.153.
- Sakpere AB, Kayem AVDM, Ndlovu T. (2015) A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, pages 424-429, DOI:10.1109/WAINA.2015.97. [PDF]
- Ssembatya R, Kayem AVDM. (2015) Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments, 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, pages 411-416, DOI:10.1109/WAINA.2015.113. [PDF]
- Sakpere AB, Kayem AVDM. (2015) Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss, 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), pages 191-201. [PDF]
- Sakpere AB, Kayem AVDM. (2015) Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences, INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, volume 576, pages 122-136, DOI:10.1007/978-3-319-27668-7_8. [PDF]
- Ambassa PL, Kayem AVDM, Wolthusen SD, Meinel C. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids, FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, volume 523, pages 166-180, DOI:10.1007/978-3-319-19210-9_12. [PDF]
- Ambassa PL, Wolthusen SD, Kayem AVDM, Meinel C. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids, 2015 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA). [PDF]
2014
- Sakpere AB, Kayem AVDM. (2014) A state-of-the-art review of data stream anonymization schemes, Information Security in Diverse Computing Environments, 24-50, DOI:10.4018/978-1-4666-6158-5.ch003.
- Kayem AVDM, Ratshidaho R, Maoyi ML, Macanda S. (2014) Experiences with threat modeling on a prototype social network, Information Security in Diverse Computing Environments, 261-279, DOI:10.4018/978-1-4666-6158-5.ch014.
- Kayem AVDM, Ssembatya R, Burke MJ. (2014) Diversity in security environments: The why and the wherefore, Information Security in Diverse Computing Environments, 1-7, DOI:10.4018/978-1-4666-6158-5.ch001.
- Harding GL, Kayem AVDM. (2014) Design of an IPTV conditional access system supporting multiple-services, Information Security in Diverse Computing Environments, 59-98, DOI:10.4018/978-1-4666-6158-5.ch005.
- Kayem AVDM, Elgazzar K, Martin P. (2014) Secure and efficient data placement in mobile healthcare services, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 8644 LNCS, no. PART 1, pages 352-361, DOI:10.1007/978-3-319-10073-9_29.
- Kayem AVDM, Meinel C. (2014) Preface, DOI:10.4018/978-1-4666-6158-5.
- Burke M-J, Kayem AVDM. (2014) K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments, 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), pages 833-840, DOI:10.1109/WAINA.2014.131. [PDF]
2013
- Kayem AVDM, Meinel C. (2013) Foreword, Technische Berichte des Hasso-Plattner-Instituts fur Softwaresystemtechnik an der Universitat Potsdam, volume 63.
- Adamatzky A, Kayem AVDM. (2013) Biological evaluation of Trans-African highways, EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, volume 215, no. 1, pages 49-59, DOI:10.1140/epjst/e2013-01714-6. [PDF]
- Ssembatya R, Kayem A, Marsden G. (2013) On the Challenge of Adopting Standard EHR Systems in Developing Countries, PROCEEDINGS OF THE 3RD ACM SYMPOSIUM ON COMPUTING FOR DEVELOPMENT (ACM DEV 2013). [PDF]
2012
- Adamatzky A, Akl S, Alonso-Sanz R, van Dessel W, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martinez GJ, de Oliveira P. (2012) Are motorways rational from slime mould's point of view?, DOI:10.48550/arxiv.1203.2851.
- Adamatzky A, Kayem AVDM. (2012) Trans-African highways, Bioevaluation of World Transport Networks, 19-46, DOI:10.1142/9789814407045_0003.
- Adamatzky A, Akl SG, Alonso-Sanz R, Van Dessel W, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martínez GJ, De Oliveira PPB. (2012) Biorationality of motorways, Bioevaluation of World Transport Networks, 309-326, DOI:10.1142/9789814407045_0018.
- Kayem AVDM, Deshai A, Hammer S. (2012) On Anonymizing Social Network Graphs, 2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA). [PDF]
- Adamatzky A, Akl S, Alonso-Sanz R, Dessel WV, Ibrahim Z, Ilachinski A, Jones J, Kayem AVDM, Martinez GJ, Oliveira PD. (2012) Are motorways rational from slime mould's point of view?. [PDF]
2011
- Kayem AVDM, Martin P, Akl SG. (2011) Efficient enforcement of dynamic cryptographic access control policies for outsourced data, 2011 Information Security for South Africa - Proceedings of the ISSA 2011 Conference, DOI:10.1109/ISSA.2011.6027517.
- Kayem AVDM, Martin P, Akl SG. (2011) Self-protecting access control: On mitigating privacy violations with fault tolerance, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, 95-128, DOI:10.4018/978-1-61350-501-4.ch004.
- Kayem AVDM, Martin P, Akl SG. (2011) Enhancing identity trust in cryptographic key management systems for dynamic environments, SECURITY AND COMMUNICATION NETWORKS, volume 4, no. 1, pages 79-94, DOI:10.1002/sec.164. [PDF]
2010
- Kayem AVDM, Akl SG, Martin P. (2010) Adaptive Cryptographic Access Control, Springer Nature, DOI:10.1007/978-1-4419-6655-1.
- Kayem AVDM. (2010) On monitoring information flow of outsourced data, Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010, DOI:10.1109/ISSA.2010.5588602.
- Kayem AVDM. (2010) Security in service oriented architectures: Standards and challenges, Web Services Security Development and Architecture: Theoretical and Practical Issues, 187-210, DOI:10.4018/978-1-60566-950-2.ch009.
- Osborn SL. (2010) Foreword, DOI:10.1007/978-1-4419-6655-1_1.
2008
- Kayem AVDM, Akl SG, Martin P. (2008) On replacing cryptographic keys in hierarchical key management systems, Journal of Computer Security, volume 16, no. 3, pages 289-309, DOI:10.3233/JCS-2008-16303.
- Kayem AVDM, Martin P, Akl SG, Powley W. (2008) A Framework for Self-Protecting Cryptographic Key Management, SASO 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, PROCEEDINGS, pages 191-200, DOI:10.1109/SASO.2008.57. [PDF]
2007
- Kayem AVDM, Martin P, Akl SG. (2007) Heuristics for improving cryptographic key assignment in a hierarchy, Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07, volume 2, pages 531-536, DOI:10.1109/AINAW.2007.197.
Further information
INTRICATE-SEC 2024
The 11th International Workshop on Privacy and Security Intricacies on the Web (INTRICATE-SEC 2024), Kitakyushu International Convention Center, Kitakyushu, Japan (April 17 to April 19, 2024)
Call for Papers...This edition of INTRICATE-SEC is centered on Web Security and Privacy, and will be held in conjunction with the 38th IEEE International Conference on Advanced Information Networking and Applications (AINA-2024) as part of The Workshops of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024).
The workshop focuses on Security and Privacy Solutions, Designs and Considerations for digital environments. We are especially interested in work-in-progress papers show casing experiences in implementing security/privacy solutions and/or designs, as well as survey papers discussing current challenges and considerations around issues such as safety, privacy, and security. Workshop participants will have access to activities in the main conference such as regular presentations, and keynote addresses.
Topics...Prospective authors are invited to submit papers on the following topics (not exhaustive):
- Authentication and Anonymisation
- Digital Privacy
- User Privacy and Security - Models, Beliefs, and Perceptions
- Privacy Metrics and Control
- Privacy Enhancing Models and Technologies
- Security and Privacy in Cloud Computing
- Security Awareness and Education
- Security Architecture Design
- Security frameworks, Architectures, and Protocols
- Threat Awareness
- Vulnerability Analysis and Countermeasures
- Identity and Trust Management
- Security, Privacy, and Trust in Low-Powered Network Systems
- Machine Learning in Security and Privacy
- Anne Kayem (Hasso-Plattner-Institute, Germany; & University of Exeter, UK)
- Christoph Meinel (Hasso-Plattner-Institute, Potsdam, Germany)
- Stephen Marsh (University of Ontario Institute of Technology, Canada)
- Zeyar Aung (Masdar Institute of Science and Technology, UAE)
- Cheng Feng (Hasso-Plattner-Institute, Potsdam, Germany)
- Dieter Hutter (DFKI GmbH, Germany)
- Zekeriya Erkin (Delft University of Technology, Netherlands)
- Ingo Stengel (University of Applied Sciences Karlsruhe, Germany)
- Anesu Marufu (F-Secure, South Africa)
- Aderonke Sakpere (University of Ibadan, Nigeria)
- ... To be completed...
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with published proceedings. Duplications or overlap with other published or submitted papers will be considered as grounds for rejection.
Papers should be submitted in Portable Document Format (PDF) only and may not be longer than 10 pages, Springer style (including references). However, authors can add up to 2 extra pages with the appropriate fee payment. Templates and submission instructions are available here. When you are ready to submit, please use the following link which will direct you to (Workshop-INTRICATE-SEC-2024: The 11-th International Workshop on the Theories and Intricacies of Information Security problems (INTRICATE-SEC-2024)). At least one author of each accepted paper must register and present the paper.
If you encouter problems submitting, please send an email to Leonard Barolli (barolli@fit.ac.jp). General questions regarding the workshop can be addressed to Anne Kayem.
Important Dates...
- Paper Submission Deadline (Extended): December 1, 2023 December 20, 2023
- Author Notification: January 20, 2024
- Final Manuscript Due: February 5, 2024
- Author Registration: February 5, 2024
- Conference Dates: April 17 - 19, 2024
© INTRICATE-SEC 2024. All rights reserved.
PAL Research Group
Privacy AnaLytics (PAL) Research GroupCurrent Projects
In line with my research interests, I study various problems that fall under the banner of privacy analytics. My main goal is to design algorithms and models to analyse data to determine whether or not privacy violating information exists therein. This is especally important in enabling privacy preserving data analytics and/or machine learning. I also study issues related to usability, education, and energy efficiency in relation to designing computational and human-centered privacy solutions.
Auto-PII: Automated PII Discovery in Mesh Data
We (Rakibul Islam, Hasan Shahriar, Abrar Kamal, Igor Fialko, Imtiaz Ahmed, and Prof A. Kayem) are working with Cimpress GmbH to develop efficient and accurate machine learning models to enable discovering personal identifying information in data meshes. Publications available on DBLP.
Algorithms, Code, and Data:
Sec-Edu: Security Education and Usability
Working with Igor Fialko, Tim Depping, and Johannes Klemm, my goal in this project is to design a suite of security/privacy education tools to assess effectiveness in raising user awareness on security/privacy pitfalls in the digital environment. This project is funded by the HPI foundation.
Algotihms, Code, and Data:
- Ethical Hacking (Contact us for login instructions)
Recent Past Project - Highlights
Quasi-Identifier Discovery in High Dimensional Data
Here, our (Dr. N.J. Podlesny (PhD Thesis) and Prof. A. Kayem) focus was on designing efficient algorithms to enable quasi-identifier discovery in large high dimensional data. Application areas for this work include genome data, health data, and online shopping data. Publications available on DBLP.
Algorithms, Code, and Data: