This document will focus on my core computer science research since 2010, covering the topic of data management and privacy. More speci cally, I will present the following topics : - A new paradigm, called Trusted Cells for privacy-centric personal data management based on the Asymmetric Architecture composed of trusted or open (low power) distributed hardware devices acting as personal data servers and a highly powerful, highly available supporting server, such as a cloud. (Chapter 2). - Adapting aggregate data computation techniques to the Trusted Cells environment, with the example of Privacy-Preserving Data Publishing (Chapter 3). - Minimizing the data that leaves a Trusted Cell, i.e. enforcing the general privacy principle of Limited D...
Abstract — Popularity of cloud computing is increasing day by day in distributed computing environme...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
The seemingly limitless computing resources and power of the cloud has made it ubiquitous. However,...
This document will focus on my core computer science research since 2010, covering the topic of data...
International audienceManaging personal data with strong privacy guarantees has become an important ...
This paper spotlights privacy and its obfuscation issues of intellectual, confidential information o...
[[abstract]]Due to the ever-updated technology of the Internet and the acceleration of network bandw...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
The growing demand for everyday data insights drives the pursuit of more sophisticated infrastructur...
This book presents a comprehensive approach to protecting sensitive information when large data coll...
AbstractThis paper spotlights privacy and its obfuscation issues of intellectual, confidential infor...
Prof. Johannes Gehrke, Committee Chair. Prof. Eva Tardos, Committee Member. Prof. Joseph Halpern, ...
Abstract. Private data is commonly revealed to the party performing the computation on it. This pose...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Abstract — Popularity of cloud computing is increasing day by day in distributed computing environme...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
The seemingly limitless computing resources and power of the cloud has made it ubiquitous. However,...
This document will focus on my core computer science research since 2010, covering the topic of data...
International audienceManaging personal data with strong privacy guarantees has become an important ...
This paper spotlights privacy and its obfuscation issues of intellectual, confidential information o...
[[abstract]]Due to the ever-updated technology of the Internet and the acceleration of network bandw...
A growing framework of legal and ethical requirements limit scientific and commercial evaluation of ...
The growing demand for everyday data insights drives the pursuit of more sophisticated infrastructur...
This book presents a comprehensive approach to protecting sensitive information when large data coll...
AbstractThis paper spotlights privacy and its obfuscation issues of intellectual, confidential infor...
Prof. Johannes Gehrke, Committee Chair. Prof. Eva Tardos, Committee Member. Prof. Joseph Halpern, ...
Abstract. Private data is commonly revealed to the party performing the computation on it. This pose...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Data is one of the most valuable assets for organization. It can facilitate users or organizations t...
Abstract — Popularity of cloud computing is increasing day by day in distributed computing environme...
Data has been widely recognized as one of the most valuable assets that can be utilized to make dyna...
The seemingly limitless computing resources and power of the cloud has made it ubiquitous. However,...