Nicolas Anciaux

Orcid: 0009-0003-7537-295X

According to our database1, Nicolas Anciaux authored at least 60 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Extensive and Secure Personal Data Management Systems.
ERCIM News, 2023

Secure Computations in Opportunistic Networks: An Edgelet Demonstration with a Medical Use-Case.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

Pushing Edge Computing one Step Further: Resilient and Privacy-Preserving Processing on Personal Devices.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

Demo: Data Minimization and Informed Consent in Administrative Forms.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution.
Pervasive Mob. Comput., 2022

Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems.
Proceedings of the SSDBM 2022: 34th International Conference on Scientific and Statistical Database Management, Copenhagen, Denmark, July 6, 2022

An Extensive and Secure Personal Data Management System Using SGX.
Proceedings of the 25th International Conference on Extending Database Technology, 2022

Local Personal Data Processing with Third Party Code and Bounded Leakage.
Proceedings of the 11th International Conference on Data Science, 2022

Edgelet Computing: Pushing Query Processing and Liability at the Extreme Edge of the Network.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy.
CoRR, 2021

Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications, 2021

Poster: Reducing Data Leakage on Personal Data Management Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Secure Distributed Queries over Large Sets of Personal Home Boxes.
Trans. Large Scale Data Knowl. Centered Syst., 2020

2019
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads.
Proc. VLDB Endow., 2019

Personal Data Management Systems: The security and functionality standpoint.
Inf. Syst., 2019

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Manifest-Based Framework for Organizing the Management of Personal Data at the Edge of the Network.
Proceedings of the Information Systems Development: Information Systems Beyond 2020, 2019

2018
Reconciling Privacy and Data Sharing in a Smart and Connected Surrounding.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

2017
Supporting secure keyword search in the personal cloud.
Inf. Syst., 2017

A New Sharing Paradigm for the Personal Cloud.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

SWYSWYK: A Privacy-by-Design Paradigm for Personal Information Management Systems.
Proceedings of the Information Systems Development: Advances in Methods, Tools and Management, 2017

SWYSWYK: A New Sharing Paradigm for the Personal Cloud.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
A Root of Trust for the Personal Cloud.
ERCIM News, 2016

Distributed Secure Search in the Personal Cloud.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

2015
A Scalable Search Engine for Mass Storage Smart Objects.
Proc. VLDB Endow., 2015

Limiting Data Exposure in Multi-Label Classification Processes.
Fundam. Informaticae, 2015

A Secure Search Engine for the Personal Cloud.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Managing Personal Health Records in an Infrastructure-Weak Environment.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Opportunistic data services in least developed countries: benefits, challenges and feasibility issues.
SIGMOD Rec., 2014

Folk-IS: Opportunistic Data Services in Least Developed Countries.
Proc. VLDB Endow., 2014

Trusted Cells: Ensuring Privacy for the Citizens of Smart Cities.
ERCIM News, 2014

MILo-DB: a personal, secure and portable database machine.
Distributed Parallel Databases, 2014

Tutorial: Managing Personal Data with Strong Privacy Guarantees.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Gestion de données personnelles respectueuse de la vie privée.
, 2014

2013
Exposition minimum de données pour des applications à base de classifieurs.
Ingénierie des Systèmes d Inf., 2013

Personal Data Management with Secure Hardware: How to Keep Your Data at Hand.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

MinExp-card: limiting data collection using a smart card.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Trusted Cells: A Sea Change for Personal Data Services.
Proceedings of the Sixth Biennial Conference on Innovative Data Systems Research, 2013

2012
Personal Data Server: Keeping Sensitive Data under the Individual's Control.
ERCIM News, 2012

The Minimum Exposure Project: Limiting Data Collection in Online Forms.
ERCIM News, 2012

Limiting data collection in application forms: A real-case application of a founding privacy principle.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

2010
Secure Personal Data Servers: a Vision Paper.
Proc. VLDB Endow., 2010

Pluggable personal data servers.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

2009
Revelation on demand.
Distributed Parallel Databases, 2009

A Framework to Balance Privacy and Data Usability Using Data Degradation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
SGBD embarqué dans une puce. Retour d'expérience.
Tech. Sci. Informatiques, 2008

DiSC: Benchmarking Secure Chip DBMS.
IEEE Trans. Knowl. Data Eng., 2008

InstantDB: Enforcing Timely Degradation of Sensitive Data.
Proceedings of the 24th International Conference on Data Engineering, 2008

Data degradation: making private data less sensitive over time.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

Restoring the Patient Control over Her Medical History.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
Future Trends in Secure Chip Data Management.
IEEE Data Eng. Bull., 2007

GhostDB: Hiding Data from Prying Eyes.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

GhostDB: querying visible and hidden data without leaks.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Querying and Aggregating Visible and Hidden Data Without Leaks.
Proceedings of the 23èmes Journées Bases de Données Avancées, 2007

2006
Data Confidentiality: to which extent cryptography and secured hardware can help.
Ann. des Télécommunications, 2006

Balancing Smartness and Privacy for the Ambient Intelligence.
Proceedings of the Smart Sensing and Context, First European Conference, EuroSSC 2006, 2006

2004
Systèmes de gestion de base de données embarqués dans une puce électronique(Database Systems on Chip).
PhD thesis, 2004

2003
Memory Requirements for Query Execution in Highly Constrained Devices.
Proceedings of the 19èmes Journées Bases de Données Avancées, 2003

2001
PicoDBMS: Validation and Experience.
Proceedings of the VLDB 2001, 2001


  Loading...