Author image not provided
 Luc Bouganim

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article6.71
Citation Count235
Publication count35
Publication years1996-2017
Available for download21
Average downloads per article441.24
Downloads (cumulative)9,266
Downloads (12 Months)280
Downloads (6 Weeks)44
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


35 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 35
Result page: 1 2

Sort by:

1 published by ACM
September 2017 APSys '17: Proceedings of the 8th Asia-Pacific Workshop on Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 18,   Downloads (12 Months): 67,   Downloads (Overall): 67

Full text available: PDFPDF
Solid-State Drives (SSDs) have gained acceptance by providing the same block device abstraction as magnetic hard drives, at the cost of suboptimal resource utilisation and unpredictable performance. Recently, Open-Channel SSDs have emerged as a means to obtain predictably high performance, based on a clean break from the block device abstraction. ...
Keywords: uFLIP-OC, Benchmarking, NAND Flash, Open-channel SSDs

2 published by ACM
May 2014 ACM SIGMOD Record: Volume 43 Issue 1, March 2014
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 14,   Downloads (Overall): 162

Full text available: PDFPDF
According to many studies, IT should become a key facilitator in establishing primary education, reducing mortality or supporting commercial initiatives in Least Developed Countries. The main barrier to the development of IT services in these regions is not only the lack of communication facilities, but also the lack of consistent ...

3
March 2014 Distributed and Parallel Databases: Volume 32 Issue 1, March 2014
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 5

Mass-storage secure portable tokens are emerging and provide a real breakthrough in the management of sensitive data. They can embed personal data and/or metadata referencing documents stored encrypted in the Cloud and can manage them under holder's control. Mass on-board storage requires efficient embedded database techniques. These techniques are however ...
Keywords: Log-only database structure, Flash memory, Embedded database, Tiny RAM, Secure and privacy aware data management, Secure chip

4
January 2014 Proceedings of the VLDB Endowment: Volume 7 Issue 5, Janary 2014
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 14

Full text available: PDFPDF
According to a wide range of studies, IT should become a key facilitator in establishing primary education, reducing mortality and supporting commercial initiatives in Least Developed Countries (LDCs). The main barrier to the development of IT services in these regions is not only the lack of communication facilities, but also ...

5
August 2013 Proceedings of the VLDB Endowment: Volume 6 Issue 12, August 2013
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 4,   Downloads (12 Months): 49,   Downloads (Overall): 210

Full text available: PDFPDF
Solid State Drives (SSDs) are a moving target for system designers: they are black boxes, their internals are undocumented, and their performance characteristics vary across models. There is no appropriate analytical model and experimenting with commercial SSDs is cumbersome, as it requires a careful experimental methodology to ensure repeatability. Worse, ...

6
September 2010 Proceedings of the VLDB Endowment: Volume 3 Issue 1-2, September 2010
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 0,   Downloads (12 Months): 14,   Downloads (Overall): 396

Full text available: PDFPDF
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on internet companies to store their data and make them reliable and highly available through the internet. However, these benefits must be weighed against privacy risks incurred ...

7 published by ACM
June 2010 SIGMOD '10: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 18,   Downloads (Overall): 296

Full text available: PDFPDF
It is amazingly easy to get meaningless results when measuring flash devices, partly because of the peculiarity of flash memory, but primarily because their behavior is determined by layers of complex, proprietary, and undocumented software and hardware. In this demonstration, we share the lessons we learnt developing the uFlip benchmark ...
Keywords: energy measurements, flash devices, methodology, ssd, benchmarking, uflip

8 published by ACM
June 2010 SIGMOD '10: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 264

Full text available: PDFPDF
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure of database servers to keep confidential data really private. The advent of powerful secure tokens, combining the security of smart card microcontrollers with the storage capacity ...
Keywords: storage model, secure device, privacy

9
April 2009 Distributed and Parallel Databases: Volume 25 Issue 1-2, April 2009
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 2

Private data sometimes must be made public. A corporation may keep its customer sales data secret, but reveals totals by sector for marketing reasons. A hospital keeps individual patient data secret, but might reveal outcome information about the treatment of particular illnesses over time to support epidemiological studies. In these ...
Keywords: Aggregate computation, Confidentiality and privacy, Indexing model, Secure device, Data warehousing, Query processing

10 published by ACM
October 2008 CIKM '08: Proceedings of the 17th ACM conference on Information and knowledge management
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 235

Full text available: PDFPDF
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclosure, data degradation is proposed as an alternative to the limited retention principle. Data degradation is based on the assumption that long lasting purposes can ...
Keywords: limited retention, privacy, data degradation

11
October 2008 IEEE Transactions on Knowledge and Data Engineering: Volume 20 Issue 10, October 2008
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 3

Secure chips, e.g. present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. And they require embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. The main problem faced by secure chip DBMS designers is to ...
Keywords: Query processing, Access methods, Database Management, Security, integrity, and protection, Database Management, Access methods, Query processing, Security, integrity, and protection

12
June 2008 CBMS '08: Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the folder). Replacing the paper-based folder system by a traditional Electronic Healthcare Record (EHR) introduces new drawbacks: forcing of the patient consent, unbounded data retention, no ...
Keywords: Medical folder, Database, Privacy, Secure device

13
April 2008 ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy violation. Unfortunately, even the most well defended servers are subject to attacks and however much one trusts a hosting organism/company, such trust does not last ...

14 published by ACM
January 2008 ACM Transactions on Information and System Security (TISSEC): Volume 10 Issue 4, January 2008
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 4,   Downloads (Overall): 1,164

Full text available: PDFPDF
The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access-control from servers to clients. Different data encryption and key dissemination schemes have been proposed to serve ...
Keywords: data confidentiality, ubiquitous data management, Access-control, smartcard

15
January 2008 International Journal of Telemedicine and Applications - Pervasive Health Care Services and Technologies: Volume 2008, January 2008
Publisher: Hindawi Limited
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 85

Full text available: PdfPdf
Electronic health record (EHR) projects have been launched in most developed countries to increase the quality of healthcare while decreasing its cost. The benefits provided by centralizing the healthcare information in database systems are unquestionable in terms of information quality, availability, and protection against failure. Yet, patients are reluctant to ...

16
September 2007 VLDB '07: Proceedings of the 33rd international conference on Very large data bases
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 163

Full text available: PDFPDF
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed, say, to the prying ...

17 published by ACM
June 2007 SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 783

Full text available: PDFPDF
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospital patients. You may want to issue queries whose result will combine private and public data, but private data must not be revealed. GhostDB is an architecture ...
Keywords: privacy, storage model, secure device

18 published by ACM
June 2005 SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 364

Full text available: PDFPDF
The erosion of trust put in traditional database servers and in Database Service Providers (DSP), the growing interest for different forms of data dissemination and the concern for protecting children from suspicious Internet content are different factors that lead to move the access control from servers to clients. Due to ...

19
August 2004 VLDB '04: Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 132

Full text available: PDFPDF
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for protecting children from suspicious Internet content are different factors that lead to move the access control from servers to clients. Several encryption schemes ...

20 published by ACM
June 2004 ACM SIGMOD Record: Volume 33 Issue 2, June 2004
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 8,   Downloads (Overall): 2,628

Full text available: PDFPDF
This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from October 2001 to December 2002. The objective of this action was to review the state of progress in mobile databases and identify major research directions for the French database community. ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us