Publications équipe SMIS - 2008 à 2013

Articles

  1. Juan Pan, Iulian Sandu-Popa, Karine Zeitouni and Cristian Borcea. Proactive Vehicular Traffic re-routing for Lower Travel Time. IEEE Transactions on Vehicular Technology, 2013. to appear. BibTeX

    @article{PPZB13,
    	author = "Juan Pan and Iulian Sandu-Popa and Karine Zeitouni and Cristian Borcea",
    	title = "Proactive Vehicular Traffic re-routing for Lower Travel Time",
    	journal = "IEEE Transactions on Vehicular Technology",
    	year = 2013,
    	note = "to appear"
    }
    
  2. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. Exposition Minimum de Données pour les Applications à base de classifieurs (version étendue). Ingénierie des Systèmes d'Information, 2013. to appear. BibTeX

    @article{ANVa13,
    	author = "Nicolas Anciaux and Benjamin Nguyen and Michalis Vazirgiannis",
    	title = "Exposition Minimum de Donn\'ees pour les Applications \`a base de classifieurs (version \'etendue)",
    	journal = "Ing\'enierie des Syst\`emes d'Information",
    	year = 2013,
    	note = "to appear",
    	annote = "revnat"
    }
    
  3. Nicolas Anciaux, Danae Boutara, Benjamin Nguyen and Michalis Vazirgiannis. Limiting Data Exposure in Multi-Label Classification Processes (Extended Version). Fundamenta Informaticae, 2013. to appear. BibTeX

    @article{ABNV13b,
    	author = "Anciaux, Nicolas and Boutara, Danae and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Limiting Data Exposure in Multi-Label Classification Processes (Extended Version)}",
    	journal = "Fundamenta Informaticae",
    	year = 2013,
    	note = "to appear",
    	annote = "revint",
    	audience = "internationale"
    }
    
  4. Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, Yanli Guo, Lionel Le Folgoc and Shaoyi Yin. MILo-DB: a Personal, Secure and Portable Database Machine. Distributed and Parallel Databases, 2013. to appear. URL BibTeX

    @article{ABP+13,
    	author = "Anciaux, Nicolas and Bouganim, Luc and Pucheral, Philippe and Guo, Yanli and Le Folgoc, Lionel and Yin, Shaoyi",
    	title = "{MILo-DB: a Personal, Secure and Portable Database Machine}",
    	journal = "Distributed and Parallel Databases",
    	year = 2013,
    	note = "to appear",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "revint",
    	audience = "internationale",
    	hal_id = "hal-00768355",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768355"
    }
    
  5. Tristan Allard, Benjamin Nguyen and Philippe Pucheral. {\textsc{MET$_\mathbbA$P} : Revisiting Privacy-Preserving Data Publishing using Secure Devices}. Distributed and Parallel Databases, 2013. to appear. BibTeX

    @article{ANPu13,
    	author = "Allard, Tristan and Nguyen, Benjamin and Pucheral, Philippe",
    	title = "{\textsc{MET$_\mathbb{A}$P} : Revisiting Privacy-Preserving Data Publishing using Secure Devices}",
    	journal = "Distributed and Parallel Databases",
    	year = 2013,
    	note = "to appear",
    	annote = "revint",
    	audience = "internationale"
    }
    
  1. Shaoyi Yin and Philippe Pucheral. PBFilter: a Flash-Based Indexing Scheme for Embedded Systems. Information Systems 37(7):634-653, 2012.
    Abstract NAND Flash has become the most widely used electronic stable storage technology for embedded systems. As on-board storage capacity increases, the need for efficient indexing techniques arises. Such techniques are very challenging to design due to a combination of NAND Flash constraints (e.g., block-erase-before-page-rewrite constraint and limited number of erase cycles) and embedded system constraints (e.g., tiny RAM and resource consumption predictability). Previous work adapted traditional indexing methods to cope with Flash constraints by deferring index updates using a log and batching them to decrease the number of rewrite operations in Flash memory. However, these methods were not designed with embedded system constraints in mind and do not address them properly. In this paper, we propose a different alternative for indexing Flash-resident data that specifically addresses the embedded context. This approach, called PBFilter, organizes the index structure in a purely sequential way. Key lookups are sped up thanks to two principles called Summarization and Partitioning. We instantiate these principles with data structures and algorithms based on Bloom Filters and show the effectiveness of this approach through a comprehensive analytical performance study. Extensions of PBFilter on range queries and multi-criteria queries are also discussed. The proposed technique is integrated into a full-fledged embedded DBMS engine. We describe the complete design of the DBMS engine to illustrate the feasibility of adopting PBFilter technique in a real system. Finally, we show some performance measurements of the prototype on top of a real hardware platform, in order to validate the new technique in a practical manner. URL BibTeX

    @article{YiPu12,
    	author = "Yin, Shaoyi and Pucheral, Philippe",
    	title = "{PBFilter: a Flash-Based Indexing Scheme for Embedded Systems}",
    	journal = "Information Systems",
    	year = 2012,
    	volume = 37,
    	pages = "634-653",
    	number = 7,
    	abstract = "{NAND Flash has become the most widely used electronic stable storage technology for embedded systems. As on-board storage capacity increases, the need for efficient indexing techniques arises. Such techniques are very challenging to design due to a combination of NAND Flash constraints (e.g., block-erase-before-page-rewrite constraint and limited number of erase cycles) and embedded system constraints (e.g., tiny RAM and resource consumption predictability). Previous work adapted traditional indexing methods to cope with Flash constraints by deferring index updates using a log and batching them to decrease the number of rewrite operations in Flash memory. However, these methods were not designed with embedded system constraints in mind and do not address them properly. In this paper, we propose a different alternative for indexing Flash-resident data that specifically addresses the embedded context. This approach, called PBFilter, organizes the index structure in a purely sequential way. Key lookups are sped up thanks to two principles called Summarization and Partitioning. We instantiate these principles with data structures and algorithms based on Bloom Filters and show the effectiveness of this approach through a comprehensive analytical performance study. Extensions of PBFilter on range queries and multi-criteria queries are also discussed. The proposed technique is integrated into a full-fledged embedded DBMS engine. We describe the complete design of the DBMS engine to illustrate the feasibility of adopting PBFilter technique in a real system. Finally, we show some performance measurements of the prototype on top of a real hardware platform, in order to validate the new technique in a practical manner.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "revint",
    	audience = "internationale",
    	hal_id = "hal-00768380",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768380"
    }
    
  2. Nicolas Anciaux, Jean-Marc Petit, Philippe Pucheral and Karine Zeitouni. Personal Data Server: Keeping Sensitive Data under the Indiviual's Control. ERCIM NEWS 90:39-40, 2012. BibTeX

    @article{APPZ12,
    	author = "{Anciaux, Nicolas and Petit, Jean-Marc and Pucheral, Philippe and Zeitouni, Karine}",
    	title = "{Personal Data Server: Keeping Sensitive Data under the Indiviual's Control}",
    	journal = "{ERCIM NEWS}",
    	year = "{2012}",
    	volume = "{90}",
    	pages = "{39-40}",
    	annote = "revint",
    	owner = "MOIS",
    	timestamp = "2012.10.31"
    }
    
  3. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. The Minimum Exposure Project: Limiting Data Collection in Online Forms. ERCIM NEWS 90:41, 2012. BibTeX

    @article{ANVa12a,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{The Minimum Exposure Project: Limiting Data Collection in Online Forms}",
    	journal = "{ERCIM NEWS}",
    	year = "{2012}",
    	volume = "{90}",
    	pages = "{41}",
    	annote = "revint",
    	owner = "MOIS",
    	timestamp = "2012.10.31"
    }
    
  1. Benjamin Nguyen, Antoine Vion, Fran\c Dudouet, Dario Colazzo, Ioana Manolescu and Pierre Senellart. XML content warehousing: Improving sociological studies of mailing lists and web data. {Bulletin of Sociological Methodology/Bulletin de Méthodologie Sociologique} 112(1):5-31, 2011. URL, DOI BibTeX

    @article{NVD+11,
    	author = "Nguyen, Benjamin and Vion, Antoine and Dudouet, Fran{\c c}ois-Xavier and Colazzo, Dario and Manolescu, Ioana and Senellart, Pierre",
    	title = "{XML content warehousing: Improving sociological studies of mailing lists and web data}",
    	journal = "{Bulletin of Sociological Methodology/Bulletin de M{\'e}thodologie Sociologique}",
    	year = 2011,
    	volume = 112,
    	pages = "5-31",
    	number = 1,
    	annote = "revint",
    	doi = "10.1177/0759106311417540",
    	url = "http://hal.inria.fr/hal-00616613/en",
    	x-editorial-board = "yes",
    	x-id-hal = "hal-00616613",
    	x-international-audience = "yes"
    }
    
  1. B Nguyen, A Vion, F X Dudouet, D Colazzo and I Manolescu. WebStand, une plateforme de gestion de données Web pour applications sociologiques. Technique et Science Informatiques (TSI), numéro spécial sur L'informatique à l'Interface des Sciences Humaines et Sociales 29(8-9):1055-1080, 2010. BibTeX

    @article{NVD+10,
    	author = "B. Nguyen and A. Vion and F. X. Dudouet and D. Colazzo and I. Manolescu",
    	title = "WebStand, une plateforme de gestion de données Web pour applications sociologiques",
    	journal = "Technique et Science Informatiques (TSI), numéro spécial sur L'informatique à l'Interface des Sciences Humaines et Sociales",
    	year = 2010,
    	volume = 29,
    	pages = "1055-1080",
    	number = "8-9",
    	annote = "revnat",
    	x-editorial-board = "yes",
    	x-international-audience = "no"
    }
    
  2. M Bjørling, P Bonnet, L Bouganim and B Jónsson. uFLIP: Understanding the Energy Consumption of Flash Devices. IEEE Data Engineering Bulletin 33(4):48-54, 2010. BibTeX

    @article{BBB+10,
    	author = "M. Bjørling and P. Bonnet and L. Bouganim and B. J\'{o}nsson",
    	title = "uFLIP: Understanding the Energy Consumption of Flash Devices",
    	journal = "IEEE Data Engineering Bulletin",
    	year = 2010,
    	volume = 33,
    	pages = "48-54",
    	number = 4,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "DK,IS"
    }
    
  1. G Georg, K Anastasakis, B Bordbar, S H Houmb, I Ray and M Toahchoodee. Verification and Trade-off Analysis of Security Properties in UML System Models. IEEE Transactions on Software Engineering 36(3):338-356, 2009. BibTeX

    @article{GAB+09,
    	author = "G. Georg and K. Anastasakis and B. Bordbar and S. H. Houmb and I. Ray and M. Toahchoodee",
    	title = "Verification and Trade-off Analysis of Security Properties in UML System Models",
    	journal = "IEEE Transactions on Software Engineering",
    	year = 2009,
    	volume = 36,
    	pages = "338-356",
    	number = 3,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "US"
    }
    
  2. F Dang-Ngoc. CSXA: Sécurisation du Contrôle d'Accès pour les Documents XML. Revue Technique et Science Informatiques (TSI), 2009. numéro spécial des Prix de Thèse ASTI et SPECIF. BibTeX

    @article{Dang09,
    	author = "F. Dang-Ngoc",
    	title = "{CSXA}: S\'{e}curisation du Contr\^{o}le d'Acc\`{e}s pour les Documents {XML}",
    	journal = "Revue Technique et Science Informatiques (TSI)",
    	year = 2009,
    	note = "num\'{e}ro sp\'{e}cial des Prix de Th\`{e}se ASTI et SPECIF",
    	annote = "revnat",
    	x-editorial-board = "yes",
    	x-international-audience = "no"
    }
    
  3. T Allard, N Anciaux, L Bouganim, P Pucheral and R Thion. Seamless Access to Healthcare Folders with Strong Privacy Guarantees. International Journal of Healthcare Delivery Reform Initiatives 1(4):82-107, 2009. BibTeX

    @article{AAB+09b,
    	author = "T. Allard and N. Anciaux and L. Bouganim and P. Pucheral and R. Thion",
    	title = "Seamless Access to Healthcare Folders with Strong Privacy Guarantees",
    	journal = "International Journal of Healthcare Delivery Reform Initiatives",
    	year = 2009,
    	volume = 1,
    	pages = "82-107",
    	number = 4,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    
  1. L Bouganim, F Dang-Ngoc and P Pucheral. Dynamic Access-Control Policies on XML Encrypted Data. ACM Transactions on Information and System Security (ACM TISSEC) 10(4):1-37, 2008. BibTeX

    @article{BDPu08,
    	author = "L. Bouganim and F. Dang-Ngoc and P. Pucheral",
    	title = "Dynamic Access-Control Policies on {XML} Encrypted Data",
    	journal = "ACM Transactions on Information and System Security (ACM TISSEC)",
    	year = 2008,
    	volume = 10,
    	pages = "1-37",
    	number = 4,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    
  2. N Anciaux, L Bouganim, P Pucheral and P Valduriez. DiSC: Benchmarking Secure Chip DBMS. IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE) 20(10):1363-1377, 2008. BibTeX

    @article{ABPV08,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral and P. Valduriez",
    	title = "Di{SC}: Benchmarking Secure Chip {DBMS}",
    	journal = "IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE)",
    	year = 2008,
    	volume = 20,
    	pages = "1363-1377",
    	number = 10,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    
  3. N Anciaux, L Bouganim and P Pucheral. SGBD embarqué dans une puce : retour d'expérience. Revue Technique et Science Informatiques (TSI) 27(1), 2008. BibTeX

    @article{ABPu08b,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral",
    	title = "{SGBD} embarqu\'{e} dans une puce : retour d'exp\'{e}rience",
    	journal = "Revue Technique et Science Informatiques (TSI)",
    	year = 2008,
    	volume = 27,
    	number = 1,
    	annote = "revnat",
    	x-editorial-board = "yes",
    	x-international-audience = "no"
    }
    
  4. N Anciaux, M Berthelot, L Braconnier, L Bouganim, De M Blache, G Gardarin, P Kesmarszky, S Lartigue, J-F Navarre, P Pucheral, J-J Vandewalle and K Zeitouni. A Tamper-Resistant and Portable Healthcare Folder. International Journal of Telemedicine and Applications (IJTA) 2008, 2008. BibTeX

    @article{ABB+08b,
    	author = "N. Anciaux and M. Berthelot and L. Braconnier and L. Bouganim and M. {De la Blache} and G. Gardarin and P. Kesmarszky and S. Lartigue and J-F. Navarre and P. Pucheral and J-J. Vandewalle and K. Zeitouni",
    	title = "A Tamper-Resistant and Portable Healthcare Folder",
    	journal = "International Journal of Telemedicine and Applications (IJTA)",
    	year = 2008,
    	volume = 2008,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    

Book

  1. Jean-Pierre Archambault, Emmanuel Baccelli, Sylvie Boldo, Denis Bouhineau, Patrick Cégielski, Thomas Clausen, Gilles Dowek, Irène Guessarian, Stéphane Lopès, Laurent Mounier, Benjamin Nguyen, Franck Quessette, Anne Rasse, Brigitte Rozoy, Claude Timsit, Thierry Viéville and Jean-Marc Vincent. Une introduction à la science informatique: Pour les enseignants de la discipline informatique au lycée. CNDP-CRDP Eds., 2011. BibTeX

    @book{ABB+11,
    	title = "Une introduction à la science informatique: Pour les enseignants de la discipline informatique au lycée",
    	publisher = "{CNDP-CRDP} Eds.",
    	year = 2011,
    	author = "Jean-Pierre Archambault and Emmanuel Baccelli and Sylvie Boldo and Denis Bouhineau and Patrick Cégielski and Thomas Clausen and Gilles Dowek and Irène Guessarian and Stéphane Lopès and Laurent Mounier and Benjamin Nguyen and Franck Quessette and Anne Rasse and Brigitte Rozoy and Claude Timsit and Thierry Viéville and Jean-Marc Vincent",
    	annote = "livre",
    	isbn = "978-2-86631-188-9"
    }
    

Inbook

  1. Ivan Bedini, Benjamin Nguyen, Christopher Matheus, F Patel-Schneider Peter and Aidan Boran. Mining XML Schemas to Extract Conceptual Knowledge. pages 79-105, IGI Global, 2012.
    Abstract One of the promises of the Semantic Web is to support applications that easily and seamlessly deal with heterogeneous data. Most data in the Web, however, is in the Extensible Markup Language (XML) format, but using XML requires applications to understand the format of each data source that they access. Achieving the benefits of the Semantic Web involves transforming XML into the Semantic Web languages, OWL (the Web Ontology Language) and RDF (the Resource Description Framework), a process that generally has manual or only semi-automatic components. In this chapter, the authors present a set of patterns that enable the automatic transformation from XML Schema into RDF and OWL, enabling the direct use of much XML data in the Semantic Web. They focus on a possible logical representation of the first language and present an implementation, including a comparison with related works. URL BibTeX

    @inbook{BNM+12,
    	pages = "79-105",
    	title = "{Mining XML Schemas to Extract Conceptual Knowledge}",
    	publisher = "IGI Global",
    	year = 2012,
    	author = "Bedini, Ivan and Nguyen, Benjamin and Matheus, Christopher and Patel-Schneider, Peter, F. and Boran, Aidan",
    	abstract = "{One of the promises of the Semantic Web is to support applications that easily and seamlessly deal with heterogeneous data. Most data in the Web, however, is in the Extensible Markup Language (XML) format, but using XML requires applications to understand the format of each data source that they access. Achieving the benefits of the Semantic Web involves transforming XML into the Semantic Web languages, OWL (the Web Ontology Language) and RDF (the Resource Description Framework), a process that generally has manual or only semi-automatic components. In this chapter, the authors present a set of patterns that enable the automatic transformation from XML Schema into RDF and OWL, enabling the direct use of much XML data in the Semantic Web. They focus on a possible logical representation of the first language and present an implementation, including a comparison with related works.}",
    	affiliation = "Alcatel Lucent Bell Labs , Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "chapitre",
    	audience = "internationale",
    	booktitle = "{Semi-Automatic Ontology Development: Processes and Resources}",
    	hal_id = "hal-00768346",
    	isbn = 9781466601888,
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768346"
    }
    
  1. Ivan Bedini, Georges Gardarin and Benjamin Nguyen. Semantic technologies and e-business. pages 243-278, IGI Global Publishing, 2011. URL BibTeX

    @inbook{BGNg11,
    	pages = "243-278",
    	title = "{Semantic technologies and e-business}",
    	publisher = "IGI Global Publishing",
    	year = 2011,
    	author = "Bedini, Ivan and Gardarin, Georges and Nguyen, Benjamin",
    	annote = "chapitre",
    	booktitle = "{Electronic Business Interoperability : Concepts, Opportunities and Challenges}",
    	url = "http://hal.inria.fr/hal-00623913/en",
    	x-id-hal = "hal-00623913",
    	x-international-audience = "yes/no"
    }
    
  1. T Allard, N Anciaux, L Bouganim, P Pucheral and R Thion. Concilier sécurité et ubiquité des données médicales. Volume 32, chapter Les technologies de l'information au service des droits : opportunités, défis, limites, Cahiers du CRID, Editions Bruylant, 2010. BibTeX

    @inbook{AAB+10b,
    	chapter = "Les technologies de l'information au service des droits : opportunités, défis, limites",
    	title = "Concilier sécurité et ubiquité des données médicales",
    	publisher = "Cahiers du CRID, Editions Bruylant",
    	year = 2010,
    	author = "T. Allard and N. Anciaux and L. Bouganim and P. Pucheral and R. Thion",
    	volume = 32,
    	annote = "chapitre",
    	x-editorial-board = "yes",
    	x-international-audience = "no"
    }
    
  2. T Allard, N Anciaux, L Bouganim, P Pucheral and R Thion. Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools. Chapter Trustworthiness of Pervasive Healthcare Folders, pages 1-24, IGI Global, 2010. BibTeX

    @inbook{AAB+10a,
    	chapter = "Trustworthiness of Pervasive Healthcare Folders",
    	pages = "1-24",
    	title = "Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools",
    	publisher = "IGI Global",
    	year = 2010,
    	author = "T. Allard and N. Anciaux and L. Bouganim and P. Pucheral and R. Thion",
    	annote = "chapitre",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    
  1. L Bouganim and Y Guo. Encyclopedia of Cryptography and Security. Chapter Database Encryption, Springer, 2009. BibTeX

    @inbook{BoGu09,
    	chapter = "Database Encryption",
    	title = "Encyclopedia of Cryptography and Security",
    	publisher = "Springer",
    	year = 2009,
    	author = "L. Bouganim and Y. Guo",
    	annote = "chapitre"
    }
    
  2. N Anciaux, L Bouganim and P Pucheral. Handbook of research on Secure Multimedia Distribution. Chapter A Hardware Approach for Trusted Access and Usage Control, IGI Global, 2009. BibTeX

    @inbook{ABPu09,
    	chapter = "A Hardware Approach for Trusted Access and Usage Control",
    	title = "Handbook of research on Secure Multimedia Distribution",
    	publisher = "IGI Global",
    	year = 2009,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral",
    	annote = "chapitre"
    }
    

Inproceedings

  1. Quoc-Cuong To, Benjamin Nguyen and Philippe Pucheral. Privacy-Preserving SQL Query Execution on Distributed Data (demonstration). In 4$^e$ Atelier sur la Protection de la Vie Privée (APVP). 2013. BibTeX

    @inproceedings{TNPu13b,
    	author = "Quoc-Cuong To and Benjamin Nguyen and Philippe Pucheral",
    	title = "{Privacy-Preserving SQL Query Execution on Distributed Data (demonstration)}",
    	booktitle = "4$^e$ Atelier sur la Protection de la Vie Priv\'ee (APVP)",
    	year = 2013,
    	annote = "confnat"
    }
    
  2. Quoc-Cuong To, Benjamin Nguyen and Philippe Pucheral. Privacy-Preserving SQL Query Execution on Distributed Data. In Bases de Données Avancées. 2013. BibTeX

    @inproceedings{TNPu13a,
    	author = "Quoc-Cuong To and Benjamin Nguyen and Philippe Pucheral",
    	title = "{Privacy-Preserving SQL Query Execution on Distributed Data}",
    	booktitle = "Bases de Donn\'ees Avanc\'ees",
    	year = 2013,
    	annote = "confnat"
    }
    
  3. B Dayan, M K Svendsen, M Bjorling, P Bonnet and L Bouganim. EagleTree: Exploring the Design Space of SSD-Based Algorithms . In VLDB (Demo). 2013. BibTeX

    @inproceedings{DSB+13,
    	author = "B. Dayan and M.K. Svendsen and M. Bjorling and P. Bonnet and L. Bouganim",
    	title = "{EagleTree: Exploring the Design Space of SSD-Based Algorithms }",
    	booktitle = "VLDB (Demo)",
    	year = 2013,
    	annote = "confint"
    }
    
  4. Mathias Bjorling, Philippe Bonnet, Luc Bouganim and Niv Dayan. The Necessary Death of the Block Device Interface. In 6th Biennal Conference on Innovative Database Research (CIDR). 2013. BibTeX

    @inproceedings{BBBD13,
    	author = "Bjorling, Mathias and Bonnet, Philippe and Bouganim, Luc and Dayan, Niv",
    	title = "{The Necessary Death of the Block Device Interface}",
    	booktitle = "{6th Biennal Conference on Innovative Database Research (CIDR)}",
    	year = 2013,
    	annote = "confint"
    }
    
  5. Nicolas Anciaux, Benjamin Nguyen and Iulia Sandu-Popa. Personal Data Management with Secure Hardware : The advantage of Keeping you Data at Hand. In Advanced Seminar at the 14th International Conference on Mobile Data Management (MDM). 2013. BibTeX

    @inproceedings{ANSa13,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Sandu-Popa, Iulia",
    	title = "{Personal Data Management with Secure Hardware : The advantage of Keeping you Data at Hand}",
    	booktitle = "{Advanced Seminar at the 14th International Conference on Mobile Data Management (MDM)}",
    	year = 2013,
    	annote = "confint"
    }
    
  6. Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Philippe Pucheral and Iulian Sandu-Popa. Trusted Cells : A Sea Change for Personnal Data Services. In 6th Biennal Conference on Innovative Database Research (CIDR). 2013. BibTeX

    @inproceedings{ABB+13,
    	author = "Anciaux, Nicolas and Bonnet, Philippe and Bouganim, Luc and Nguyen, Benjamin and Pucheral, Philippe and Sandu-Popa, Iulian",
    	title = "{Trusted Cells : A Sea Change for Personnal Data Services}",
    	booktitle = "{6th Biennal Conference on Innovative Database Research (CIDR)}",
    	year = "{2013}",
    	annote = "confint"
    }
    
  7. Nicolas Anciaux, Wallid Bezza, Benjamin Nguyen and Michalis Vazirgiannis. MinExp-Card: Limiting Data Collection Using a Smart Card. In 16th International Conference on Extending Database Technology (EDBT). 2013, 753-756. BibTeX

    @inproceedings{ABNV13a,
    	author = "Anciaux, Nicolas and Bezza, Wallid and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{MinExp-Card: Limiting Data Collection Using a Smart Card}",
    	booktitle = "{16th International Conference on Extending Database Technology (EDBT)}",
    	year = "{2013}",
    	pages = "{753-756}",
    	annote = "confint"
    }
    
  1. Cuong Quoc To, Benjamin Nguyen and Philippe Pucheral. Secure global protocol for computing aggregate functions. In First AVSE Doctoral Workshop. 2012, 29.
    Abstract Storing personal data in a remote database in outsourcing company often re-quires clients to inherently trust the provider with full access to the outsourced datasets. But placing sensitive data under the control of a third-party provider without guarantees of privacy and confidentiality can be a big problem because data can be easily leaked. Although recent researches have addressed this security aspect by using encryption, no state-of-the-art solves this problem completely. This work draws a radically different vision of the database outsourcing by using new hardware devices called Secure Portable Tokens (SPT for short). SPTs combine tamper resistant smart card microcontrollers with large storage capacity NAND Flash chips. This token aims at helping every individual to better protect her privacy. We propose a protocol composed of low cost secure tokens and a powerful but untrusted supporting server (SS), called asymmetric architecture. This protocol, with personal data scattered in distributed tokens, aims at answering any general query in an interactive setting. The objective is to provide the exact results for general query with acceptable performance to partly trusted queriers who can only obtain some authorized views of the dataset but not the raw data stored in PDSs. URL BibTeX

    @inproceedings{TNPu12,
    	author = "To, Cuong Quoc and Nguyen, Benjamin and Pucheral, Philippe",
    	title = "{Secure global protocol for computing aggregate functions}",
    	booktitle = "{First AVSE Doctoral Workshop}",
    	year = 2012,
    	pages = 29,
    	address = "Cachan, France",
    	abstract = "{Storing personal data in a remote database in outsourcing company often re-quires clients to inherently trust the provider with full access to the outsourced datasets. But placing sensitive data under the control of a third-party provider without guarantees of privacy and confidentiality can be a big problem because data can be easily leaked. Although recent researches have addressed this security aspect by using encryption, no state-of-the-art solves this problem completely. This work draws a radically different vision of the database outsourcing by using new hardware devices called Secure Portable Tokens (SPT for short). SPTs combine tamper resistant smart card microcontrollers with large storage capacity NAND Flash chips. This token aims at helping every individual to better protect her privacy. We propose a protocol composed of low cost secure tokens and a powerful but untrusted supporting server (SS), called asymmetric architecture. This protocol, with personal data scattered in distributed tokens, aims at answering any general query in an interactive setting. The objective is to provide the exact results for general query with acceptable performance to partly trusted queriers who can only obtain some authorized views of the dataset but not the raw data stored in PDSs.}",
    	affiliation = "SMIS - INRIA Rocquencourt , Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM",
    	annote = "confnat",
    	audience = "internationale",
    	hal_id = "hal-00768378",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768378"
    }
    
  2. Iulian Sandu-Popa and Karine Zeitouni. Modeling and Querying Mobile Location Sensor Data. In The Fourth International Conference on Advanced Geographic Information Systems, Applications, and Services (GEOProcessing). 2012, 18pp.
    Abstract A lot of work in moving object databases area dealt with modeling, querying and indexing. However, a moving object - such as a vehicle - could be equipped with sensors that report some measures related to its state or to its environment. Managing such data is of major interest for some applications such as analyzing driving behavior in road safety, or analyzing pollution by mean of mobile (vehicles or persons) probes. However, existing approaches manage only the location. In this paper, we propose a new data model and a language that handle mobile location sensor data. At this end, we introduce the concept of measure profile to capture the measure variability in space, along with specific operations that permit to analyze the data. We also describe their implementation within an object-relational DBMS. URL BibTeX

    @inproceedings{SaZe12,
    	author = "Sandu-Popa, Iulian and Zeitouni, Karine",
    	title = "{Modeling and Querying Mobile Location Sensor Data}",
    	booktitle = "{The Fourth International Conference on Advanced Geographic Information Systems, Applications, and Services (GEOProcessing)}",
    	year = 2012,
    	pages = "18pp",
    	address = "Espagne",
    	abstract = "{A lot of work in moving object databases area dealt with modeling, querying and indexing. However, a moving object - such as a vehicle - could be equipped with sensors that report some measures related to its state or to its environment. Managing such data is of major interest for some applications such as analyzing driving behavior in road safety, or analyzing pollution by mean of mobile (vehicles or persons) probes. However, existing approaches manage only the location. In this paper, we propose a new data model and a language that handle mobile location sensor data. At this end, we introduce the concept of measure profile to capture the measure variability in space, along with specific operations that permit to analyze the data. We also describe their implementation within an object-relational DBMS.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "confint",
    	audience = "internationale",
    	hal_id = "hal-00768335",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768335"
    }
    
  3. Susan Juan Pan, M Khan, Iulian Sandu-Popa, Karine Zeitouni and C Borcea. Proactive vehicle re-routing strategies for congestion avoidance. In 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). 2012, 265-272.
    Abstract Traffic congestion causes driver frustration and costs billions of dollars annually in lost time and fuel consumption. This paper presents three traffic re-routing strategies designed to be incorporated in a cost-effective and easily deployable vehicular traffic guidance system that reduces the effect of traffic congestions. This system collects real-time traffic data from vehicles and road-side sensors and computes proactive, individually-tailored re-routing guidance which is pushed to vehicles when signs of congestion are observed on their route. Extensive simulation results over two urban road networks show that all three strategies, namely multipath load balancing considering future vehicle positions (EBkSP), random multipath load balancing (RkSP), and dynamic shortest path (DSP), significantly decrease the average travel time. EBkSP is the best, with as much as 104% improvement compared to the "no re-routing" baseline. Additionally, it lowers with 34% the re-routing frequency compared to the other strategies. Finally, all strategies offer good improvements even when many drivers ignore the guidance or when the system adoption rate is relatively low. URL BibTeX

    @inproceedings{PKS+12,
    	author = "Pan, Susan Juan and Khan, M. and Sandu-Popa, Iulian and Zeitouni, Karine and Borcea, C.",
    	title = "{Proactive vehicle re-routing strategies for congestion avoidance}",
    	booktitle = "{8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)}",
    	year = 2012,
    	pages = "265-272",
    	address = "Chine",
    	abstract = {{Traffic congestion causes driver frustration and costs billions of dollars annually in lost time and fuel consumption. This paper presents three traffic re-routing strategies designed to be incorporated in a cost-effective and easily deployable vehicular traffic guidance system that reduces the effect of traffic congestions. This system collects real-time traffic data from vehicles and road-side sensors and computes proactive, individually-tailored re-routing guidance which is pushed to vehicles when signs of congestion are observed on their route. Extensive simulation results over two urban road networks show that all three strategies, namely multipath load balancing considering future vehicle positions (EBkSP), random multipath load balancing (RkSP), and dynamic shortest path (DSP), significantly decrease the average travel time. EBkSP is the best, with as much as 104\% improvement compared to the "no re-routing" baseline. Additionally, it lowers with 34\% the re-routing frequency compared to the other strategies. Finally, all strategies offer good improvements even when many drivers ignore the guidance or when the system adoption rate is relatively low.}},
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "confint",
    	audience = "internationale",
    	hal_id = "hal-00768334",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768334"
    }
    
  4. Philippe Bonnet and Luc Bouganim. Flash Device Support for Database Management. In {28èmes journées Bases de Données Avancées (BDA)}. 2012. URL BibTeX

    @inproceedings{BoBo12,
    	author = "Bonnet, Philippe and Bouganim, Luc",
    	title = "{Flash Device Support for Database Management}",
    	booktitle = "{28{\`e}mes journ{\'e}es Bases de Donn{\'e}es Avanc{\'e}es (BDA)}",
    	year = 2012,
    	address = "Clermont-Ferrand, France",
    	affiliation = "IT University of Copenhagen - IT , Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "confnat",
    	audience = "non sp{\'e}cifi{\'e}e",
    	hal_id = "hal-00768387",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768387"
    }
    
  5. Jean-Pierre Archambault, Laurent Bloch, Laurent Chéno and Benjamin Nguyen. Logiciels libres, culture et enseignement de l'informatique. In 5th Open World Forum (OWF). 2012. URL BibTeX

    @inproceedings{ABCN12,
    	author = "Archambault, Jean-Pierre and Bloch, Laurent and Ch{\'e}no, Laurent and Nguyen, Benjamin",
    	title = "{Logiciels libres, culture et enseignement de l'informatique}",
    	booktitle = "{5th Open World Forum (OWF)}",
    	year = 2012,
    	address = "France",
    	affiliation = "Association Enseignement Public et Informatique - EPI , Universit{\'e} Paris 9, Dauphine - UP9 , Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "confinv",
    	audience = "internationale",
    	hal_id = "hal-00768374",
    	language = "Fran{\c c}ais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768374"
    }
    
  6. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. Limiting Data Collection in Application Forms. In {Atelier Protection de la Vie Privée (APVP)}. 2012. URL BibTeX

    @inproceedings{ANVa12e,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Limiting Data Collection in Application Forms}",
    	booktitle = "{Atelier Protection de la Vie Priv{\'e}e (APVP)}",
    	year = 2012,
    	address = "Groix, France",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt , Athens University of Economics and Business - AUEB , Laboratoire d'informatique de l'{\'e}cole polytechnique - LIX",
    	annote = "confnat",
    	audience = "nationale",
    	collaboration = "AE INRIA CAPPRIS",
    	hal_id = "hal-00768365",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768365"
    }
    
  7. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. {Cas d'usage d'un principe fondamental de protection de la vie privée}. In {Bases de Données Avancées (BDA)}. 2012. URL BibTeX

    @inproceedings{ANVa12d,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Cas d'usage d'un principe fondamental de protection de la vie priv{\'e}e}",
    	booktitle = "{Bases de Donn{\'e}es Avanc{\'e}es (BDA)}",
    	year = 2012,
    	address = "Clermont-Ferrand, France",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt , Athens University of Economics and Business - AUEB , Laboratoire d'informatique de l'{\'e}cole polytechnique - LIX",
    	annote = "confnat",
    	audience = "non sp{\'e}cifi{\'e}e",
    	collaboration = "AE INRIA CAPPRIS",
    	hal_id = "hal-00768367",
    	language = "Fran{\c c}ais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768367"
    }
    
  8. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. Limiting Data Collection in Application Forms : A real-case application of a Founding Privacy Principle. In PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). 2012, 59-66.
    Abstract Application forms are often used by companies and administrations to collect personal data about applicants and tailor services to their specific situation. For example, taxes rates, social care, or personal loans, are usually calibrated based on a set of personal data collected through application forms. In the eyes of privacy laws and directives, the set of personal data collected to achieve a service must be restricted to the minimum necessary. This reduces the impact of data breaches both in the interest of service providers and applicants. In this article, we study the problem of limiting data collection in those application forms, used to collect data and subsequently feed decision making processes. In practice, the set of data collected is far excessive because application forms are filled in without any means to know what data will really impact the decision. To overcome this problem, we propose a reverse approach, where the set of strictly required data items to fill in the application form can be computed on the user's side. We formalize the underlying NP Hard optimization problem, propose algorithms to compute a solution, and validate them with experiments. Our proposal leads to a significant reduction of the quantity of personal data filled in application forms while still reaching the same decision. URL, DOI BibTeX

    @inproceedings{ANVa12c,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Limiting Data Collection in Application Forms : A real-case application of a Founding Privacy Principle}",
    	booktitle = "{PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)}",
    	year = 2012,
    	pages = "59-66",
    	address = "France",
    	abstract = "{Application forms are often used by companies and administrations to collect personal data about applicants and tailor services to their specific situation. For example, taxes rates, social care, or personal loans, are usually calibrated based on a set of personal data collected through application forms. In the eyes of privacy laws and directives, the set of personal data collected to achieve a service must be restricted to the minimum necessary. This reduces the impact of data breaches both in the interest of service providers and applicants. In this article, we study the problem of limiting data collection in those application forms, used to collect data and subsequently feed decision making processes. In practice, the set of data collected is far excessive because application forms are filled in without any means to know what data will really impact the decision. To overcome this problem, we propose a reverse approach, where the set of strictly required data items to fill in the application form can be computed on the user's side. We formalize the underlying NP Hard optimization problem, propose algorithms to compute a solution, and validate them with experiments. Our proposal leads to a significant reduction of the quantity of personal data filled in application forms while still reaching the same decision.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt , Laboratoire d'informatique de l'{\'e}cole polytechnique - LIX , Athens University of Economics and Business - AUEB",
    	annote = "confint",
    	audience = "internationale",
    	collaboration = "AE INRIA CAPPRIS",
    	doi = "10.1109/PST.2012.6297920",
    	hal_id = "hal-00768363",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768363"
    }
    
  9. Nicolas Anciaux, Benjamin Nguyen and Michalis Vazirgiannis. Limiting Data Collection in Application Forms: A real-case Application of a Founding Privacy Principle. In PST 2012, Tenth Annual Conference on Privacy, Security and Trust. 2012, 59-66. BibTeX

    @inproceedings{ANVa12b,
    	author = "Anciaux, Nicolas and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Limiting Data Collection in Application Forms: A real-case Application of a Founding Privacy Principle}",
    	booktitle = "{PST 2012, Tenth Annual Conference on Privacy, Security and Trust}",
    	year = "{2012}",
    	pages = "{59-66}",
    	annote = "confint",
    	owner = "MOIS",
    	timestamp = "2012.10.31"
    }
    
  10. Nicolas Anciaux, Danae Boutara, Benjamin Nguyen and Michalis Vazirgiannis. Limiting Data Exposure in Multi-Label Classification Processes. In International Workshop on Privacy-AwaRe Intelligent Systems (PARIS2012). 2012.
    Abstract Administrative services such social care, tax reduction, and many others using complex decision processes, request individuals to provide large amounts of private data items, in order to calibrate their proposal to the specific situation of the applicant. This data is subsequently processed and stored by the organization. However, all the requested information is not needed to reach the same decision. We have recently proposed an approach, termed Minimum Exposure, to reduce the quantity of information provided by the users, in order to protect her privacy, reduce processing costs for the organization, and financial lost in the case of a data breach. In this paper, we address the case of decision making processes based on sets of classifiers, typically multi-label classifiers. We propose a practical implementation using state of the art multi-label classifiers, and analyze the effectiveness of our solution on several real multi-label data sets. URL BibTeX

    @inproceedings{ABNV12,
    	author = "Anciaux, Nicolas and Boutara, Danae and Nguyen, Benjamin and Vazirgiannis, Michalis",
    	title = "{Limiting Data Exposure in Multi-Label Classification Processes}",
    	booktitle = "{International Workshop on Privacy-AwaRe Intelligent Systems (PARIS2012)}",
    	year = 2012,
    	address = "Macao",
    	abstract = "{Administrative services such social care, tax reduction, and many others using complex decision processes, request individuals to provide large amounts of private data items, in order to calibrate their proposal to the specific situation of the applicant. This data is subsequently processed and stored by the organization. However, all the requested information is not needed to reach the same decision. We have recently proposed an approach, termed Minimum Exposure, to reduce the quantity of information provided by the users, in order to protect her privacy, reduce processing costs for the organization, and financial lost in the case of a data breach. In this paper, we address the case of decision making processes based on sets of classifiers, typically multi-label classifiers. We propose a practical implementation using state of the art multi-label classifiers, and analyze the effectiveness of our solution on several real multi-label data sets.}",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt , Athens University of Economics and Business - AUEB , Laboratoire d'informatique de l'{\'e}cole polytechnique - LIX",
    	annote = "confint",
    	audience = "internationale",
    	collaboration = "AE INRIA CAPPRIS",
    	hal_id = "hal-00768373",
    	language = "Anglais",
    	url = "http://hal.archives-ouvertes.fr/hal-00768373"
    }
    
  1. L Bouganim. Serveurs portables et sécurisés de données personnelles : Application aux données médicales. In $18^emes$ journées de la SFIM@R. 2011. BibTeX

    @inproceedings{Bouga11a,
    	author = "Bouganim, L.",
    	title = "Serveurs portables et sécurisés de données personnelles : Application aux données médicales",
    	booktitle = "$18^{emes}$ journées de la SFIM@R",
    	year = 2011,
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "no"
    }
    
  2. P Bonnet, L Bouganim, I Koltsidas and S D Viglas. System Co-Design and Data Management for Flash Devices. In Very Large Data Bases Tutorial. 2011. BibTeX

    @inproceedings{BBKV11,
    	author = "Bonnet, P. and Bouganim, L. and Koltsidas, I. and Viglas, S.D.",
    	title = "{System Co-Design and Data Management for Flash Devices}",
    	booktitle = "Very Large Data Bases Tutorial",
    	year = 2011,
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  3. P Bonnet and L Bouganim. Flash Device Support for Database Management. In 5th Biennial Conference on Innovative Data Systems Research (CIDR). 2011. BibTeX

    @inproceedings{BoBo11,
    	author = "P. Bonnet and L. Bouganim",
    	title = "Flash Device Support for Database Management",
    	booktitle = "5th Biennial Conference on Innovative Data Systems Research (CIDR)",
    	year = 2011,
    	address = "Asilomar, California, USA",
    	annote = "confint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "DK",
    	x-proceedings = "yes"
    }
    
  4. Ivan Bedini, Christopher Matheus, Peter Patel-Schneider F., Aidan Boran and Benjamin Nguyen. Transforming XML schema to OWL using patterns. In ICSC 2011 - 5th IEEE International Conference on Semantic Computing. 2011, 1-8. URL BibTeX

    @inproceedings{BMP+11,
    	author = "Bedini, Ivan and Matheus, Christopher and Patel-Schneider, F., Peter and Boran, Aidan and Nguyen, Benjamin",
    	title = "{Transforming XML schema to OWL using patterns}",
    	booktitle = "{ICSC 2011 - 5th IEEE International Conference on Semantic Computing}",
    	year = 2011,
    	pages = "1-8",
    	address = "Palo Alto, United States",
    	annote = "confint",
    	url = "http://hal.inria.fr/hal-00624055/en",
    	x-id-hal = "hal-00624055",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  5. Tristan Allard, Benjamin Nguyen and Philippe Pucheral. Sanitizing Microdata Without Leak: Combining Preventive and Curative Actions. In ISPEC 2011 - Information Security Practice and Experience Conference. 2011, 333-342. 10 pages. URL BibTeX

    @inproceedings{ANPu11c,
    	author = "Allard, Tristan and Nguyen, Benjamin and Pucheral, Philippe",
    	title = "{Sanitizing Microdata Without Leak: Combining Preventive and Curative Actions}",
    	booktitle = "{ISPEC 2011 - Information Security Practice and Experience Conference}",
    	year = 2011,
    	pages = "333-342",
    	address = "Gangzhou, China",
    	note = "10 pages",
    	annote = "confint",
    	url = "http://hal.inria.fr/hal-00624047/en",
    	x-id-hal = "hal-00624047",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  6. Tristan Allard, Benjamin Nguyen and Philippe Pucheral. Safe Realization of the Generalization Privacy Mechanism. In Privacy, Security and Trust. 2011, 1-8. Best Paper Award. URL BibTeX

    @inproceedings{ANPu11b,
    	author = "Allard, Tristan and Nguyen, Benjamin and Pucheral, Philippe",
    	title = "{Safe Realization of the Generalization Privacy Mechanism}",
    	booktitle = "{Privacy, Security and Trust}",
    	year = 2011,
    	pages = "1-8",
    	address = "Montreal, Canada",
    	note = "Best Paper Award",
    	annote = "confint",
    	url = "http://hal.inria.fr/hal-00624043/en",
    	x-id-hal = "hal-00624043",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  7. T Allard, B Nguyen and P Pucheral. Towards a Safe Realization of Privacy-Preserving Data Publishing Mechanisms. In Ph. D. colloquium of the $12^th$ IEEE International Conference on Mobile Data Management (MDM). 2011, 1–4. BibTeX

    @inproceedings{ANPu11a,
    	author = "Allard, T. and Nguyen, B. and Pucheral, P.",
    	title = "{Towards a Safe Realization of Privacy-Preserving Data Publishing Mechanisms}",
    	booktitle = "Ph. D. colloquium of the $12^{th}$ IEEE International Conference on Mobile Data Management (MDM)",
    	year = 2011,
    	pages = "1--4",
    	address = "Lule\aa, Sweden",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  1. M Bjørling, Le L Folgoc, A Mseddi, P Bonnet, L Bouganim and B Jónsson. Performing Sound Flash Device Measurements: The uFLIP Experience. In 26èmes journées Bases de Données Avancées (BDA). 2010. Demo paper. BibTeX

    @inproceedings{BLM+10b,
    	author = "M. Bjørling and L. Le Folgoc and A. Mseddi and P. Bonnet and L. Bouganim and B. Jónsson",
    	title = "Performing Sound Flash Device Measurements: The uFLIP Experience",
    	booktitle = "26\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2010,
    	address = "Toulouse",
    	note = "Demo paper",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-pays = "DK,IS",
    	x-proceedings = "yes"
    }
    
  2. M Bjørling, Le L Folgoc, A Mseddi, P Bonnet, L Bouganim and B Jónsson. Performing Sound Flash Device Measurements: The uFLIP Experience. In 29th ACM International Conference on Management of Data (SIGMOD). 2010. Demo paper. BibTeX

    @inproceedings{BLM+10a,
    	author = "M. Bjørling and L. Le Folgoc and A. Mseddi and P. Bonnet and L. Bouganim and B. Jónsson",
    	title = "Performing Sound Flash Device Measurements: The uFLIP Experience",
    	booktitle = "29th ACM International Conference on Management of Data (SIGMOD)",
    	year = 2010,
    	note = "Demo paper",
    	annote = "confint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  3. N Anciaux, L Bouganim, Y Guo, P Pucheral, J -J Vandewalle and S Yin. Pluggable Personal Data Servers. In 26èmes journées Bases de Données Avancées (BDA). 2010. Demo paper. BibTeX

    @inproceedings{ABG+10b,
    	author = "N. Anciaux and L. Bouganim and Y. Guo and P. Pucheral and J.-J. Vandewalle and S. Yin",
    	title = "Pluggable Personal Data Servers",
    	booktitle = "26\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2010,
    	address = "Toulouse",
    	note = "Demo paper",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "yes"
    }
    
  4. N Anciaux, L Bouganim, Y Guo, P Pucheral, J -J Vandewalle and S Yin. Pluggable Personal Data Servers. In 29th ACM International Conference on Management of Data (SIGMOD). 2010. Demo paper. BibTeX

    @inproceedings{ABG+10a,
    	author = "N. Anciaux and L. Bouganim and Y. Guo and P. Pucheral and J.-J. Vandewalle and S. Yin",
    	title = "Pluggable Personal Data Servers",
    	booktitle = "29th ACM International Conference on Management of Data (SIGMOD)",
    	year = 2010,
    	note = "Demo paper",
    	annote = "confint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  5. T Allard, B Nguyen and P Pucheral. Safe Anonymization of Data Hosted in Smart Tokens. In 26èmes journées Bases de Données Avancées (BDA). 2010. BibTeX

    @inproceedings{ANPu10,
    	author = "T. Allard and B. Nguyen and P. Pucheral",
    	title = "Safe Anonymization of Data Hosted in Smart Tokens",
    	booktitle = "26\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2010,
    	address = "Toulouse",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "yes"
    }
    
  6. T Allard, N Anciaux, L Bouganim, Y Guo, Le L Folgoc, B Nguyen, P Pucheral, I Ray, I Ray and S Yin. Serveurs Personnels Sécurisés de Données. In 26èmes journées Bases de Données Avancées (BDA). 2010. BibTeX

    @inproceedings{AAB+10d,
    	author = "T. Allard and N. Anciaux and L. Bouganim and Y. Guo and L. Le Folgoc and B. Nguyen and P. Pucheral and I. Ray and I. Ray and S. Yin",
    	title = "Serveurs Personnels Sécurisés de Données",
    	booktitle = "26\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2010,
    	address = "Toulouse",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "yes"
    }
    
  7. T Allard, N Anciaux, L Bouganim, Y Guo, Le L Folgoc, B Nguyen, P Pucheral, I Ray, I Ray and S Yin. Secure Personal Data Servers: a Vision Paper. In Proc. of the 36th Int. Conf. on Very Large Databases (VLDB). 2010. BibTeX

    @inproceedings{AAB+10c,
    	author = "T. Allard and N. Anciaux and L. Bouganim and Y. Guo and L. Le Folgoc and B. Nguyen and P. Pucheral and I. Ray and I. Ray and S. Yin",
    	title = "Secure Personal Data Servers: a Vision Paper",
    	booktitle = "Proc. of the 36th Int. Conf. on Very Large Databases (VLDB)",
    	year = 2010,
    	annote = "confint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  1. M Toahchoodee, X Xie and I Ray. Towards Trustworthy Delegation in Role-Based Access Control Model. In Proceedings of the 12th International Information Security Conference (ISC). 2009. BibTeX

    @inproceedings{TXRa09,
    	author = "M. Toahchoodee and X. Xie and I. Ray",
    	title = "Towards Trustworthy Delegation in Role-Based Access Control Model",
    	booktitle = "Proceedings of the 12th International Information Security Conference (ISC)",
    	year = 2009,
    	address = "Pisa, Italy",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  2. Y Guo and S Jacob. Confidentialité et intégrité des grandes bases de données. In Journées Codage et Cryptographie. 2009. BibTeX

    @inproceedings{GuJa09,
    	author = "Y. Guo and S. Jacob",
    	title = "Confidentialité et intégrité des grandes bases de données",
    	booktitle = "Journ\'{e}es Codage et Cryptographie",
    	year = 2009,
    	address = "Fr\'{e}jus",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "no"
    }
    
  3. R Dewri, I Ray, I Ray and D Whitley. POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009). 2009. BibTeX

    @inproceedings{DRRW09,
    	author = "R. Dewri and I. Ray and I. Ray and D. Whitley",
    	title = "POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice",
    	booktitle = "Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009)",
    	year = 2009,
    	address = "Hong Kong, China",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  4. L Bouganim, B Jónsson and P Bonnet. uFLIP: Un banc d'essai pour l'étude des performances de composants Flash. In 25èmes journées Bases de Données Avancées (BDA). 2009. BibTeX

    @inproceedings{BJBo09,
    	author = "L. Bouganim and B. J\'{o}nsson and P. Bonnet",
    	title = "uFLIP: Un banc d'essai pour l'étude des performances de composants Flash",
    	booktitle = "25\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2009,
    	address = "Namur, Belgium",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-pays = "DK,IS",
    	x-proceedings = "yes"
    }
    
  5. N Anciaux and J -J Vandewalle. Demonstration of electronic Health Records (eHR) on Java Card${^TM}$ 3.0 Technology.. In BOF-4576, CS Advanced Based Devices, JavaOne Conference. 2009. BibTeX

    @inproceedings{AnVa09,
    	author = "N. Anciaux and J.-J. Vandewalle",
    	title = "Demonstration of electronic Health Records (eHR) on Java Card${^{TM}}$ 3.0 Technology.",
    	booktitle = "BOF-4576, CS Advanced Based Devices, JavaOne Conference",
    	year = 2009,
    	annote = "confint"
    }
    
  1. S Yin, P Pucheral and X Meng. PBFilter: Indexer les données résidant en Flash par résumés partitionnés. In 24èmes journées Bases de Données Avancées (BDA). 2008. BibTeX

    @inproceedings{YPMe08b,
    	author = "S. Yin and P. Pucheral and X. Meng",
    	title = "{PBF}ilter: Indexer les donn\'{e}es r\'{e}sidant en Flash par r\'{e}sum\'{e}s partitionn\'{e}s",
    	booktitle = "24\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2008,
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "yes"
    }
    
  2. S Yin, P Pucheral and X Meng. PBFilter: Indexing Flash-Resident Data through Partitioned Summaries. In Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM). 2008. BibTeX

    @inproceedings{YPMe08a,
    	author = "S. Yin and P. Pucheral and X. Meng",
    	title = "{PBF}ilter: Indexing Flash-Resident Data through Partitioned Summaries",
    	booktitle = "Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM)",
    	year = 2008,
    	address = "Napa Valley, USA",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  3. P Serdyukov, L Feng, A H Bunningen., S Evers, H Heerde, P M G Apers, M M Fokkinga and D.Hiemstra. The right expert at the right time and place: From expertise identification to expertise selection. In Proc. of the 7th International Conference on Practical Aspects of Knowledge Management (PAKM). 2008. BibTeX

    @inproceedings{SFB+08,
    	author = "P. Serdyukov and L. Feng and A.H. van Bunningen. and S. Evers and H. van Heerde and P. M. G. Apers and M.M. Fokkinga and D.Hiemstra",
    	title = "The right expert at the right time and place: From expertise identification to expertise selection",
    	booktitle = "Proc. of the 7th International Conference on Practical Aspects of Knowledge Management (PAKM)",
    	year = 2008,
    	address = "Yokohama, Japan",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  4. M Berthelot, P Kesmarszky, P Pucheral, J-J Vandewalle and K Zeitouni. Patient Medical Records in Secure Portable Tokens. In Proc. of the 9th International e-smart Conference. 2008. BibTeX

    @inproceedings{BKP+08,
    	author = "M. Berthelot and P. Kesmarszky and P. Pucheral and J-J. Vandewalle and K. Zeitouni",
    	title = "Patient Medical Records in Secure Portable Tokens",
    	booktitle = "Proc. of the 9th International e-smart Conference",
    	year = 2008,
    	address = "Sophia Antipolis, France",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  5. N Anciaux, L Bouganim, H Heerde, P Pucheral and P M G Apers. InstantDB : Enforcing Timely Degradation of Sensitive Data. In Proc. of the 24th International Conference on Data Engineering (ICDE). 2008. BibTeX

    @inproceedings{ABV+08,
    	author = "N. Anciaux and L. Bouganim and H. van Heerde and P. Pucheral and P. M. G. Apers",
    	title = "Instant{DB} : Enforcing Timely Degradation of Sensitive Data",
    	booktitle = "Proc. of the 24th International Conference on Data Engineering (ICDE)",
    	year = 2008,
    	address = "Cancun, Mexico",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  6. N Anciaux, L Bouganim, H Heerde, P Pucheral and P M G Apers. Dégradation progressive et irréversible des données. In 24èmes journées Bases de Données Avancées (BDA). 2008. BibTeX

    @inproceedings{ABH+08b,
    	author = "N. Anciaux and L. Bouganim and H. van Heerde and P. Pucheral and P. M. G. Apers",
    	title = "D\'{e}gradation progressive et irr\'{e}versible des donn\'{e}es",
    	booktitle = "24\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2008,
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "yes"
    }
    
  7. N Anciaux, L Bouganim, H Heerde, P Pucheral and P M G Apers. Data Degradation: Making Private Data Less Sensitive Over Time. In Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM). 2008. BibTeX

    @inproceedings{ABH+08a,
    	author = "N. Anciaux and L. Bouganim and H. van Heerde and P. Pucheral and P. M. G. Apers",
    	title = "Data Degradation: Making Private Data Less Sensitive Over Time",
    	booktitle = "Proc. of the 17th ACM International Conference on Information and Knowledge Management (ACM CIKM)",
    	year = 2008,
    	address = "Napa Valley, USA",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    
  8. N Anciaux, M Benzine, L Bouganim, K Jacquemin, P Pucheral and S Yin. Restoring the Patient Control over her Medical History. In Proc. of the 21th IEEE Int. Symposium on Computer-Based Medical Systems (IEEE CBMS). 2008. BibTeX

    @inproceedings{ABB+08c,
    	author = "N. Anciaux and M. Benzine and L. Bouganim and K. Jacquemin and P. Pucheral and S. Yin",
    	title = "Restoring the Patient Control over her Medical History",
    	booktitle = "Proc. of the 21th IEEE Int. Symposium on Computer-Based Medical Systems (IEEE CBMS)",
    	year = 2008,
    	address = {Jyv\"{a}skyl\"{a}, Finland},
    	annote = "confint",
    	x-international-audience = "yes",
    	x-proceedings = "yes"
    }
    

Misc

  1. Tristan Allard, Benjamin Nguyen and Philippe Pucheral. Comment protéger la vie privée ?. Pour la Science, 2013. to appear. BibTeX

    @misc{ANPu13a,
    	author = "Tristan Allard and Benjamin Nguyen and Philippe Pucheral",
    	title = "Comment protéger la vie privée ?",
    	howpublished = "Pour la Science",
    	year = 2013,
    	note = "to appear",
    	annote = "vulg"
    }
    
  1. D Cardon, G Desgens-Pasanau and B Nguyen. Le droit à l’oubli sur Internet est-il possible ? Débat animé par Daniel Fiévet.. Conférence débat au Café des techniques, Musée des arts et métiers, Paris, 2011. BibTeX

    @misc{CDNg11,
    	author = "Cardon, D. and Desgens-Pasanau, G. and Nguyen, B.",
    	title = "Le droit à l’oubli sur Internet est-il possible ? Débat animé par Daniel Fiévet.",
    	howpublished = "Conférence débat au Café des techniques, Musée des arts et métiers, Paris",
    	year = 2011,
    	annote = "vulg",
    	x-international-audience = "no",
    	x-proceedings = "no"
    }
    
  2. L Bouganim. Serveurs portables et sécurisés de données personnelles : Application aux données médicales. Les Rencontres des Tuileries, INRIA Paris-Rocquencourt, 2011. BibTeX

    @misc{Bouga11b,
    	author = "Bouganim, L.",
    	title = "Serveurs portables et sécurisés de données personnelles : Application aux données médicales",
    	howpublished = "Les Rencontres des {Tuileries}, {INRIA Paris-Rocquencourt}",
    	year = 2011,
    	annote = "vulg",
    	x-international-audience = "no",
    	x-proceedings = "no"
    }
    
  1. Jean-François Parguet and P Pucheral. Protection des données médicales numérisées : questions à Jean-François Parguet et à Philippe Pucheral, propos recueillis par Dominique Chouchan. La Recherche. Les Cahiers de l'Inria, 2010. BibTeX

    @misc{PaPu10,
    	author = "Parguet, Jean-François and Pucheral, P.",
    	title = "Protection des données médicales numérisées : questions à Jean-François Parguet et à Philippe Pucheral, propos recueillis par Dominique Chouchan",
    	howpublished = "La Recherche. Les Cahiers de l'Inria",
    	year = 2010,
    	annote = "vulg",
    	publisher = "Societé d'éditions scientifiques",
    	url-hal = "http://hal.inria.fr/inria-00511468/en",
    	volume = 439,
    	x-editorial-board = "yes",
    	x-id-hal = "inria-00511468",
    	x-international-audience = "no",
    	x-scientific-popularization = "yes"
    }
    
  2. L Bouganim. Dossiers personnels sécurisés et mobiles. Agence Naitonale de la Sécurité des Systèmes d'Information (ANSSI), 2010. BibTeX

    @misc{Boug10,
    	author = "L. Bouganim",
    	title = "Dossiers personnels sécurisés et mobiles",
    	howpublished = "Agence Naitonale de la Sécurité des Systèmes d'Information (ANSSI)",
    	year = 2010,
    	annote = "confinv"
    }
    
  1. L Bouganim. Dossier médico-social sécurisé. Office Parlementaire d'Evaluation des Choix Scientifiques et Technologiques, 2009. BibTeX

    @misc{Boug09d,
    	author = "L. Bouganim",
    	title = "Dossier médico-social sécurisé",
    	howpublished = "Office Parlementaire d'Evaluation des Choix Scientifiques et Technologiques",
    	year = 2009,
    	annote = "confinv"
    }
    
  2. L Bouganim. Logiciel uFLIP version 2.1, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009. 2009. BibTeX

    @misc{Boug09c,
    	author = "L. Bouganim",
    	title = "Logiciel uFLIP version 2.1, enregistr\'{e} \`{a} l'Agence pour la Protection des Programmes (APP) sous le num\'{e}ro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009",
    	year = 2009,
    	annote = "brevet"
    }
    
  3. N Anciaux, L Bouganim, P Pucheral, S Yin, M Benzine, K Jacquemin, D Shasha, C Salperwyck and El M Kholy. Logiciel PlugDB-engine version 2, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009. 2009. BibTeX

    @misc{ABP+09,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral and S. Yin and M. Benzine and K. Jacquemin and D. Shasha and C. Salperwyck and M. El Kholy",
    	title = "Logiciel PlugDB-engine version 2, enregistr\'{e} \`{a} l'Agence pour la Protection des Programmes (APP) sous le num\'{e}ro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009",
    	year = 2009,
    	annote = "brevet",
    	x-pays = "US"
    }
    
  1. P Pucheral. SGBD sur puce : challenges et applications. 2008. Keynote Speech, 4èmes journées Francophones Mobilité et Ubiquité (UbiMob). BibTeX

    @misc{Puch08b,
    	author = "P. Pucheral",
    	title = "{SGBD} sur puce : challenges et applications",
    	year = 2008,
    	note = "Keynote Speech, 4\`{e}mes journ\'{e}es Francophones Mobilit\'{e} et Ubiquit\'{e} (UbiMob)",
    	annote = "confinv",
    	x-invited-conference = "yes"
    }
    
  2. P Pucheral. Bases de données : l'individu suivi à la trace. 2008. Interview du dossier L'identité à l'ère numérique - Le Journal duCNRS. BibTeX

    @misc{Puch08a,
    	author = "P. Pucheral",
    	title = "Bases de donn\'{e}es : l'individu suivi \`{a} la trace",
    	year = 2008,
    	note = "Interview du dossier L'identit\'{e} \`{a} l'\`{e}re num\'{e}rique - Le Journal duCNRS",
    	annote = "vulg",
    	x-scientific-popularization = "yes"
    }
    
  3. Pr. L Montagnier, Y Haentjens, J -P Arragon and N Anciaux. Les Yvelines département leader en Ile-de-France pour la recherche. 2008. Table ronde animée par C. Beley et F. Becquet, Les Rendez-vous Carnot, R. and D. Network, Versailles, France. BibTeX

    @misc{Anci08,
    	author = "Pr. L. Montagnier and Y. Haentjens and J.-P. Arragon and N. Anciaux",
    	title = "Les Yvelines d\'{e}partement leader en Ile-de-France pour la recherche",
    	year = 2008,
    	note = "Table ronde anim\'{e}e par C. Beley et F. Becquet, Les Rendez-vous Carnot, R. and D. Network, Versailles, France",
    	annote = "confinv",
    	x-invited-conference = "yes"
    }
    
  4. N Anciaux, L Bouganim, P Pucheral, M Benzine, K Jacquemin, S Yin, D Shasha and C Salperwyck. Logiciel PlugDB-engine version 1, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.280004.000.S.P.2008.0000.10000 en date du 8 juillet 2008. 2008. BibTeX

    @misc{APP08,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral and M. Benzine and K. Jacquemin and S. Yin and D. Shasha and C. Salperwyck",
    	title = "Logiciel PlugDB-engine version 1, enregistr\'{e} \`{a} l'Agence pour la Protection des Programmes (APP) sous le num\'{e}ro IDDN.FR.001.280004.000.S.P.2008.0000.10000 en date du 8 juillet 2008",
    	year = 2008,
    	annote = "brevet"
    }
    

PhdThesis

  1. Lionel Le Folgoc. Personal Data Server Engine: Design and Performance Considerations. Université de Versailles St-Quentin-en-Yvelines, 2012. BibTeX

    @phdthesis{LeFL12,
    	author = "Le Folgoc, Lionel",
    	title = "{Personal Data Server Engine: Design and Performance Considerations}",
    	school = "{Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2012,
    	annote = "these"
    }
    
  1. S Yin. Un modèle de stockage et d’indexation pour des données embarquées en mémoire flash. Université de Versailles St-Quentin-en-Yvelines, 2011. BibTeX

    @phdthesis{YinS11,
    	author = "S. Yin",
    	title = "{Un modèle de stockage et d’indexation pour des données embarquées en mémoire flash}",
    	school = "{Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2011,
    	annote = "these"
    }
    
  2. Y Guo. Confidentialité et intégrité de bases de données embarquées. Université de Versailles St-Quentin-en-Yvelines, 2011. BibTeX

    @phdthesis{GuoY11,
    	author = "Y. Guo",
    	title = "{Confidentialité et intégrité de bases de données embarquées}",
    	school = "{Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2011,
    	annote = "these"
    }
    
  3. T Allard. Sanitizing Microdata Without Leak: A Decentralized Approach. Université de Versailles St-Quentin-en-Yvelines, 2011. BibTeX

    @phdthesis{Alla11,
    	author = "T. Allard",
    	title = "{Sanitizing Microdata Without Leak: A Decentralized Approach}",
    	school = "{Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2011,
    	annote = "these"
    }
    
  1. H J W Heerde. Privacy-aware data management by means of data degradation -making private data less sensitive over time. University of Twente and Université de Versailles St-Quentin-en-Yvelines, 2010. BibTeX

    @phdthesis{Van10,
    	author = "H.J.W. van Heerde",
    	title = "{Privacy-aware data management by means of data degradation -making private data less sensitive over time}",
    	school = "{University of Twente and Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2010,
    	annote = "these"
    }
    
  2. M Benzine. Combinaison sécurisée de données publiques et sensibles dans les bases de données. Université de Versailles St-Quentin-en-Yvelines, 2010. BibTeX

    @phdthesis{Ben10,
    	author = "M. Benzine",
    	title = "{Combinaison sécurisée de données publiques et sensibles dans les bases de données}",
    	school = "{Université de Versailles St-Quentin-en-Yvelines}",
    	year = 2010,
    	annote = "these"
    }
    

Proceedings

  1. Luc Bouganim (ed.). {Bases de Données Avancées - Modélisation, Interrogation et Optimisation} 17(5). Ingénierie des Systèmes d'Information (ISI), Lavoisier, 2012. URL BibTeX

    @proceedings{Boug12,
    	title = "{Bases de Donn{\'e}es Avanc{\'e}es - Mod{\'e}lisation, Interrogation et Optimisation}",
    	year = 2012,
    	editor = "Bouganim, Luc",
    	volume = 17,
    	number = 5,
    	publisher = "Ing{\'e}nierie des Syst{\`e}mes d'Information (ISI), Lavoisier",
    	affiliation = "Parall{\'e}lisme, R{\'e}seaux, Syst{\`e}mes d'information, Mod{\'e}lisation - PRISM , SMIS - INRIA Rocquencourt",
    	annote = "proc",
    	audience = "nationale",
    	hal_id = "hal-00768383",
    	language = "Fran{\c c}ais",
    	pages = 138,
    	url = "http://hal.archives-ouvertes.fr/hal-00768383"
    }
    

 

 Imprimer 

Our website is protected by DMC Firewall!