Anne V. D. M. Kayem

Orcid: 0000-0002-6587-5313

Affiliations:
  • Hasso-Plattner-Institute, Potsdam, Germany
  • Queen's University, Canada (former)
  • University of Cape Town, South Africa (former)


According to our database1, Anne V. D. M. Kayem authored at least 57 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Enabling PII Discovery in Textual Data via Outlier Detection.
Proceedings of the Database and Expert Systems Applications, 2023

2022
CoK: A Survey of Privacy Challenges in Relation to Data Meshes.
Proceedings of the Database and Expert Systems Applications, 2022

A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation.
Trans. Large Scale Data Knowl. Centered Syst., 2021

On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Enabling Co-owned Image Privacy on Social Media via Agent Negotiation.
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021

GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data.
Proceedings of the Advanced Information Networking and Applications, 2021

A Review of Scaling Genome Sequencing Data Anonymisation.
Proceedings of the Advanced Information Networking and Applications, 2021

2019
How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect.
Proceedings of the 9th International Conference on Digital Public Health, 2019

Towards Identifying De-anonymisation Risks in Distributed Health Data Silos.
Proceedings of the Database and Expert Systems Applications, 2019

Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Power Systems: A Matter of Security and Privacy.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Inferring Private User Behaviour Based on Information Leakage.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments.
Trans. Large Scale Data Knowl. Centered Syst., 2018

A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing.
Proceedings of the Database and Expert Systems Applications, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Privacy Risks in Resource Constrained Smart Micro-Grids.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Clustering Heuristics for Efficient t-closeness Anonymisation.
Proceedings of the Database and Expert Systems Applications, 2017

A Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media.
Proceedings of the Information Systems Security and Privacy, 2016

An Approach to Personalized Privacy Policy Recommendations on Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Automated k-Anonymization and l-Diversity for Shared Data Privacy.
Proceedings of the Database and Expert Systems Applications, 2016

Reliable Key Distribution in Smart Micro-Grids.
Proceedings of the Critical Information Infrastructures Security, 2016

Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating.
Proceedings of the Critical Information Infrastructures Security, 2016

Key Management for Secure Demand Data Communication in Constrained Micro-Grids.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Graphical Passwords - A Discussion.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Privacy Violations in Constrained Micro-Grids: Adversarial Cases.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids.
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015

Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences.
Proceedings of the Information Systems Security and Privacy, 2015

Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss.
Proceedings of the ICISSP 2015, 2015

Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids.
Proceedings of the Critical Information Infrastructures Security, 2015

Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Usable and Secure Crime Reporting System for Technology Resource Constrained Context.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Secure and Efficient Data Placement in Mobile Healthcare Services.
Proceedings of the Database and Expert Systems Applications, 2014

K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Are motorways rational from slime mould's point of view?
Int. J. Parallel Emergent Distributed Syst., 2013

On the challenge of adopting standard EHR systems in developing countries.
Proceedings of the Annual Symposium on Computing for Development, 2013

2012
On anonymizing social network graphs.
Proceedings of the 2012 Information Security for South Africa, 2012

2011
Enhancing identity trust in cryptographic key management systems for dynamic environments.
Secur. Commun. Networks, 2011

Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Adaptive Cryptographic Access Control
Advances in Information Security 48, Springer, ISBN: 978-0-387-77265-3, 2010

On Monitoring Information Flow of Outsourced Data.
Proceedings of the Information Security South Africa Conference 2010, 2010

2008
On replacing cryptographic keys in hierarchical key management systems.
J. Comput. Secur., 2008

A Framework for Self-Protecting Cryptographic Key Management.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

2007
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
An Independent Set Approach to Solving the Collaborative Attack Problem.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005


  Loading...