Skip to main content

and
  1. No Access

    Article

    Optimal noise functions for location privacy on continuous regions

    Users of location-based services are highly vulnerable to privacy risks since they need to disclose, at least partially, their locations to benefit from these services. One possibility to limit these risks is ...

    Ehab ElSalamouny, Sébastien Gambs in International Journal of Information Security (2018)

  2. No Access

    Chapter

    Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms

    Differential privacy is a notion of privacy that was initially designed for statistical databases, and has been recently extended to a more general class of domains. Both differential privacy and its generaliz...

    Ehab ElSalamouny in Horizons of the Mind. A Tribute to Prakash… (2014)

  3. No Access

    Chapter and Conference Paper

    An HMM-Based Reputation Model

    In modern global networks, principals usually have incomplete information about each other. Therefore trust and reputation frameworks have been recently adopted to maximise the security level by basing decisio...

    Ehab ElSalamouny, Vladimiro Sassone in Advances in Security of Information and Co… (2013)

  4. Chapter and Conference Paper

    A Differentially Private Mechanism of Optimal Utility for a Region of Priors

    The notion of differential privacy has emerged in the area of statistical databases as a measure of protection of the participants’ sensitive information, which can be compromised by selected queries. Differen...

    Ehab ElSalamouny, Konstantinos Chatzikokolakis in Principles of Security and Trust (2013)

  5. No Access

    Chapter and Conference Paper

    HMM-Based Trust Model

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the...

    Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielsen in Formal Aspects in Security and Trust (2010)

  6. No Access

    Chapter and Conference Paper

    Probable Innocence in the Presence of Independent Knowledge

    We analyse the Crowds anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Under such conditions we study, reformulate and extend ...

    Sardaouna Hamadou, Catuscia Palamidessi in Formal Aspects in Security and Trust (2010)

  7. No Access

    Chapter and Conference Paper

    Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols

    The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ’honest’ or ’corrupted.’ This paper generalises this analysis so that each member is assumed to maliciously ...

    Vladimiro Sassone, Ehab ElSalamouny, Sardaouna Hamadou in Trustworthly Global Computing (2010)