A growing framework of legal and ethical requirements limit scientific and commercial evaluation of personal data. Typically, pseudonymization, encryption, or methods of distributed computing try to protect individual privacy. However, computational infrastructures still depend on human system administrators. This introduces severe security risks and has strong impact on privacy: system administrators have unlimited access to the computers that they manage including encryption keys and pseudonymization-tables. Distributed computing and data obfuscation technologies reduce but do not eliminate the risk of privacy leakage by administrators. They produce higher implementation effort and possible data quality degradation. This paper proposes th...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities,...
Proceedings of MIE2016 at HEC2016Issues related to ensuring patient privacy and data ownership in cl...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
This paper examines a model of trusted computing wherein a computing platform is able to make assert...
With the growing use of the Internet, users need to reveal an increasing amount of private informati...
National audienceThanks to new regulations like GDPR, Personal Data Management Systems (PDMS) have b...
A large number of services today are built around processing data that is collected from or shared b...
This document will focus on my core computer science research since 2010, covering the topic of data...
Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The techn...
Recent advances in technology have given rise to the popularity and success of many data- related se...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Automated recommender systems are used to help people find interesting content or persons in the vas...
Increases in data production and growing demands for more computing power leads to the current trend...
Cryptography is traditionally considered as a main information security mechanism, providing several...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities,...
Proceedings of MIE2016 at HEC2016Issues related to ensuring patient privacy and data ownership in cl...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
This paper examines a model of trusted computing wherein a computing platform is able to make assert...
With the growing use of the Internet, users need to reveal an increasing amount of private informati...
National audienceThanks to new regulations like GDPR, Personal Data Management Systems (PDMS) have b...
A large number of services today are built around processing data that is collected from or shared b...
This document will focus on my core computer science research since 2010, covering the topic of data...
Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The techn...
Recent advances in technology have given rise to the popularity and success of many data- related se...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Automated recommender systems are used to help people find interesting content or persons in the vas...
Increases in data production and growing demands for more computing power leads to the current trend...
Cryptography is traditionally considered as a main information security mechanism, providing several...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities,...
Proceedings of MIE2016 at HEC2016Issues related to ensuring patient privacy and data ownership in cl...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...