EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1T. Allard, B. Nguyen, P. Pucheral.

    MetaP: Revisiting Privacy-Preserving Data Publishing using Secure Devices, in: Distributed and Parallel Databases, June 2014, vol. 32, no 1, pp. 191-244. [ DOI : 10.1007/s10619-013-7122-x ]

    https://hal.archives-ouvertes.fr/hal-00934586
  • 2N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral, I. Sandu Popa.

    Trusted Cells : A Sea Change for Personnal Data Services, in: CIDR 2013 - 6th Biennal Conference on Innovative Database Research, Asilomar, United States, 2013, 4 p.

    http://hal.inria.fr/hal-00768379
  • 3N. Anciaux, L. Bouganim, T. Delot, S. Ilarri, L. Kloul, N. Mitton, P. Pucheral.

    Folk-IS: Opportunistic Data Services in Least Developed Countries, in: 40th International Conference on Very Large Data Bases (VLDB), Hangzhou, China, Zhejiang University, September 2014.

    https://hal.inria.fr/hal-00906204
  • 4N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. Le Folgoc, S. Yin.

    MILo-DB: a personal, secure and portable database machine, in: Distributed and Parallel Databases, March 2014, vol. 32, no 1, pp. 37-63. [ DOI : 10.1007/s10619-012-7119-x ]

    https://hal.archives-ouvertes.fr/hal-00768355
  • 5N. Anciaux, S. Lallali, I. Sandu Popa, P. Pucheral.

    A Scalable Search Engine for Mass Storage Smart Objects, in: Proceedings of the 41th International Conference on Very Large Databases (VLDB), Kohala Coast, Hawaii, United States, August 2015, vol. 8, no 9, pp. 910-921. [ DOI : 10.14778/2777598.2777600 ]

    https://hal.inria.fr/hal-01176458
  • 6N. Anciaux, B. Nguyen, I. Sandu Popa.

    Tutorial: Managing Personal Data with Strong Privacy Guarantees, March 2014, pp. 672-673. [ DOI : 10.5441/002/edbt.2014.71 ]

    https://hal.inria.fr/hal-01096633
  • 7G. Scerri, B. Warinschi, M. Barbosa, B. Portela.

    Foundations of Hardware-Based Attested Computation and Application to SGX, March 2016, pp. 245-260. [ DOI : 10.1109/EuroSP.2016.28 ]

    https://hal.inria.fr/hal-01417137
  • 8Q. C. To, B. Nguyen, P. Pucheral.

    Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware, in: 17th International Conference on Extending Database Technology (EDBT), Athens, Greece, March 2014. [ DOI : 10.5441/002/edbt.2014.44 ]

    https://hal.inria.fr/hal-01096639
  • 9C. Q. To, B. Nguyen, P. Pucheral.

    TrustedMR: A Trusted MapReduce System based on Tamper Resistance Hardware , in: Proceedings of the 23rd International Conference on Cooperative Information Systems (COOPIS), Rhodes, Greece, October 2015, pp. 38-56. [ DOI : 10.1007/978-3-319-26148-5_3 ]

    https://hal.inria.fr/hal-01254951
  • 10D. H. Ton That, I. Sandu Popa, K. Zeitouni.

    TRIFL: A Generic Trajectory Index for Flash Storage, in: ACM Transactions on Algorithms, July 2015, vol. 1, no 2, 44 p. [ DOI : 10.1145/2786758 ]

    https://hal.inria.fr/hal-01176563
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 14S. J. Pan, I. Sandu Popa, C. Borcea.

    DIVERT: A Distributed Vehicular Traffic Re-Routing System for Congestion Avoidance, in: IEEE Transactions on Mobile Computing, January 2017, vol. 16, no 1, pp. 58-72. [ DOI : 10.1109/TMC.2016.2538226 ]

    https://hal.inria.fr/hal-01426424
  • 15C. Q. To, B. Nguyen, P. Pucheral.

    Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture, in: ACM Transactions on Database Systems, 2016, forthcoming.

    https://hal.archives-ouvertes.fr/hal-01296432
  • 16D. H. Ton That, I. Sandu Popa, K. Zeitouni, C. Borcea.

    Un protocole basé sur des mobiles sécurisés pour une collecte participative de données spatiales en mobilité réellement anonyme, in: Revue Internationale de Géomatique, August 2016, vol. 26, no 2, pp. 185-210. [ DOI : 10.3166/RIG.26.185-210 ]

    https://hal.inria.fr/hal-01426358

Articles in National Peer-Reviewed Journals

  • 17N. Anciaux, P. Pucheral, M. BEHAR-TOUCHAIS, V.-L. Benabou, G. BRUNAUX, A. LEFEVRE, N. MARTIAL-BRAZ, J. ROCHFELD, N. SAUPHANOR-BROUILLAUD, B. SCHULZ, J. SENECHAL, C. Zolynski.

    Dossier Contenus Numériques Revue Contrats, Concurrence, Consommation - Contenus Numériques, in: Revue Contrats Concurrence Consommation, February 2017.

    https://hal.archives-ouvertes.fr/hal-01432544
  • 18C. Berthet, C. Zolynski, N. Anciaux, P. Pucheral.

    " Contenus numériques et récupération des données : un nouvel outil d' 'empouvoirement' du consommateur ? ", in: Dalloz IP/IT, January 2017, vol. IP IT / 10.

    https://hal.inria.fr/hal-01429939
  • 19P. Pucheral, N. Anciaux, M. BEHAR-TOUCHAIS, V.-L. Benabou, N. MARTIAL-BRAZ, J. ROCHFELD, N. SAUPHANOR-BROUILLAUD, B. SCHULZ, J. SENECHAL, C. Zolynski.

    Dossier Contenus Numériques / Données, in: Contrats concurrence consommation, February 2017.

    https://hal.inria.fr/hal-01429951
  • 20P. Pucheral, A. Rallet, F. Rochelandet, C. Zolynski.

    La Privacy by design : une fausse bonne solution aux problèmes de protection des données personnelles soulevés par l'Open data et les objets connectés ?, in: Legicom, January 2016, no 56, pp. 89-99. [ DOI : 10.3917/legi.056.0089 ]

    https://hal.archives-ouvertes.fr/hal-01427983

International Conferences with Proceedings

  • 21L. Bouganim, A. Katsouraki, B. Nguyen.

    DatShA :A Data Sharing Algebra for access control plans, in: 19th International Conference on Extending Database Technology (EDBT 2016), Bordeaux, France, Proceedings of the 19th International Conference on Extending Database Technology (short paper), March 2016.

    https://hal.archives-ouvertes.fr/hal-01289023
  • 22T. B. T. Le, N. Anciaux, S. Gilloton, S. Lallali, P. Pucheral, I. Sandu Popa, C. Chen.

    Distributed Secure Search in the Personal Cloud, in: 19th International Conference on Extending Database Technology (EDBT 2016), Bordeaux, France, Proceedings of EDBT'16 (Demo paper), March 2016, pp. 652-655.

    https://hal.inria.fr/hal-01293409
  • 23D. H. Ton That, I. Sandu Popa, K. Zeitouni, C. Borcea.

    PAMPAS: Privacy-Aware Mobile Participatory Sensing Using Secure Probes, in: International Conference on Scientific and Statistical Database Management (SSDBM '16), Budapest, Hungary, Proceedings of the 28th International Conference on Scientific and Statistical Database Management, July 2016. [ DOI : 10.1145/1235 ]

    https://hal.inria.fr/hal-01426375

Conferences without Proceedings

  • 24A. Michel, B. Nguyen.

    Managing distributed queries under anonymity constraints, in: 7e Atelier sur la Protection de la Vie Privée, Toulouse, France, July 2016.

    https://hal.archives-ouvertes.fr/hal-01424993
  • 25A. Michel, B. Nguyen, P. Pucheral.

    Exécution de requêtes distribuées sous contraintes d'anonymat, in: 32ème Conférence sur la Gestion de Données - Principes, Technologies et Applications, Poitiers, France, November 2016.

    https://hal.archives-ouvertes.fr/hal-01424989

Scientific Books (or Scientific Book chapters)

Scientific Popularization

References in notes
  • 29R. Agrawal, J. Kiernan, R. Srikant, Y. Xu.

    Hippocratic Databases, in: Proc. of the Int. Conf. on Very Large Data Bases (VLDB), 2002.
  • 30T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. Le Folgoc, B. Nguyen, P. Pucheral, I. Ray, I. Ray, S. Yin.

    Secure Personal Data Servers: a Vision Paper, in: Proc. of the 36th Int. Conf. on Very Large Databases (VLDB), 2010.
  • 31N. Anciaux, B. Nguyen, I. Sandu Popa.

    Towards an Era of Trust in Personal Data Management, in: Proceedings of the 19th East-European Conference on Advances in Databases and Information Systems (ADBIS '15). Tutorial, Poitiers, France, 2015.

    https://hal.inria.fr/hal-01176512
  • 32A. Anderson.

    An introduction to the web services policy language (WSPL), in: IEEE Computer Society, 2004.
  • 33R. Bahmani, M. Barbosa, F. Brasser, B. Portela, A. Sadeghi, G. Scerri, B. Warinschi.

    Secure Multiparty Computation from SGX, in: IACR Cryptology ePrint Archive, 2016, vol. 2016, 1057 p.
  • 34P. Bonnet, L. Bouganim, I. Koltsidas, S. Viglas.

    System Co-Design and Data Management for Flash Devices, in: Very Large Data Bases (Tutorial), 2011.
  • 35L. Bouganim, Y. Guo.

    Database Encryption, in: Encyclopedia of Cryptography and Security, S. Jajodia, H. van Tilborg (editors), Springer, 2009, pp. 307-312.
  • 36L. Cranor.

    Web Privacy with P3P, O'Reilly Media, 2002.
  • 37B. Fung, K. Wang, R. Chen, P. Yu.

    Privacy-preserving data publishing: A survey of recent developments, in: ACM Computing Surveys (CSUR), 2010, vol. 42, no 4.
  • 38S. Lallali, N. Anciaux, I. Sandu Popa, P. Pucheral.

    A Secure Search Engine for the Personal Cloud, in: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data (SIGMOD '15). Demo paper, Melbourne, Australia, 2015, pp. 1445-1450. [ DOI : 10.1145/2723372.2735376 ]

    https://hal.inria.fr/hal-01176473
  • 39T. Moses.

    Extensible access control markup language (XACML) version 2.0, in: Oasis Standard 200502, 2005.
  • 40M. Schunter, C. Powers.

    Enterprise privacy authorization language (EPAL 1.1), in: IBM, 2003.
  • 41D. H. Ton That, I. Sandu Popa, K. Zeitouni.

    PPTM: Privacy-aware Participatory Traffic Monitoring Using Mobile Secure Probes, in: Proceedings of the 16th IEEE International Conference on Mobile Data Management (MDM '15). Demo paper, Pittsburgh, United States, 2015, 4 p.

    https://hal.inria.fr/hal-01176486