Smiley face

Anne Kayem

A researcher in the area of Data Security and Privacy affiliated with the Internet Technologies and Systems Group, at the Hasso-Plattner-Institute, Germany. I hold a PhD in Computer Science from Queen's University, Canada. My current research involves designing and analysing secure and privacy preserving data sharing algorithms, the implementation/testing of such algorithms on open source datasets, and their integration on computationally constrained platforms such as lossy networks.

Upcoming...

Coming Soon...

Selected Peer-Reviewed Publications.


Books

  • Kayem A., Wolthusen S.D., Meinel C., (eds) (2018) Smart Micro-Grid Systems Security and Privacy, Springer (In Press)
  • Kayem A., Meinel C., (eds) (2014) Information Security in Diverse Computing Environments, (IGI USA), ISBN 1466661585 9781466661585
  • Kayem A., Akl S.G., Martin P., (2010) Adaptive Cryptographic Access Control, In Advances in Information Security, (Springer), ISBN 978-1-4419-6654-4

Journal Publications /Book Chapters

  • Abuelgasim A., Kayem A. (2017), A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media, Book: Information Systems Security and Privacy, In Springer Lecture Series on Communications in Computer and Information Science, Chp. Vol. 691, pp. 108--129, DOI: 10.1007/978-3-319-54433-5_7 (Springer)
  • Kayem A., Martin P., Elgazzar K., Meinel C. (2016) Operating Secure Mobile Healthcare Services over Constrained Resource Networks, Book: Emergent Computation, In Springer Lecture Series on Communications in Computer and Information Science, Chp. Vol. 24, pp. 361--391, DOI: 10.1007/978-3-319-46376-6_16 (Springer)
  • Sakpere A.B., Kayem A. (2015) Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences. In: Camp O., Weippl E., Bidan C., A├»meur E. (eds) Information Systems Security and Privacy. Communications in Computer and Information Science, Chp. 8, vol 576. Springer, Cham DOI:10.1007/978-3-319-27668-7 8 (Springer)
  • Kayem A., Martin P., Akl S.G. (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments, Wiley's Security and Communication Networks Journal, Vol. 4, No. 1, pp. 74 -94, 2011. (Wiley)
  • Kayem A., Akl S.G., Martin P. (2008) On Replacing Cryptographic Keys in Hierarchical Key Management Systems, Journal of Computer Security, Vol. 16, No. 3, pp. 289-309, 2008. (IOS Press)

Conference and Workshop Papers

  • Kayem A., Meinel C., Wolthusen S.D. (2017), A Smart Micro-Grid Architecture for Resource Constrained Environments In Proceedings, 31st IEEE International Conference on Advanced Information Networking and Applications (AINA 2017), March 27-29, 2017, Taipei, Taiwan, pp. 857--864, DOI 10.1109/AINA.2017.36 (IEEE)
  • Marufu A., Kayem A., Wolthusen S.D. (2016), Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids In Proceedings, IEEE 14th International Conference on Smart City (HPCC/SmartCity/DSS), Sydney, NSW, 2016, pp. 1380-1387 DOI: 10.1109/HPCC-SmartCity-DSS.2016.0195 (IEEE)
  • Ambassa P.L., Wolthusen S.D., Kayem A., Meinel C. (2016) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Microgrids, In Proceedings, 2nd Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), September 26-30, 2016, Heraklion, Greece (To Appear)
  • Marufu A., Kayem A., Wolthusen S.D. (2016) Power Auctioning in Resource Constrained Micro-Grids: Cases of Cheating, In Proceedings, 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10-12, 2016, Paris, France, Lecture Notes in Computer Science, Springer-Verlag (Vol. 10242, pp.137-149)
  • Kayem A., Vester CT, Meinel C. (2016) Automated k-Anonymization and l-Diversity for Shared Data Privacy, In Proceedings of the 27th International Conference on Database and Expert Systems Applications (DEXA'2016), Porto, Portugal - Sept. 5 - 8, 2016, Part 1, pp. 105-120
  • Abuelgasim A., Kayem A. (2016) An Approach to Personalized Privacy Recommendations on Online Social Networks, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy - Feb. 19-21, 2016, pp. 126-137{ (Invited for extension and submission to the Springer Lecture Notes series on Communications in Computer and Information Science)
  • Ambassa P.L., Wolthusen S.D., Kayem A., Meinel C. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids, In Proceedings, IEEE Power and Energy Society Innovative Smart Grid Technologies Asia 2015 (IEEE-ISGT-ASIA 2015), November 4-6, 2015, Bangkok, Thailand, pp.1-6, DOI:10.1109/ISGT-Asia.2015.7387160 (IEEE)
  • Marufu A., Kayem A., Wolthusen S.D. (2015) A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids, In Proceedings, 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015), October 5-7, 2015, Berlin, Germany; Vol. 9578, Lecture Notes in Computer Science, Springer-Verlag, pp. 183-196, DOI: 10.1007/978-3-319-33331-1 15 (Springer)
  • Ambassa P.L., Kayem A., Wolthusen S.D., Meinel C. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids, In Proceedings, 1st International Conference on Future Network Systems and Security (FNSS 2015), June 11-13, 2015, Paris, France (Future Network Systems and Security, Communications in Computer and Information Science, Vol. 523, pp. 166 - 180, Springer)
  • Kayem A., Martin P., Akl S.G. (2011) Efficient Cryptographic Key Management for Outsourced Dynamic Data Sharing Environments In Proceedings of the 10th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa - August 15-17, 2012, pp. 1- 8, ISBN: 978-1-4577-1481-8.

Have a question? .

Please drop me a line...(Email: anne{at}mykayem.org)


Find me on ...