Team SMIS

Members
Overall Objectives
Scientific Foundations
Application Domains
Software
New Results
Contracts and Grants with Industry
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Major publications by the team in recent years

[1]
M. Abdallah, R. Guerraoui, P. Pucheral.
Dictatorial Transaction Processing : Atomic Commitment without Veto Right, in: Distributed and Parallel Database Journal (DAPD), 2002, vol. 11, no 3.
[2]
N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
GhostDB: querying visible and hidden data without leaks, in: 26th International Conference on Management of Data (SIGMOD), June 2007.
[3]
N. Anciaux, L. Bouganim, P. Pucheral.
Memory Requirements for Query Execution in Highly Constrained Devices, in: Proc. of the 29th Int. Conf. on Very Large Data Bases (VLDB), 2003.
[4]
N. Anciaux, L. Bouganim, P. Pucheral.
Future Trends in Secure Chip Data Management, in: IEEE Data Engineering Bulletin, 2007, vol. 30, no 3.
[5]
N. Anciaux, L. Bouganim, P. Pucheral, P. Valduriez.
DiSC: Benchmarking Secure Chip DBMS, in: IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), October 2008, vol. 20, no 10.
[6]
L. Bouganim, F. Dang-Ngoc, P. Pucheral.
Dynamic Access-Control Policies on XML Encrypted Data, in: ACM Transactions on Information and System Security (ACM TISSEC), January 2008, vol. 10, no 4.
[7]
L. Bouganim, P. Pucheral.
Chip-Secured Data Access : Confidential Data on Untrusted Servers, in: Proc. of the 28th Int. Conf. on Very Large Data Bases (VLDB), 2002.
[8]
L. Bouganim, F. Dang-Ngoc, P. Pucheral.
Client-Based Access Control Management for XML Documents, in: Proc. of the 30th Int. Conf. on Very Large Databases (VLDB), 2004.
[9]
B. Finance, S. Medjdoub, P. Pucheral.
The Case for Access Control on XML Relationships, in: Proc. of the ACM Int. Conf. on Information and Knowledge Management (CIKM), 2005.
[10]
P. Pucheral, L. Bouganim, P. Valduriez, C. Bobineau.
PicoDBMS : Scaling down Database Techniques for the Smartcard, in: Very Large Data Bases Journal (VLDBJ), Best Paper Award VLDB'2000, 2001, vol. 10, no 2-3.

Publications of the year

Articles in International Peer-Reviewed Journal

[11]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Seamless Access to Healthcare Folders with Strong Privacy Guarantees, in: special issue of the Journal of Healthcare Delivery Reform Initiatives, 2009, to appear.
[12]
N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
Revelation on Demand, in: Distributed and Parallel Database Journal (DAPD), April 2009, vol. 25, no 1-2.
[13]
G. Georg, K. Anastasakis, B. Bordbar, S. H. Houmb, I. Ray, M. Toahchoodee.
Verification and Trade-off Analysis of Security Properties in UML System Models, in: IEEE Transactions on Software Engineering, 2009, to appear.

Articles in National Peer-Reviewed Journal

[14]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Concilier Ubiquité et Sécurité des Données Médicales, in: Cahier du CRID, 2009, to appear.
[15]
F. Dang-Ngoc.
CSXA: Sécurisation du Contrôle d'Accès pour les Documents XML, in: Revue Technique et Science Informatiques (TSI), 2009, numéro spécial des Prix de Thèse ASTI et SPECIF, to appear.

International Peer-Reviewed Conference/Proceedings

[16]
L. Bouganim, B. Jónsson, P. Bonnet.
uFLIP: Understanding Flash IO Patterns, in: 4th Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, California, USA, January 2009, best paper award.
[17]
R. Dewri, I. Ray, I. Ray, D. Whitley.
POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice, in: Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009), Hong Kong, China, November 2009.
[18]
M. Toahchoodee, X. Xie, I. Ray.
Towards Trustworthy Delegation in Role-Based Access Control Model, in: Proceedings of the 12th International Information Security Conference (ISC 2009), Pisa, Italy, September 2009.
[19]
H. van Heerde, M. Fokkinga, N. Anciaux.
A Framework to Balance Privacy and Data Usability Using Data Degradation, in: Proc. of the IEEE International Conference on Computational Science and Engineering, Los Alamitos, CA, USA, 2009.
[20]
S. Yin, P. Pucheral, X. Meng.
A Sequential Indexing Scheme for Flash-Based Embedded Systems, in: Proc. of the International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 2009.

National Peer-Reviewed Conference/Proceedings

[21]
L. Bouganim, B. Jónsson, P. Bonnet.
uFLIP: Un banc d'essai pour l'étude des performances de composants Flash, in: 25èmes journées Bases de Données Avancées (BDA), Namur, Belgium, October 2009.

Workshops without Proceedings

[22]
Y. Guo, S. Jacob.
Confidentialité et intégrité des grandes bases de données, in: Journées Codage et Cryptographie, Fréjus, October 2009.

Scientific Books (or Scientific Book chapters)

[23]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Trustworthiness of Pervasive Healthcare Folders, in: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, A. Coronato, G. De Pietro (editors), Information Science Reference, 2009, to appear.
[24]
N. Anciaux, L. Bouganim, P. Pucheral.
A Hardware Approach for Trusted Access and Usage Control, in: Handbook of research on Secure Multimedia Distribution, S. Lian, Y. Zhang (editors), Information Science Reference, 2009.
[25]
L. Bouganim.
Data Skew, in: Encyclopedia of Database Systems, L. Liu, T. Özsu (editors), Springer, 2009.
[26]
L. Bouganim.
Query Load Balancing in Parallel Database Systems, in: Encyclopedia of Database Systems, L. Liu, T. Özsu (editors), Springer, 2009.
[27]
L. Bouganim, Y. Guo.
Database Encryption, in: Encyclopedia of Cryptography and Security, S. Jajodia, H. van Tilborg (editors), Springer, 2009.

Other Publications

[28]
N. Anciaux, L. Bouganim, P. Pucheral, S. Yin, M. Benzine, K. Jacquemin, D. Shasha, C. Salperwyck, M. E. Kholy.
Logiciel PlugDB-engine version 2, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009, July 2009.
[29]
L. Bouganim.
Logiciel uFLIP version 2.1, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009, March 2009.

References in notes

[30]
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu.
Hippocratic Databases, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2002.
[31]
N. Anciaux, M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral, S. Yin.
Restoring the Patient Control over her Medical History, in: Proc. of the 21th IEEE Int. Symposium on Computer-Based Medical Systems (IEEE CBMS), Jyväskylä, Finland, June 2008.
[32]
N. Anciaux, M. Berthelot, L. Braconnier, L. Bouganim, M. De la Blache, G. Gardarin, P. Kesmarszky, S. Lartigue, J.-F. Navarre, P. Pucheral, J.-J. Vandewalle, K. Zeitouni.
A Tamper-Resistant and Portable Healthcare Folder, in: International Journal of Telemedicine and Applications (IJTA), July 2008, vol. 2008.
[33]
N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, P. Valduriez.
PicoDBMS : Validation and Experience, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2001.
[34]
N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
Dégradation progressive et irréversible des données, in: 24èmes journées Bases de Données Avancées (BDA), October 2008.
[35]
N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
Data Degradation: Making Private Data Less Sensitive Over Time, in: Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM), Napa Valley, USA, October 2008, short paper.
[36]
N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
InstantDB : Enforcing Timely Degradation of Sensitive Data, in: Proc. of the 24th International Conference on Data Engineering (ICDE), Cancun, Mexico, April 2008, short paper.
[37]
A. Baraani, J. Pieprzyk, R. Safavi-Naini.
Security In Databases: A Survey Study, 1996
http://citeseer.ist.psu.edu/baraani-dastjerdi96security.html.
[38]
P. Bonnet, J. Gehrke, P. Seshadri.
Towards Sensor Database Systems, in: Proc. of Int. Conf. on Mobile Data Management, 2001.
[39]
Computer Security Institute.
CSI/FBI Computer Crime and Security Survey, 2009
http://www.gocsi.com/2009survey/.
[40]
F. Cuppens.
Modélisation Formelle de la Sécurité des Systèmes d'Informations, 2000, Habilitation à Diriger des Recherches, Université Paul Sabatier.
[41]
H. Hacigumus, B. Iyer, C. Li, S. Mehrotra.
Executing SQL over Encrypted Data in the Database-Service-Provider Model, in: Proc. of the ACM SIGMOD Int. Conf. on Management of Data, 2002.
[42]
J. He, M. Wang.
Cryptography and Relational Database Management Systems, in: Proc. of the Int. Database Engineering and Application Symposium (IDEAS), 2001.
[43]
T. Imielinski, B. Nath.
Wireless Graffiti – Data, data everywhere, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2002.
[44]
S. Madden, M. Franklin, J. Hellerstein, W. Hong.
The design of an Acquisitional Query Processor for Sensor Networks, in: Proc. of the ACM Sigmod Int. Conf. on Management of Data, 2003.
[45]
T. Özsu, P. Valduriez.
Principles of Distributed Database Systems, Second Edition, Prentice Hall, 1999.
[46]
P. Pucheral, S. Yin.
System and Method of Managing Indexation of Flash Memory, May 2007, Dépôt par Gemalto et INRIA du brevet européen n° 07290567.2.
[47]
C. Salperwyck, N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
GhostDB: Hiding Data from Prying Eyes, in: 33th International Conference on Very Large Data Bases, (VLDB), September 2007, Demo session.

previous
next