Anne Kayem

Anne V.D.M. Kayem is currently a Senior Lecturer at the University of Cape Town's Department of Computer Science and head of the Information Security Laboratory. Since January 2013, she is speaker of the Hasso-Plattner-Institute's PhD Research School in Information and Communication Technologies for Development at the University of Cape Town, South Africa. She holds a PhD degree in Computer Science obtained from Queen's University, Kingston, Ontario, Canada. Her PhD thesis was on Adaptive Cryptographic Access Control in Dynamic Data Sharing Environments and her current research interests lie in the areas of Cryptographic Key Management, Data Anonymization, Autonomic Computing, Access Control, and Unconventional Security Methodologies for resource constrained environments. She is a member of ACM and IEEE, and a member of the editorial board of Parallel Processing Letters. In addition, she is on the reviewing board of a couple of local (South African) and international conferences and journals. She co-chairs the INTRICATE-SEC (Theories and Intricacies of Information Security Problems) workshop which holds annually in conjunction with the ISSA (Information Security South Africa) conference in Johannesburg, South Africa.

Publications

Information Security in Diverse Computing Environments
Anne Kayem, Christoph Meinel. © 2014. 354 pages.
Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is...
Diversity in Security Environments: The Why and the Wherefore
Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke. © 2014. 7 pages.
Information security is generally discussed in terms of preventing adversarial access to applications and to the data these applications handle. The authors note, however, that...
A State-of-the-Art Review of Data Stream Anonymization Schemes
Aderonke B. Sakpere, Anne V. D. M. Kayem. © 2014. 27 pages.
Streaming data emerges from different electronic sources and needs to be processed in real time with minimal delay. Data streams can generate hidden and useful knowledge patterns...
Design of an IPTV Conditional Access System Supporting Multiple-Services
Gregory L. Harding, Anne V. D. M. Kayem. © 2014. 40 pages.
Conditional Access (CA) is typically used by pay-television operators to restrict access to content to authorized subscribers. While several commercial CA solutions exist for...
Experiences with Threat Modeling on a Prototype Social Network
Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda. © 2014. 19 pages.
Supported by the Web 3.0 platform that enables dynamic content sharing, social networking applications are a ubiquitous information exchange platform. Content sharing raises the...
Security in Service Oriented Architectures: Standards and Challenges
Anne V.D.M. Kayem. © 2013. 24 pages.
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable architectures on the web with the most common implementation of this concept...
Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl. © 2012. 34 pages.
Self-protecting access control mechanisms can be described as an approach to enforcing security in a manner that automatically protects against violations of access control...
Security in Service Oriented Architectures: Standards and Challenges
Anne V.D.M. Kayem. © 2010. 25 pages.
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable architectures on the web with the most common implementation of this concept...