Smiley face

Anne Kayem

A Senior Researcher in the area of Data Privacy and Security in the Internet Technologies and Systems Group, at the Hasso-Plattner-Institute, Germany. I hold a PhD in Computer Science from Queen's University, Canada. My current research involves designing and analysing secure and privacy preserving data sharing algorithms, the implementation/testing of these algorithms, and studying human mindsets/perceptions towards security/privacy solutions.

Jobs & Workshops...

Teaching...

  • Seminar: Usable Security and Privacy, SS2017-2020
  • Lecture: Topics in Data Privacy, WS2020
  • Lecture: Introduction to IT Systems, WS2019-2020
  • Lecture: Operating Systems, SS2014 - 2015
  • Lecture: Compilers: Theory and Practice, WS2012
  • Lecture: Data Structures, SS2011 - 2015
  • Lecture: Java Programming, WS2010 - 2014
  • Lecture: Computer Architectures, WS2003
  • Lecture: Database Management Systems, WS2003
  • Lecture: Programming for Engineers, WS2003

Selected Peer-Reviewed Publications.


Books

  • Kayem A., Wolthusen S.D., Meinel C., (eds) (2018) Smart Micro-Grid Systems Security and Privacy, In Advances in Information Security, Vol. 71 (Springer), ISBN 978-3-319-91426-8
  • Kayem A., Meinel C., (eds) (2014) Information Security in Diverse Computing Environments, (IGI USA), ISBN 1466661585 9781466661585
  • Kayem A., Akl S.G., Martin P., (2010) Adaptive Cryptographic Access Control, In Advances in Information Security, (Springer), ISBN 978-1-4419-6654-4

Journal Publications /Book Chapters

  • Kayem A., Vester CT, and Meinel C. (2018), Heuristics for Efficient t-closeness Data Anonymisation in Resource Constrained Environments, In Springer LNCS Transactions on Large Scale Data an Knowledge-Centered Systems (TLDKS) Vol. 38, LNCS 11250, pp. 27--60 (Springer)
  • Abuelgasim A., Kayem A. (2017), A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media, Book: Information Systems Security and Privacy, In Springer Lecture Series on Communications in Computer and Information Science, Vol. 691, pp. 108--129, DOI: 10.1007/978-3-319-54433-5_7 (Springer)
  • Kayem A., Martin P., Elgazzar K., Meinel C. (2016) Operating Secure Mobile Healthcare Services over Constrained Resource Networks, Book: Emergent Computation, In Springer Lecture Series on Communications in Computer and Information Science, Chp. Vol. 24, pp. 361--391, DOI: 10.1007/978-3-319-46376-6_16 (Springer)
  • Sakpere A.B., Kayem A. (2015) Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences. In: Camp O., Weippl E., Bidan C., A├»meur E. (eds) Information Systems Security and Privacy. Communications in Computer and Information Science, Chp. 8, vol 576. Springer, Cham DOI:10.1007/978-3-319-27668-7 8 (Springer)
  • Adamatsky A., and Kayem A., (2013) Biological Evaluation of Trans-African Highways, European Physical Journal : Special Topics (Special Issue on Spatially Embedded Complex Networks : Aspects and Standards), Vol.215, Issue 1, pp. 49-59, January 2013; Springer.
  • Adamatsky A., and Kayem A., (2012) Trans-African Highways, Book: BIOEVALUATION OF WORLD TRANSPORT NETWORKS, (Eds.) Andrew Adamatsky, (Publisher: World Scientific), pp. 19 - 46, ISBN: 978-981-4407-03-8
  • Adamatzky A., Akl S.G., Alonso-Sanz R., van Dessel W., Ibrahim Z., Ilachinski A., Jones J., Kayem A., Martinez G.J., de Oliveira P., Prokopenko M., Schubert T., Sloot P., Strano E., Yang X-S. (2012) Are Motorways Rational from Slime Mould's point of view?, International Journal of Parallel, Emergent and Distributed Systems, Vol. 28, Issue 3, pp. 230-248 (Taylor & Francis Group)
  • Kayem A., Martin P., Akl S.G. (2011) Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments, Wiley's Security and Communication Networks Journal, Vol. 4, No. 1, pp. 74 -94, 2011. (Wiley)
  • Kayem A., Martin P., and Akl S.G., (2011) Self-Protecting Access Control: Mitigating Vulnerabilities and Inefficiencies with Fault-Tolerance, Book: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, IGI Global (IGI), PA, USA, pp. 95-128, 2011
  • Kayem A., (2010) Security in Service Oriented Architectures: Standards and Challenges, Book: Web Services Security Development and Architecture: Theoretical and Practical Issues, IGI Global (IGI), PA, USA, pp.187-211, 2010.
  • Kayem A., Akl S.G., Martin P. (2008) On Replacing Cryptographic Keys in Hierarchical Key Management Systems, Journal of Computer Security, Vol. 16, No. 3, pp. 289-309, 2008. (IOS Press)

Conference and Workshop Papers

  • Podlesny N.J., Kayem A., and Meinel C. (2019), Towards Identifying De-anonymisation Risks in Distributed Health Silos In Proceedings, 30th International Conference on Database and Expert Systems Applications, (DEXA 2019), August 26-29, 2019, Linz, Austria, To Appear (Springer)
  • Podlesny N.J., Kayem A., and Meinel C. (2019), Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks optimised by Multigrid and Manifold In Proceedings, 17th IEEE International Conference on Dependable, Autonomic, and Secure Computing, (DASC 2019), August 5-8, 2019, Fukuoka, Japan, To Appear (IEEE)
  • Podlesny N.J., Kayem A., and Meinel C. (2019), Attribute Compartmentation and Greedy UCC Discovery for High Dimensional Data Anonymisation In Proceedings, 9th ACM Conference on Data and Application Security and Privacy, (CODASPY 2019), March 25-27, 2019, Richardson, TX, USA, pp. 109--119 (ACM)
  • Tokura K.A., Sukmana M.I.H., Menig M., Kayem A., Cheng F., Graupner H., and Meinel C. (2018), Securing Cloud Storage Brokerage Systems Through Threat Models In Proceedings, 32nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2018), May 16-18, 2018, Krakow, Poland, pp. 759--768 (IEEE)
  • Podlesny N.J., Kayem A., and Meinel C. (2018), High-Dimensional Data Anonymisation Using In-Memory Applications and mpmUCCs In Proceedings, 29th International Conference on Database and Expert System Applications (DEXA 2018), Sept. 3-6, 2018, Regensburg, Germany, pp. 85--100 (Springer)
  • Tokura K.A., Sukmana M.I.H., Kayem A., Cheng F., and Meinel C. (2018) A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures In Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13 (2018), pp. 932-939 (IEEE).
  • Sakpere A.B., and Kayem A. (2017) On Anonymising Streaming Crime Data: A Solution Approach for Resource Constrained Environments In Proceedings of Privacy and Identity Management. The Smart Revolution - 12th IFIPWG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers (2017), pp. 170-186 (Springer)
  • Kayem A., and Meinel C. (2017) Clustering Heuristics for Efficient t-closeness Anonymisation In Proceedings of the 28th International Conference on Database and Expert Systems Applications (DEXA'2017), Lyon, France - Aug. 28 - 31, 2017, Part 2, pp. 27-34 (Springer)
  • Kayem A., Meinel C., Wolthusen S.D. (2017), A Smart Micro-Grid Architecture for Resource Constrained Environments In Proceedings, 31st IEEE International Conference on Advanced Information Networking and Applications (AINA 2017), March 27-29, 2017, Taipei, Taiwan, pp. 857--864, DOI 10.1109/AINA.2017.36 (IEEE)
  • Marufu A., Kayem A., Wolthusen S.D. (2016), Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids In Proceedings, IEEE 14th International Conference on Smart City (HPCC/SmartCity/DSS), Sydney, NSW, 2016, pp. 1380-1387 DOI: 10.1109/HPCC-SmartCity-DSS.2016.0195 (IEEE)
  • Weldehawaryat G.K., Ambassa P.L., Marufu A., Wolthusen S.D., and Kayem A. (2016), Secure and Decentralised Power Consumption Scheduling in Constrained Micro-Grids In Proceedings, 2nd Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), September 26-30, 2016, Heraklion, Greece (To Appear)
  • Ambassa P.L., Wolthusen S.D., Kayem A., Meinel C. (2016) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Microgrids, In Proceedings, 2nd Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), September 26-30, 2016, Heraklion, Greece (To Appear)
  • Marufu A., Kayem A., Wolthusen S.D. (2016) Power Auctioning in Resource Constrained Micro-Grids: Cases of Cheating, In Proceedings, 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10-12, 2016, Paris, France, Lecture Notes in Computer Science, Springer-Verlag (Vol. 10242, pp.137-149)
  • Strauss H., Kayem A., and Wolthusen S.D. (2016) Reliable Key Distribution in Smart Micro-Grids: Attack Models and Countermeasures, In Proceedings, 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), October 10-12, 2016, Paris, France, Lecture Notes in Computer Science, Springer-Verlag (To Appear)
  • Kayem A., Vester CT, Meinel C. (2016) Automated k-Anonymization and l-Diversity for Shared Data Privacy, In Proceedings of the 27th International Conference on Database and Expert Systems Applications (DEXA'2016), Porto, Portugal - Sept. 5 - 8, 2016, Part 1, pp. 105-120
  • Kayem A. (2016) Graphical Passwords - A Discussion, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 596-600.
  • Kayem A., Strauss H., Wolthusen S.D. and Meinel C. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-Grids, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 585 - 590.
  • Ambassa P.L., Kayem A., Wolthusen S.D. and Meinel C. (2016) Privacy Violations in Constrained Micro-Grids: Adversarial Cases, In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2016), March 23-25, 2016, Crans-Montana, Switzerland, pp. 601 - 606.
  • Abuelgasim A., Kayem A. (2016) An Approach to Personalized Privacy Recommendations on Online Social Networks, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy - Feb. 19-21, 2016, pp. 126-137{ (Invited for extension and submission to the Springer Lecture Notes series on Communications in Computer and Information Science)
  • Marufu A., Kayem A., and Wolthusen S.D. (2016) Fault-Tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy - Feb. 19-21, 2016, pp. 448-456
  • Ambassa P.L., Wolthusen S.D., Kayem A., Meinel C. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids, In Proceedings, IEEE Power and Energy Society Innovative Smart Grid Technologies Asia 2015 (IEEE-ISGT-ASIA 2015), November 4-6, 2015, Bangkok, Thailand, pp.1-6, DOI:10.1109/ISGT-Asia.2015.7387160 (IEEE)
  • Marufu A., Kayem A., Wolthusen S.D. (2015) A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids, In Proceedings, 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015), October 5-7, 2015, Berlin, Germany; Vol. 9578, Lecture Notes in Computer Science, Springer-Verlag, pp. 183-196, DOI: 10.1007/978-3-319-33331-1 15 (Springer)
  • Ambassa P.L., Kayem A., Wolthusen S.D., Meinel C. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids, In Proceedings, 1st International Conference on Future Network Systems and Security (FNSS 2015), June 11-13, 2015, Paris, France (Future Network Systems and Security, Communications in Computer and Information Science, Vol. 523, pp. 166 - 180, Springer)
  • Sakpere A.B., Kayem A., and Ndlovu T. (2015) A Usable and Secure Crime Reporting System for Technology Resource Constrained Contexts, In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), March 24-27, 2015, Gwangju, Korea, pp. 424 - 429
  • Ssembatya R., Kayem A., and Ndlovu T. (2015) Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments, In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), March 24-27, 2015, Gwangju, Korea, pp. 411 - 416
  • Sakpere A.B., and Kayem A., (2015) Adaptive Buffer Resizing for Efficient Streaming Data Anonymization with Minimal Information Loss, In Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Feb. 9-11, 2015, Angers, Loire Valley, France, pp. 191 - 201{ (Invited for extension and submission to the Springer Lecture Notes series on Communications in Computer and Information Science)
  • Kayem A., Elgazzar A., and Martin P., (2014) Secure and Efficient Data Placement in Mobile Healthcare Services, In Proceedings of the 25th International Conference on Database and Expert Systems Applications (DEXA'2014), Munich, Germany - Sept. 1 - 4, 2014, pp. 352 - 361
  • Burke M-J. and Kayem A., (2014) K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments, 8th International Symposium on Security and Multinodality in Pervasive Environments, (SMPE 2014), Victoria, Canada - May 13-16, 2014, pp. 833 - 840
  • Ssembatya R, Kayem A., Marsden G., (2013) On the challenge of adopting standard EHR systems in developing countries, In Proceedings of the 3rd ACM Symposium on Computing for Development (ACM DEV '13). ACM, New York, NY, USA, , Article 23 , 2 pages
  • Kayem A., Desai A., and Hammar S., (2012) On Anonymizing Social Network Graphs, In Proceedings of the 11th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa - August 15-17, 2012, pp. 1- 8, ISBN:978-1-4673-2160-0.
  • Kayem A., Martin P., Akl S.G. (2011) Efficient Cryptographic Key Management for Outsourced Dynamic Data Sharing Environments In Proceedings of the 10th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa - August 15-17, 2012, pp. 1- 8, ISBN: 978-1-4577-1481-8.
  • Kayem A., (2010) On Monitoring Information Flow of Outsourced Data In Proceedings of the 9th Annual Information Security Conference, (ISSA 2010), Johannesburg, South Africa - August 2-4, 2010, pp. 1-8, ISBN: 978-1-4244-5494-5.
  • Kayem A., Martin P., and Akl S.G., (2008) A Framework for Self-protecting Cryptographic Key Management In Proceedings of the 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO'08), October 20- 24,2008, Venice, Italy, pp. 191-200, ISBN: 978-0-7695-3404-6
  • Kayem A., Martin P., and Akl S.G., (2007) Heuristics for Improving Cryptographic Key Assignment in a Hierarchy In Proceedings of the 3rd IEEE Symposium on Security in Networks and Distributed Systems, May 21-23, 2007, Niagara Falls, ON, Canada. pp. 531-536 (one of the best 20 papers selected for submission and possible publication in a special issue of the Journal of Computer Security), ISBN: 978-0-7695-2847-2
  • Kayem A., Akl S.G., and Martin P. (2005) An Independent Set Approach to Solving the Collaborative Attack Problem In Proceedings of the 17th IASTED International Conference, Parallel and Distributed Computing and Systems, November 14-16, 2005, Phoenix, AZ, USA. pp. 594-599, ISBN:0-88986-525-6

Have a question? .

Please drop me a line...(Email: anne{at}mykayem.org)


Find me on ...