Bibliography
Major publications by the team in recent years
- [1]
- M. Abdallah, R. Guerraoui, P. Pucheral.
Dictatorial Transaction Processing : Atomic Commitment without Veto Right, in: Distributed and Parallel Database Journal (DAPD), 2002, vol. 11, no 3. - [2]
- N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
GhostDB: querying visible and hidden data without leaks, in: 26th International Conference on Management of Data (SIGMOD), June 2007. - [3]
- N. Anciaux, L. Bouganim, P. Pucheral.
Memory Requirements for Query Execution in Highly Constrained Devices, in: Proc. of the 29th Int. Conf. on Very Large Data Bases (VLDB), 2003. - [4]
- N. Anciaux, L. Bouganim, P. Pucheral.
Future Trends in Secure Chip Data Management, in: IEEE Data Engineering Bulletin, 2007, vol. 30, no 3. - [5]
- N. Anciaux, L. Bouganim, P. Pucheral, P. Valduriez.
DiSC: Benchmarking Secure Chip DBMS, in: IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), October 2008, vol. 20, no 10. - [6]
- L. Bouganim, F. Dang-Ngoc, P. Pucheral.
Dynamic Access-Control Policies on XML Encrypted Data, in: ACM Transactions on Information and System Security (ACM TISSEC), January 2008, vol. 10, no 4. - [7]
- L. Bouganim, P. Pucheral.
Chip-Secured Data Access : Confidential Data on Untrusted Servers, in: Proc. of the 28th Int. Conf. on Very Large Data Bases (VLDB), 2002. - [8]
- L. Bouganim, F. Dang-Ngoc, P. Pucheral.
Client-Based Access Control Management for XML Documents, in: Proc. of the 30th Int. Conf. on Very Large Databases (VLDB), 2004. - [9]
- B. Finance, S. Medjdoub, P. Pucheral.
The Case for Access Control on XML Relationships, in: Proc. of the ACM Int. Conf. on Information and Knowledge Management (CIKM), 2005. - [10]
- P. Pucheral, L. Bouganim, P. Valduriez, C. Bobineau.
PicoDBMS : Scaling down Database Techniques for the Smartcard, in: Very Large Data Bases Journal (VLDBJ), Best Paper Award VLDB'2000, 2001, vol. 10, no 2-3.
Publications of the year
Articles in International Peer-Reviewed Journal
- [11]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Seamless Access to Healthcare Folders with Strong Privacy Guarantees, in: special issue of the Journal of Healthcare Delivery Reform Initiatives, 2009, to appear. - [12]
- N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
Revelation on Demand, in: Distributed and Parallel Database Journal (DAPD), April 2009, vol. 25, no 1-2. - [13]
- G. Georg, K. Anastasakis, B. Bordbar, S. H. Houmb, I. Ray, M. Toahchoodee.
Verification and Trade-off Analysis of Security Properties in UML System Models, in: IEEE Transactions on Software Engineering, 2009, to appear.
Articles in National Peer-Reviewed Journal
- [14]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Concilier Ubiquité et Sécurité des Données Médicales, in: Cahier du CRID, 2009, to appear. - [15]
- F. Dang-Ngoc.
CSXA: Sécurisation du Contrôle d'Accès pour les Documents XML, in: Revue Technique et Science Informatiques (TSI), 2009, numéro spécial des Prix de Thèse ASTI et SPECIF, to appear.
International Peer-Reviewed Conference/Proceedings
- [16]
- L. Bouganim, B. Jónsson, P. Bonnet.
uFLIP: Understanding Flash IO Patterns, in: 4th Biennial Conference on Innovative Data Systems Research (CIDR), Asilomar, California, USA, January 2009, best paper award. - [17]
- R. Dewri, I. Ray, I. Ray, D. Whitley.
POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice, in: Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009), Hong Kong, China, November 2009. - [18]
- M. Toahchoodee, X. Xie, I. Ray.
Towards Trustworthy Delegation in Role-Based Access Control Model, in: Proceedings of the 12th International Information Security Conference (ISC 2009), Pisa, Italy, September 2009. - [19]
- H. van Heerde, M. Fokkinga, N. Anciaux.
A Framework to Balance Privacy and Data Usability Using Data Degradation, in: Proc. of the IEEE International Conference on Computational Science and Engineering, Los Alamitos, CA, USA, 2009. - [20]
- S. Yin, P. Pucheral, X. Meng.
A Sequential Indexing Scheme for Flash-Based Embedded Systems, in: Proc. of the International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 2009.
National Peer-Reviewed Conference/Proceedings
- [21]
- L. Bouganim, B. Jónsson, P. Bonnet.
uFLIP: Un banc d'essai pour l'étude des performances de composants Flash, in: 25èmes journées Bases de Données Avancées (BDA), Namur, Belgium, October 2009.
Workshops without Proceedings
- [22]
- Y. Guo, S. Jacob.
Confidentialité et intégrité des grandes bases de données, in: Journées Codage et Cryptographie, Fréjus, October 2009.
Scientific Books (or Scientific Book chapters)
- [23]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Trustworthiness of Pervasive Healthcare Folders, in: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, A. Coronato, G. De Pietro (editors), Information Science Reference, 2009, to appear. - [24]
- N. Anciaux, L. Bouganim, P. Pucheral.
A Hardware Approach for Trusted Access and Usage Control, in: Handbook of research on Secure Multimedia Distribution, S. Lian, Y. Zhang (editors), Information Science Reference, 2009. - [25]
- L. Bouganim.
Data Skew, in: Encyclopedia of Database Systems, L. Liu, T. Özsu (editors), Springer, 2009. - [26]
- L. Bouganim.
Query Load Balancing in Parallel Database Systems, in: Encyclopedia of Database Systems, L. Liu, T. Özsu (editors), Springer, 2009. - [27]
- L. Bouganim, Y. Guo.
Database Encryption, in: Encyclopedia of Cryptography and Security, S. Jajodia, H. van Tilborg (editors), Springer, 2009.
Other Publications
- [28]
- N. Anciaux, L. Bouganim, P. Pucheral, S. Yin, M. Benzine, K. Jacquemin, D. Shasha, C. Salperwyck, M. E. Kholy.
Logiciel PlugDB-engine version 2, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009, July 2009. - [29]
- L. Bouganim.
Logiciel uFLIP version 2.1, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009, March 2009.
References in notes
- [30]
- R. Agrawal, J. Kiernan, R. Srikant, Y. Xu.
Hippocratic Databases, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2002. - [31]
- N. Anciaux, M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral, S. Yin.
Restoring the Patient Control over her Medical History, in: Proc. of the 21th IEEE Int. Symposium on Computer-Based Medical Systems (IEEE CBMS), Jyväskylä, Finland, June 2008. - [32]
- N. Anciaux, M. Berthelot, L. Braconnier, L. Bouganim, M. De la Blache, G. Gardarin, P. Kesmarszky, S. Lartigue, J.-F. Navarre, P. Pucheral, J.-J. Vandewalle, K. Zeitouni.
A Tamper-Resistant and Portable Healthcare Folder, in: International Journal of Telemedicine and Applications (IJTA), July 2008, vol. 2008. - [33]
- N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, P. Valduriez.
PicoDBMS : Validation and Experience, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2001. - [34]
- N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
Dégradation progressive et irréversible des données, in: 24èmes journées Bases de Données Avancées (BDA), October 2008. - [35]
- N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
Data Degradation: Making Private Data Less Sensitive Over Time, in: Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM), Napa Valley, USA, October 2008, short paper. - [36]
- N. Anciaux, L. Bouganim, H. van Heerde, P. Pucheral, P. M. G. Apers.
InstantDB : Enforcing Timely Degradation of Sensitive Data, in: Proc. of the 24th International Conference on Data Engineering (ICDE), Cancun, Mexico, April 2008, short paper. - [37]
- A. Baraani, J. Pieprzyk, R. Safavi-Naini.
Security In Databases: A Survey Study, 1996
http://citeseer.ist.psu.edu/baraani-dastjerdi96security.html. - [38]
- P. Bonnet, J. Gehrke, P. Seshadri.
Towards Sensor Database Systems, in: Proc. of Int. Conf. on Mobile Data Management, 2001. - [39]
- Computer Security Institute.
CSI/FBI Computer Crime and Security Survey, 2009
http://www.gocsi.com/2009survey/. - [40]
- F. Cuppens.
Modélisation Formelle de la Sécurité des Systèmes d'Informations, 2000, Habilitation à Diriger des Recherches, Université Paul Sabatier. - [41]
- H. Hacigumus, B. Iyer, C. Li, S. Mehrotra.
Executing SQL over Encrypted Data in the Database-Service-Provider Model, in: Proc. of the ACM SIGMOD Int. Conf. on Management of Data, 2002. - [42]
- J. He, M. Wang.
Cryptography and Relational Database Management Systems, in: Proc. of the Int. Database Engineering and Application Symposium (IDEAS), 2001. - [43]
- T. Imielinski, B. Nath.
Wireless Graffiti – Data, data everywhere, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2002. - [44]
- S. Madden, M. Franklin, J. Hellerstein, W. Hong.
The design of an Acquisitional Query Processor for Sensor Networks, in: Proc. of the ACM Sigmod Int. Conf. on Management of Data, 2003. - [45]
- T. Özsu, P. Valduriez.
Principles of Distributed Database Systems, Second Edition, Prentice Hall, 1999. - [46]
- P. Pucheral, S. Yin.
System and Method of Managing Indexation of Flash Memory, May 2007, Dépôt par Gemalto et INRIA du brevet européen n° 07290567.2. - [47]
- C. Salperwyck, N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, D. Shasha.
GhostDB: Hiding Data from Prying Eyes, in: 33th International Conference on Very Large Data Bases, (VLDB), September 2007, Demo session.