Anne V. D. M. Kayem

According to our database1, Anne V. D. M. Kayem authored at least 47 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect.
Proceedings of the 9th International Conference on Digital Public Health, 2019

Towards Identifying De-anonymisation Risks in Distributed Health Data Silos.
Proceedings of the Database and Expert Systems Applications, 2019

Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Power Systems: A Matter of Security and Privacy.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Inferring Private User Behaviour Based on Information Leakage.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018

Syntactic Anonymisation of Shared Datasets in Resource Constrained Environments.
T. Large-Scale Data- and Knowledge-Centered Systems, 2018

A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing.
Proceedings of the Database and Expert Systems Applications, 2018

Securing Cloud Storage Brokerage Systems Through Threat Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Privacy Risks in Resource Constrained Smart Micro-Grids.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Clustering Heuristics for Efficient t-closeness Anonymisation.
Proceedings of the Database and Expert Systems Applications, 2017

A Smart Micro-Grid Architecture for Resource Constrained Environments.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media.
Proceedings of the Information Systems Security and Privacy, 2016

An Approach to Personalized Privacy Policy Recommendations on Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016

Automated k-Anonymization and l-Diversity for Shared Data Privacy.
Proceedings of the Database and Expert Systems Applications, 2016

Reliable Key Distribution in Smart Micro-Grids.
Proceedings of the Critical Information Infrastructures Security, 2016

Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating.
Proceedings of the Critical Information Infrastructures Security, 2016

Key Management for Secure Demand Data Communication in Constrained Micro-Grids.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Graphical Passwords - A Discussion.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Privacy Violations in Constrained Micro-Grids: Adversarial Cases.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences.
Proceedings of the Information Systems Security and Privacy, 2015

Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss.
Proceedings of the ICISSP 2015, 2015

Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids.
Proceedings of the Critical Information Infrastructures Security, 2015

Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A Usable and Secure Crime Reporting System for Technology Resource Constrained Context.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Secure and Efficient Data Placement in Mobile Healthcare Services.
Proceedings of the Database and Expert Systems Applications, 2014

K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Are motorways rational from slime mould's point of view?
IJPEDS, 2013

On the challenge of adopting standard EHR systems in developing countries.
Proceedings of the Annual Symposium on Computing for Development, 2013

2012
On anonymizing social network graphs.
Proceedings of the 2012 Information Security for South Africa, 2012

2011
Enhancing identity trust in cryptographic key management systems for dynamic environments.
Security and Communication Networks, 2011

Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Adaptive Cryptographic Access Control
Advances in Information Security 48, Springer, ISBN: 978-0-387-77265-3, 2010

On Monitoring Information Flow of Outsourced Data.
Proceedings of the Information Security South Africa Conference 2010, 2010

2008
On replacing cryptographic keys in hierarchical key management systems.
Journal of Computer Security, 2008

A Framework for Self-Protecting Cryptographic Key Management.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

2007
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
An Independent Set Approach to Solving the Collaborative Attack Problem.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005


  Loading...