Publications

For publications under the SANCOOP project, please see here.

2015

  • Pacome L. Ambassa, Anne V.D.M. Kayem, Stephen D. Wolthusen and Christoph Meinel (2015),
    Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids“, In Proceedings, 1st International Conference on Future Network Systems and Security (FNSS
    2015), Paris, France – June 11-13, 2015 .bib
  • Aderonke B. Sakpere, Anne V.D.M. Kayem, and Thabo Ndlovu (2015),
    A Usable and Secure Crime Reporting System for Technology Resource Con-
    strained Contexts
    “, In Proceedings of the 29th IEEE International Conference
    on Advanced Information Networking and Applications Workshops (WAINA
    2015), Gwangju, Korea – March 24-27, 2015
  • Richard Ssembatya, and Anne V.D.M. Kayem, (2015), “Secure and Efficient
    Mobile Personal Health Data Sharing in Resource Constrained Environments
    “,
    In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2015), Gwangju, Korea – March 24-27, 2015 (Accepted – In Press)
  • Aderonke B. Sakpere, and Anne V.D.M. Kayem, (2015), “Adaptive Buffer Re-sizing for Eficient Streaming Data Anonymization with Minimal Information Loss“, In Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, Loire Valley, France – Feb. 9-11, 2015 (Accepted – In Press)

2014

  • Anne V.D.M. Kayem, and Christoph Meinel, (eds) (2014) “Information Security in Diverse Computing Environments“, IGI Global (IGI), PA, USA
  • Anne V.D.M. Kayem, Khallid Elgazzar, and Patrick Martin, (2014), “Secure and Efficient Data Placement in Mobile Healthcare Services“, In Proceedings of the 25th International Conference on Database and Expert Systems Applications (DEXA’2014), Munich, Germany – Sept. 1 – 4, 2014, pp. 352 – 361
  • Anne V.D.M. Kayem, Richard Ssembatya, and Mark-John Burke (2014) “Diversity in Security Environments: The Why and the Wherefore ” Chapter in Book, “Information Security in Diverse Computing Environments“, IGI Global (IGI), PA, USA, pp. 1-7
  • Gregory L. Harding, and Anne V.D.M. Kayem, (2014) “Design of an IPTV Conditional Access System Supporting Multiple Services“, Chapter in Book, “Information Security in Diverse Computing Environments“, IGI Global (IGI),
    PA, USA; pp. 59-99
  • Anne V.D.M. Kayem, Rotondwa Ratshidaho, Molulaqhooa Maoyi, and Sanele Macanda (2014) “Experiences with Threat Modeling on a Prototype Social Network.” Chapter in Book, “Information Security in Diverse Computing Environments“, IGI Global (IGI), PA, USA; pp. 261-279
  • Aderonke B. Sakpere, and Anne V.D.M. Kayem, (2014) “A State-of-the-Art Review of Data Stream Anonymization Schemes.“, Chapter in Book, “Information Security in Diverse Computing Environments“, IGI Global (IGI), PA, USA;
    pp. 24-50

2013

  • Andrew Adamatsky, and Anne V.D.M. Kayem, (2013), “Biological Evaluation of Trans-African Highways“, European Physical Journal : Special Topics (Special Issue on “Spatially Embedded Complex Networks : Aspects and Standards”), Vol. 215, Issue 1, pp. 49-59, January 2013; Springer. http://dx.doi.org/10.1140/epjst/e2013-01714-6
  • Richard Ssembatya, Anne V.D.M. Kayem, Gary Marsden, (2013) “On the challenge of adopting standard EHR systems in developing countries“, In Proceedings of the 3rd ACM Symposium on Computing for Development (ACM DEV ’13). ACM, New York, NY, USA, , Article 23 , 2 pages.

2012

  • Anne V.D.M. Kayem, Azhar Desai, and Stuart Hammar, (2012) “On Anonymizing Social Network Graphs“, 11th Annual Information Security Conference, (ISSA 2012), Johannesburg, South Africa – August 15-17, 2012, pp. 1- 8, ISBN:978-1-4673-2160-0.
  • Andrew Adamatzky, Selim Akl, Ramon Alonso-Sanz,Wesley van Dessel, Zuwairie Ibrahim, Andrew Ilachinski, Je Jones, Anne V D M Kayem, Genaro J Martinez, Pedro de Oliveira, Mikhail Prokopenko, Theresa Schubert, Peter Sloot, Emanuele Strano and Xin-She Yang (2012) “Bio-Rationality of Motorways“,Chapter in Book, “BIOEVALUATION OF WORLD TRANSPORT NETWORKS“, (Eds.) Andrew Adamatsky (Publisher { World Scienti c),pp. 309 – 326, ISBN: 978-981-4407-03-8
  • Andrew Adamatsky, and Anne V.D.M. Kayem, (2012), “Trans-African Highways“, pp. 19 – 46, “Bioevaluation of World Transport Networks“, (World Scienti c) ISBN: 978-981-4407-03-8

2011

  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2011) “Enhancing Identity Trust in Cryptographic Key Management Systems for Dynamic Environments“, Wiley’s Security and Communication Networks Journal, Vol. 4, Number 1, pp. 74 -94, 2011
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl,(2011) “Efficient Cryptographic Key Management for Outsourced Dynamic Data Sharing Environments“, 10th Annual Information Security Conference, (ISSA 2011), Johannesburg, South Africa – August 15-17, 2011, pp. 1-8, ISBN: 978-1-4577-1481-8
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2011) “Self-Protecting Access Control: Mitigating Vulnerabilities and Inefficiencies with Fault Tolerance“, Chapter in Book, “Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards“, IGI Global (IGI), PA, USA, pp. 95-128, 2011

2010

  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin, (2010) “Adaptive Cryptographic Access Control“, Monograph/Book in the Kluwer International Series on Advances in Information Security, (Publisher – Springer), ISBN 978-1-4419-6654-4
  • Anne V.D.M. Kayem, (2010) “Security in Service Oriented Architectures: Standards and Challenges“, Chapter in Book, “Web Services Security Development and Architecture: Theoretical and Practical Issues“, IGI Global (IGI), PA,USA, pp. 187-211, 2010.

2008

  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin, (2008), “On Replacing Cryptographic Keys in Hierarchical Key Management Systems“, Journal of Computer Security, Vol. 16, Number 3, pp. 289-309, 2008.
  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2008) “A Framework for Self-protecting Cryptographic Key Management“, 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO’08), October 20- 24, 2008, Venice, Italy, pp. 191-200, ISBN: 978-0-7695-3404-6

2007

  • Anne V.D.M. Kayem, Patrick Martin, and Selim G. Akl, (2007) “Heuristics for Improving Cryptographic Key Assignment in a Hierarchy“, In Proceedings of the 3rd IEEE Symposium on Security in Networks and Distributed Systems, May 21-23, 2007, Niagara Falls, ON, Canada. pp. 531-536 (one of the best 20 papers selected for submission and possible publication in a special issue of the
    Journal of Computer Security), ISBN: 978-0-7695-2847-2

2005

  • Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin, (2005) “An Independent Set Approach to Solving the Collaborative Attack Problem“, In Proceedings of the 17th IASTED International Conference, Parallel and Distributed Computing and Systems, November 14-16, 2005, Phoenix, AZ, USA. pp. 594-599, ISBN: 0-88986-525-6