2023
Bkakria, Anis
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption Journal Article
In: Journal of Computer Security, no. Preprint, pp. 1–34, 2023.
@article{bkakria2023robust,
title = {Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption},
author = {Anis Bkakria},
year = {2023},
date = {2023-01-01},
journal = {Journal of Computer Security},
number = {Preprint},
pages = {1–34},
publisher = {IOS Press},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Chah, Badreddine; Lombard, Alexandre; Bkakria, Anis; Abbas-Turki, Abdeljalil; Yaich, Reda
H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption Proceedings Article
In: 26th IEEE International Conference on Intelligent Transportation Systems ITSC 2023, 2023.
@inproceedings{chah2023h3pc,
title = {H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption},
author = {Badreddine Chah and Alexandre Lombard and Anis Bkakria and Abdeljalil Abbas-Turki and Reda Yaich},
year = {2023},
date = {2023-01-01},
booktitle = {26th IEEE International Conference on Intelligent Transportation Systems ITSC 2023},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Bkakria, Anis; Brika, Lydia
A Framework for Privacy Policy Enforcement for Connected Automotive Systems Proceedings Article
In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), 2023.
@inproceedings{bkakria2023framework,
title = {A Framework for Privacy Policy Enforcement for Connected Automotive Systems},
author = {Anis Bkakria and Lydia Brika},
year = {2023},
date = {2023-01-01},
booktitle = {IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Pape, Sebastian; Syed-Winkler, Sarah; Garcia, Armando Miguel; Chah, Badreddine; Bkakria, Anis; Hiller, Matthias; Walcher, Tobias; Lombard, Alexandre; Abbas-Turki, Abdeljalil; Yaich, Reda
A Systematic Approach for Automotive Privacy Management Proceedings Article
In: CSCS '23: ACM Computer Science in Cars Symposium, Darmstadt, Germany, December 5th, 2023, ACM, 2023.
@inproceedings{PSGCBHWLAY23cscs,
title = {A Systematic Approach for Automotive Privacy Management},
author = {Sebastian Pape and Sarah Syed-Winkler and Armando Miguel Garcia and Badreddine Chah and Anis Bkakria and Matthias Hiller and Tobias Walcher and Alexandre Lombard and Abdeljalil Abbas-Turki and Reda Yaich},
year = {2023},
date = {2023-01-01},
booktitle = {CSCS '23: ACM Computer Science in Cars Symposium, Darmstadt, Germany, December 5th, 2023},
volume = {to appear},
publisher = {ACM},
keywords = {AUTOMOTIVE, AUTOPSY, GDPR, PETs, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
2022
Chah, Badreddine; Lombard, Alexandre; Bkakria, Anis; Yaich, Reda; Abbas-Turki, Abdeljalil; Galland, Stéphane
Privacy Threat Analysis for connected and autonomous vehicles Journal Article
In: Procedia Computer Science, vol. 210, pp. 36-44, 2022, ISSN: 1877-0509, (The 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022) / Affiliated Workshops).
@article{CHAH202236,
title = {Privacy Threat Analysis for connected and autonomous vehicles},
author = {Badreddine Chah and Alexandre Lombard and Anis Bkakria and Reda Yaich and Abdeljalil Abbas-Turki and Stéphane Galland},
url = {https://www.sciencedirect.com/science/article/pii/S1877050922015733},
doi = {https://doi.org/10.1016/j.procs.2022.10.117},
issn = {1877-0509},
year = {2022},
date = {2022-01-01},
journal = {Procedia Computer Science},
volume = {210},
pages = {36-44},
abstract = {Connected and autonomous vehicles produce, store and communicate a large amount of personal data (the route taken, the stop points, home and work addresses, etc.). The development of this type of vehicles brings the opportunity to offer new services to road users, with more software and hardware components on the vehicle. Many of these components suffer from weaknesses that can be exploited. The issue is that a single vulnerability in one element of the system will threaten the privacy of the vehicle's users (The weakest link principle of IT security). In this paper, we present a privacy threat analysis on the general architecture of connected and autonomous vehicles, to point out privacy risks according to formal privacy requirements. We present a use case modularization and its analysis that helps us to discern the privacy requirements of this use case, which can be enabled by manufacturers. To meet the previous objectives, we follow a LINDDUN methodology of privacy threat analysis},
note = {The 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022) / Affiliated Workshops},
keywords = {Autonomous Vehicle, Connected, Cyber-Physical Systems (CPS), Privacy, Privacy engineering framework, Security, Threat Analysis},
pubstate = {published},
tppubtype = {article}
}
Connected and autonomous vehicles produce, store and communicate a large amount of personal data (the route taken, the stop points, home and work addresses, etc.). The development of this type of vehicles brings the opportunity to offer new services to road users, with more software and hardware components on the vehicle. Many of these components suffer from weaknesses that can be exploited. The issue is that a single vulnerability in one element of the system will threaten the privacy of the vehicle's users (The weakest link principle of IT security). In this paper, we present a privacy threat analysis on the general architecture of connected and autonomous vehicles, to point out privacy risks according to formal privacy requirements. We present a use case modularization and its analysis that helps us to discern the privacy requirements of this use case, which can be enabled by manufacturers. To meet the previous objectives, we follow a LINDDUN methodology of privacy threat analysis
Syed-Winkler, Sarah; Pape, Sebastian; Sabouri, Ahmad
A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility Proceedings Article
In: CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
@inproceedings{SPS22cscs,
title = {A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility},
author = {Sarah Syed-Winkler and Sebastian Pape and Ahmad Sabouri},
url = {https://dl.acm.org/doi/abs/10.1145/3568160.3570231},
doi = {10.1145/3568160.3570231},
year = {2022},
date = {2022-01-01},
booktitle = {CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022},
publisher = {ACM},
keywords = {AUTOPSY, cloud computing, IoT, PETs, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}