Smiley face

Anne V.D.M. Kayem.

A senior independent researcher in the area of Data Security and Privacy at the Internet Technologies and Systems Group, at the Hasso-Plattner-Institute, Germany. I hold a PhD in Computer Science from Queen's University, Canada. My current research involves designing and analysing secure and privacy preserving data sharing algorithms, the implementation/testing of such algorithms on open source datasets, and their integration on computationally constrained platforms such as lossy networks.

Upcoming...

INTRICATE-SEC 2018

Call for Papers

Deadline: Dec. 15, 2017

Notification: Jan. 25, 2018

Camera Ready version: Feb. 16, 2018

Publications.


Monographs and Books

  • Anne V.D.M. Kayem, Stephen Wolthusen, and Christoph Meinel, (eds) (2018) Smart Micro-Grid Systems Security and Privacy, Springer (In Preparation)
  • Anne V.D.M. Kayem, and Christoph Meinel, (eds) (2014) Information Security in Diverse Computing Environments, IGI Global (IGI), PA, USA
  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin, (2010) Adaptive Cryptographic Access Control, In the Kluwer International Series on Advances in Information Security, (Publisher - Springer), ISBN 978-1-4419-6654-4

Journal Papers and Book Chapters

  • Ammar Abuelgasim and Anne V.D.M. Kayem (2017), A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media, Book: Information Systems Security and Privacy, In Springer Lecture Series on Communications in Computer and Information Science, vol. 691, pp. 108--129, DOI: 10.1007/978-3-319-54433-5_7 (Springer)
  • Anne V.D.M. Kayem, Patrick Martin, Khallid Elgazzar, and Christoph Meinel (2016) Operating Secure Mobile Healthcare Services over Constrained Resource Networks, Book: Emergent Computation, In Springer Lecture Series on Communications in Computer and Information Science, vol. 24, pp. 361--391, DOI: 10.1007/978-3-319-46376-6_16
  • Aderonke B. Sakpere and Anne V.D.M. Kayem (2016) Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences, Book: Information Systems Security and Privacy, Chapter 8, pp. 191-201, In Springer Lecture Series on Communications in Computer and Information Science, DOI:10.1007/978-3-319-27668-7 8
  • Andrew Adamatsky, and Anne V.D.M. Kayem, (2013) Biological Evaluation of Trans-African Highways, European Physical Journal : Special Topics (Special Issue on Spatially Embedded Complex Networks : Aspects and Standards), Vol.215, Issue 1, pp. 49-59, January 2013; Springer.
  • Andrew Adamatsky, and Anne V.D.M. Kayem, (2012) Trans-African Highways, Book: BIOEVALUATION OF WORLD TRANSPORT NETWORKS, (Eds.) Andrew Adamatsky, (Publisher: World Scientific), pp. 19 - 46, ISBN: 978-981-4407-03-8
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments, Wiley's Security and Communication Networks Journal, Vol. 4, Number 1, pp. 74 -94, 2011.
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2011) Self-Protecting Access Control: Mitigating Vulnerabilities and Inefficiencies with Fault-Tolerance, Book: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, IGI Global (IGI), PA, USA, pp. 95-128, 2011
  • Anne V.D.M. Kayem, (2010) Security in Service Oriented Architectures: Standards and Challenges, Book: Web Services Security Development and Architecture: Theoretical and Practical Issues, IGI Global (IGI), PA, USA, pp.187-211, 2010.
  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin (2008) On Replacing Cryptographic Keys in Hierarchical Key Management Systems, Journal of Computer Security, Vol. 16, Number 3, pp. 289-309, 2008.

Conference and Workshop Papers

  • Anne V.D.M. Kayem, and Christoph Meinel (2017) Clustering Heuristics for Efficient t-closeness Anonymisation In Proceedings of the 28th International Conference on Database and Expert Systems Applications (DEXA'2017), Lyon, France - Aug. 28 - 31, 2017, Part 2, pp. 27-34
  • Anne V.D.M. Kayem, Christoph Meinel, and Stephen D. Wolthusen (2017), A Smart Micro-Grid Architecture for Resource Constrained Environments In Proceedings, 31st IEEE International Conference on Advanced Information Networking and Applications (AINA 2017), March 27-29, 2017, Taipei, Taiwan, pp. 857--864, DOI 10.1109/AINA.2017.36 (IEEE)
  • Anesu M.C. Marufu, Anne V.D.M. Kayem, and Stephen D. Wolthusen (2016), Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids In Proceedings, IEEE 14th International Conference on Smart City (HPCC/SmartCity/DSS), Sydney, NSW, 2016, pp. 1380-1387 DOI: 10.1109/HPCC-SmartCity-DSS.2016.0195
  • Goitom K. Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen D. Wolthusen, and Anne V.D.M. Kayem (2016), Secure and Decentralised Power Consumption Scheduling in Constrained Micro-Grids In Proceedings, 2nd Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), September 26-30, 2016, Heraklion, Greece (To Appear)
  • Landry Ambassa, Stephen D. Wolthusen, Anne V.D.M. Kayem, and Christoph Meinel (2016) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Microgrids, In Proceedings, 2nd Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), September 26-30, 2016, Heraklion, Greece (To Appear)
  • Anesu Marufu, Anne V.D.M. Kayem, and Stephen D.Wolthusen (2016) Power Auctioning in Resource Constrained Micro-Grids: Cases of Cheating, In Proceedings, 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10-12, 2016, Paris, France, Lecture Notes in Computer Science, Springer-Verlag (To Appear)
  • Heinrich Strauss, Anne V.D.M. Kayem, and Stephen D. Wolthusen (2016) Reliable Key Distribution in Smart Micro-Grids: Attack Models and Countermeasures, In Proceedings, 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10-12, 2016, Paris, France, Lecture Notes in Computer Science, Springer-Verlag (To Appear)
  • Anne V.D.M. Kayem, CT Vester, and Christoph Meinel (2016) Automated k-Anonymization and l-Diversity for Shared Data Privacy, In Proceedings of the 27th International Conference on Database and Expert Systems Applications (DEXA'2016), Porto, Portugal - Sept. 5 - 8, 2016, Part 1, pp. 105-120
  • Anne V.D.M. Kayem (2016) Graphical Passwords - A Discussion, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 596-600.
  • Anne V.D.M. Kayem, Heinrich Strauss, Stephen D. Wolthusen and Christoph Meinel (2016) Key Management for Secure Demand Data Communication in Constrained Micro-Grids, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 585 - 590.
  • Pacome L. Ambassa, Anne V.D.M. Kayem, Stephen D. Wolthusen and Christoph Meinel (2016) Privacy Violations in Constrained Micro-Grids: Adversarial Cases, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 601 - 606.
  • Ammar Abuelgasim, and Anne V.D.M. Kayem (2016) An Approach to Personalized Privacy Recommendations on Online Social Networks, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy - Feb. 19-21, 2016, pp. 126-137{ (Invited for extension and submission to the Springer Lecture Notes series on Communications in Computer and Information Science)
  • Anesu Marufu, Anne V.D.M. Kayem, and Stephen D. Wolthusen (2016) Fault-Tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy - Feb. 19-21, 2016, pp. 448-456
  • Pacome L. Ambassa, Stephen D.Wolthusen, Anne V.D.M. Kayem, and Christoph Meinel (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids, In Proceedings, IEEE Power and Energy Society Innovative Smart Grid Technologies Asia 2015 (IEEE-ISGT-ASIA 2015), November 4-6, 2015, Bangkok, Thailand, pp.1-6 (DOI:10.1109/ISGT-Asia.2015.7387160)
  • Anesu M.C. Marufu, Anne V.D.M. Kayem, and Stephen D. Wolthusen (2015) A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids, In Proceedings, 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015), October 5-7, 2015, Berlin, Germany; Vol. 9578, Lecture Notes in Computer Science, Springer-Verlag, pp. 183-196 (DOI: 10.1007/978-3-319-33331-1 15)
  • Pacome L. Ambassa, Anne V.D.M. Kayem, Stephen D.Wolthusen, and Christoph Meinel, (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids, In Proceedings, 1st International Conference on Future Network Systems and Security (FNSS 2015), June 11-13, 2015, Paris, France (Future Network Systems and Security, Communications in Computer and Information Science, Vol. 523, pp. 166 - 180, Springer)
  • Aderonke B. Sakpere, Anne V.D.M. Kayem, and Thabo Ndlovu (2015) A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), March 24-27, 2015, Gwangju, Korea, pp. 424 - 429
  • Aderonke B. Sakpere, Anne V.D.M. Kayem, and Thabo Ndlovu (2015) A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), March 24-27, 2015, Gwangju, Korea, pp. 424 - 429
  • Richard Ssembatya, Anne V.D.M. Kayem, and Thabo Ndlovu (2015) Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments, In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), March 24-27, 2015, Gwangju, Korea, pp. 411 - 416
  • Aderonke B. Sakpere, and Anne V.D.M. Kayem, (2015) Adaptive Buffer Resizing for Efficient Streaming Data Anonymization with Minimal Information Loss, In Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Feb. 9-11, 2015, Angers, Loire Valley, France, pp. 191 - 201{ (Invited for extension and submission to the Springer Lecture Notes series on Communications in Computer and Information Science)
  • Anne V.D.M. Kayem, Khallid Elgazzar, and Patrick Martin, (2014) Secure and Efficient Data Placement in Mobile Healthcare Services, In Proceedings of the 25th International Conference on Database and Expert Systems Applications (DEXA'2014), Munich, Germany - Sept. 1 - 4, 2014, pp. 352 - 361
  • Mark-John Burke and Anne V.D.M. Kayem, (2014) K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments, 8th International Symposium on Security and Multinodality in Pervasive Environments, (SMPE 2014), Victoria, Canada - May 13-16, 2014, pp. 833 - 840
  • Richard Ssembatya, Anne V.D.M. Kayem, Gary Marsden, (2013) On the challenge of adopting standard EHR systems in developing countries, In Proceedings of the 3rd ACM Symposium on Computing for Development (ACM DEV '13). ACM, New York, NY, USA, , Article 23 , 2 pages
  • Anne V.D.M. Kayem, Azhar Desai, and Stuart Hammar, (2012) On Anonymizing Social Network Graphs, In Proceedings of the 11th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa - August 15-17, 2012, pp. 1- 8, ISBN:978-1-4673-2160-0.
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl,(2011) Efficient Cryptographic Key Management for Outsourced Dynamic Data Sharing Environments In Proceedings of the 10th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa - August 15-17, 2012, pp. 1- 8, ISBN: 978-1-4577-1481-8.
  • Anne V.D.M. Kayem, (2010) On Monitoring Information Flow of Outsourced Data In Proceedings of the 9th Annual Information Security Conference, (ISSA 2010), Johannesburg, South Africa - August 2-4, 2010, pp. 1-8, ISBN: 978-1-4244-5494-5.
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2008) A Framework for Self-protecting Cryptographic Key Management In Proceedings of the 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO'08), October 20- 24,2008, Venice, Italy, pp. 191-200, ISBN: 978-0-7695-3404-6
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2007) Heuristics for Improving Cryptographic Key Assignment in a Hierarchy In Proceedings of the 3rd IEEE Symposium on Security in Networks and Distributed Systems, May 21-23, 2007, Niagara Falls, ON, Canada. pp. 531-536 (one of the best 20 papers selected for submission and possible publication in a special issue of the Journal of Computer Security), ISBN: 978-0-7695-2847-2
  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin (2005) An Independent Set Approach to Solving the Collaborative Attack Problem In Proceedings of the 17th IASTED International Conference, Parallel and Distributed Computing and Systems, November 14-16, 2005, Phoenix, AZ, USA. pp. 594-599, ISBN:0-88986-525-6

Have a question? .

Please drop me a line...(Email: anne{at}mykayem.org)


Find me on ...