Edgelet Computing: Pushing Query Processing and Liability at the Extreme Edge of the Network | 0 | 0.34 | 2022 |
An Extensive and Secure Personal Data Management System Using SGX | 0 | 0.34 | 2022 |
Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems | 0 | 0.34 | 2022 |
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution | 0 | 0.34 | 2022 |
Poster: Reducing Data Leakage on Personal Data Management Systems | 1 | 0.38 | 2021 |
Secure Distributed Queries over Large Sets of Personal Home Boxes. | 0 | 0.34 | 2020 |
Personal Data Management Systems: The security and functionality standpoint. | 4 | 0.44 | 2019 |
A Manifest-Based Framework for Organizing the Management of Personal Data at the Edge of the Network. | 0 | 0.34 | 2019 |
Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments | 1 | 0.35 | 2019 |
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads. | 0 | 0.34 | 2019 |
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads. | 0 | 0.34 | 2019 |
Reconciling Privacy and Data Sharing in a Smart and Connected Surrounding. | 0 | 0.34 | 2018 |
SWYSWYK: A Privacy-by-Design Paradigm for Personal Information Management Systems. | 0 | 0.34 | 2017 |
Supporting secure keyword search in the personal cloud. | 1 | 0.39 | 2017 |
A New Sharing Paradigm for the Personal Cloud. | 1 | 0.37 | 2017 |
SWYSWYK: A New Sharing Paradigm for the Personal Cloud. | 0 | 0.34 | 2017 |
Distributed Secure Search in the Personal Cloud. | 2 | 0.37 | 2016 |
A Root of Trust for the Personal Cloud. | 0 | 0.34 | 2016 |
A Scalable Search Engine for Mass Storage Smart Objects. | 0 | 0.34 | 2015 |
A Secure Search Engine for the Personal Cloud | 5 | 0.44 | 2015 |
Managing Personal Health Records in an Infrastructure-Weak Environment. | 0 | 0.34 | 2015 |
Limiting Data Exposure in Multi-Label Classification Processes. | 1 | 0.37 | 2015 |
A scalable search engine for mass storage smart objects | 6 | 0.72 | 2015 |
Opportunistic data services in least developed countries: benefits, challenges and feasibility issues | 2 | 0.39 | 2014 |
Folk-IS: Opportunistic Data Services in Least Developed Countries. | 0 | 0.34 | 2014 |
Trusted Cells: Ensuring Privacy For The Citizens Of Smart Cities | 0 | 0.34 | 2014 |
Folk-IS: opportunistic data services in least developed countries | 4 | 0.43 | 2014 |
Tutorial: Managing Personal Data with Strong Privacy Guarantees. | 0 | 0.34 | 2014 |
MILo-DB: a personal, secure and portable database machine | 11 | 0.59 | 2014 |
MinExp-card: limiting data collection using a smart card | 1 | 0.38 | 2013 |
Exposition minimum de données pour des applications à base de classifieurs. | 0 | 0.34 | 2013 |
Trusted Cells: A Sea Change for Personal Data Services. | 9 | 0.55 | 2013 |
The Minimum Exposure Project: Limiting Data Collection In Online Forms | 2 | 0.39 | 2012 |
Limiting data collection in application forms: A real-case application of a founding privacy principle | 2 | 0.37 | 2012 |
Personal Data Server: Keeping Sensitive Data Under The Individual'S Control | 0 | 0.34 | 2012 |
Secure personal data servers: a vision paper | 23 | 0.95 | 2010 |
Pluggable personal data servers | 6 | 0.47 | 2010 |
Secure Personal Data Servers: a Vision Paper. | 0 | 0.34 | 2010 |
A Framework to Balance Privacy and Data Usability Using Data Degradation | 2 | 0.42 | 2009 |
Revelation on demand | 2 | 0.38 | 2009 |
InstantDB: Enforcing Timely Degradation of Sensitive Data | 4 | 0.44 | 2008 |
Data degradation: making private data less sensitive over time | 4 | 0.44 | 2008 |
DiSC: Benchmarking Secure Chip DBMS | 3 | 0.41 | 2008 |
SGBD embarqué dans une puce. Retour d'expérience | 0 | 0.34 | 2008 |
Restoring the Patient Control over Her Medical History | 6 | 0.53 | 2008 |
Querying and Aggregating Visible and Hidden Data Without Leaks | 0 | 0.34 | 2007 |
GhostDB: hiding data from prying eyes | 0 | 0.34 | 2007 |
Future Trends in Secure Chip Data Management | 2 | 0.43 | 2007 |
GhostDB: querying visible and hidden data without leaks | 15 | 1.05 | 2007 |
Balancing smartness and privacy for the ambient intelligence | 2 | 0.41 | 2006 |