Dr. Saffija Kasem-Madani

Alumnus/Alumna

Contact
Email: kasem@REMOVETHISPART.cs.uni-bonn.de
Homepage:
 

Research

I am mainly, but not only interested in:

  • Privacy-preserving technologies, especially Utility-preserving pseudonymization.
  • Privacy metrics and measures.
  • Privacy policy languages.
  • Cryptographic Hardware and Hardware Security.

Research projects

SPAA, August 2019 - July 2020, funded by the undefinedFederal Ministry of Transport and Digital Infrastructure (BMVI)

Publications

2022

Kasem-Madani, Raedah Saffija. Maßgeschneiderte nutzbarkeitserhaltende Pseudonymisierung
Anforderungen, Beschreibung, Umsetzung, Dissertation, Rheinische Friedrich-Wilhelms-Universität Bonn, https://hdl.handle.net/20.500.11811/10606

2020

Kasem-Madani S., Meier M. (2020) Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization. In: Gritzalis S., Weippl E.R., Kotsis G., Tjoa A.M., Khalil I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science, vol 12395. Springer, Cham. doi.org/10.1007/978-3-030-58986-8_12

Saffija Kasem-Madani, Timo Malderle, Felix Boes, and Michael Meier. 2020. Privacy-Preserving Warning Management for an Identity Leakage Warning Network. In Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC 2020). Association for Computing Machinery, New York, NY, USA, Article 4, 1–6. DOI: doi.org/10.1145/3424954.3424955

2017

S. Kasem-Madani, M. Meier, M. Wehner (2017) undefinedTowards a Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization. In: Garcia-Alfaro J., Navarro-Arribas G., Hartenstein H., Herrera-Joancomartí J. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. ESORICS 2017, DPM 2017, CBT 2017. Lecture Notes in Computer Science, vol 10436. Springer, Cham. Appendix.

2016

S. Wendzel and S. Kasem-Madani. undefined IoT Security: The Improvement-Decelerating 'Cycle of Blame' (Short Paper). DOI: 10.13052/popcas010.

S. Kasem-Madani. undefinedA Mechanism Design for Privacy-Preserving Computation on Shared Data (Extended Abstract). Accepted for GI Sicherheit Doktorandenforum and GI Sicherheit Poster Session, 2016.

S. Kasem-Madani. undefinedA Framework Design for Privacy-Preserving Computation on Shared Data (Poster). Accepted for 1st IEEE European Symposium of Security & Privacy (EuroS&P). Saarbrücken, Germany. March 2016.

2015

D. Christin, D. Bub, A. Moerov, and S. Kasem-Madani. undefinedA Distributed Privacy-Preserving Mechanism for Mobile Urban Sensing Applications. In Proceedings of the 10th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015.

Kasem-Madani, Saffija, and Michael Meier. Security and privacy policy languages: A survey, categorization and gap identification. arXiv preprint arXiv:1512.00201, 2015.

S. Kasem-Madani and M. Meier: Definition of Availability Policies for Data Pseudonymization Using XACML. Pre-proceedings of 10th IFIP Summer School on Privacy and Identity Management, 2015.

2010

S. Kasem-Madani: Approximability of Selected Steiner Tree Problems in Communication Networks. Diploma thesis, supervisors: Prof. Dr. Marek Karpinski, Dr. Mathias Hauptmann, University of Bonn, November 2010.

Teaching

At University of Bonn:

  • Summer term 2020

    • Lecture "Privacy & Pseudonymization" of the module "IT Security" of professor Dr. Michael Meier (Master CS).
    • Exercise to lecture "Privacy & Pseudonymization" of professor Dr. Michael Meier (Master CS).

  • Winter term 2019/20

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2019

    • Lecture "Privacy & Pseudonymization" of the module "IT Security" of professor Dr. Michael Meier (Master CS).
    • Exercise to lecture "Privacy & Pseudonymization" of professor Dr. Michael Meier (Master CS).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Winter term 2018/19

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2018

    • Lecture "Privacy & Pseudonymization" of the module "IT Security" of professor Dr. Michael Meier (Master CS).
    • Exercise to lecture "Privacy & Pseudonymization" of professor Dr. Michael Meier (Master CS).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Winter term 2017/18

    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2017

    • Lecture "Privacy & Pseudonymization" of the module "IT Security" of professor Dr. Michael Meier (Master CS).
    • Exercise to lecture "Privacy & Pseudonymization" of professor Dr. Michael Meier (Master CS).
    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lab "IT Security" of professor Dr. Michael Meier (Master CS).

  • Winter term 2016/17

    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Lectures "Informationstechnik: Computer" and "Hardware Security Module" of the module "IT-Sicherheit" on behalf of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).

  • Summer term 2016

    • Extercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier (Master CS).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier (Master CS).

  • Winter term 2015/16

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS, third semester).
    • Project group "IT-Sicherheit" of professor Dr. Michael Meier (Bachelor CS)
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2015

    • Lab "IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Lecture "IT Security": "Privacy & Pseudonymization", on behalf of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2014/15

    • Project group "IT Security" of professor Dr. Michael Meier.
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2014

    • Exercises to lecture "Reaktive Sicherheit" of professor Dr. Michael Meier (Bachelor CS, fourth semester).
    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Winter term 2013/14

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.

  • Summer term 2013

    • Seminar "Selected Topics in IT Security" of professor Dr. Michael Meier.
    • Exercises to lecture "Network Security" of Dr. Jens Tölle (Master CS), together with Dipl.-Inform. Rafael Uetz and M. Sc. Martin Lambertz.

  • Summer term 2010, as a student teaching assistant:

    • Exercises to lecture "Algorithmic Bioinformatics" of professor Dr. Holger Fröhlich (Master Life Science Informatics).

  • Winter term 2008/09, as a student teaching assistant:

    • Exercises to "Algorithmen und Berechnungskomplexität I" of professor Dr. Christian Sohler (Bachelor CS, third semester).
    • Exercises to "Angewandte Mathematik: Numerik und Stochastik" of professors Dr. Reinhard Klein and Dr. Michael Clausen.

At Hochschule Bonn-Rhein-Sieg (University of Applied Sciences):

  • Winter term 2012/13:

    • Exercises to lecture "Informationssicherheit" of professor Dr. Kerstin Lemke-Rust (Bachelor CS, third semester).
    • Exercises to lecture "Mathematische und physikalische Grundlagen der Informatik" of professor Dr. Kurt-Ulrich Witt.

  • Summer term 2012:

    • Lecture "Angewandte Kryptographie", deputy for professor Dr. Kerstin Lemke-Rust, together with Dipl-Ing. Timo Bartkewitz (Bachelor CS, fourth semester).
    • Exercises to lecture "Angewandte Kryptographie".

  • Winter term 2011/12:

    • "Einsteigerprojekt Informatik und Psychologie", course for introduction to scientific writing, reading and presenting (Bachelor CS, first semester).

  • Non regular:

    • SchülerKrypto 2014, Bonn-Aachen International Institute for Information Technology, February 2014.
    • Girls'Day 2013: Die Fraunhofer CyberCity, Bundeskanzleramt, Berlin. April 2013.

    • Girls'Day 2012: Ein kleines Fotoalbum mit HTML, Bonn-Rhein-Sieg University of Applied Sciences. April 2012.
    • SchülerKrypto 2010, Bonn-Aachen International Institute for Information Technology, February 2010.

 

 

Theses advised

  • Master theses:

    • Sebastian Karhoff: "Risk Assessment and Analysis of Pseudonymized Data". (finished, July 2020).
    • Daniel Meyer: "Utility-driven pseudonymization for a flexible survey platform". (finished, August 2020).
    • Markus Krämer: "Privacy-Preserving Clustering in the Pseudonimization Tool". (finished, August 2020).
    • Martin Wehner: "Utility-driven Requirement Description of Machine Learning Techniques". (finished, July 2019).
    • Mubashir Mehmood Qureshi: "Secure multiparty computation of the median in a star network". July 2018 (finished, at SAP research, Karlsruhe).
    • Manal Al-Akkad: "Data appearances for privacy-preserving data analysis". December 2016 (finished).

  • Bachelor theses:

    • Sebastian Karhoff: "Entwicklung von Ansätzen zur sicheren Addition auf homomorphen Chiffraten". June 2018. (finished).
    • Markus Krämer: "k-means-Clustering auf Chiffraten". November 2017. (finished).
    • Marcel Schubert: "Datenschutzfolgenabschätzung". September 2017. (finished).
    • Matthias Ulbrich: "Untersuchung der Anwendung homomorpher Kryptosysteme unter Berücksichtigung der unautorisierten Verformbarkeit von Chiffretexten". June 2017. (finished).
    • Daniel Meyer: "Ausgewählte Angriffe auf Pseudonymisierungen mit Verfügbarkeitsoptionen". June 2017. (finished).
    • Martin Wehner: "Ein Toolkit für die policybasierte Pseudonymisierung mit Verfügbarkeitsoptionen". December 2016 (finished).
    • Samim Faiz: "Untersuchung und Implementierung ausgewählter homomorpher hashing-Verfahren für die Integritätsprüfung homomorpher Chiffrate". December 2016 (finished).
    • Henning Braun: "Evaluierung ausgewählter homomorpher Kryptosysteme hinsichtlich ihrer Eignung für Pseudonymisierungszwecke". University of Bonn. 8/2015 - 1/2016 (finished).
    • Jacek Samotyja: "Side Channel Analysis of an AES Implementation on a SASEBO-GII Board". Bonn-Rhein-Sieg University of Applied Sciences, March 2012 (finished).

  • Seminar theses:

    • Phil-Tabeas Noack: "Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information". Summer semester 2019.
    • Sebastian Karhoff: "Order-Preserving Encryption: How To Store OPE-Encrypted Data?". Summer semester 2019.
    • Markus Krämer: "Order Preserving Encryption for Outsourced Databases"(Seminar Final Presentation). Winter semester 2018/19.
    • Daniel Meyer: "Secure & Privacy-Preserving k-Means Clustering"(Final Presentation Master Seminar). Summer semester 2018.
    • Tobias Hartmann: "Utility definitions for utility-preserving data transformations for privacy". Summer semester 2017.
    • Martin Wehner: "Pseudonymization frameworks". Winter semester 2016/17.
    • Viktor-Maurits Kaszian: "CryptDB". Summer semester 2016.
    • Johannes vom Dorp: "A short introduction to RFID-privacy". Winter semester 2014/15.
    • Ilya Manyugin: "Malware detection on instruction level using the Bag-of-words model". Summer semester 2014.

  • Lab reports:

    • Markus Krämer: "An Implementation of Kerschbaum's Order Preserving Encryption Scheme for Outsourced Data"(Final presentation Master Lab). Summer semester 2019.
    • Daniel Meyer: "A Comparison of Homomorphic Encryption Libraries"(Final presentation Master Lab). Summer semester 2019.
    • Martin Wehner: "An XML-based Policy Language for the Definition of Utility Policies"(Final Lab Presentation). Winter semester 2017/18.
    • Umair Tarafdar: "Evaluation of selected crypto libraries for utility and privacy"(Final Lab Presentation). Summer semester 2017.
    • Sergio Valmorisco Sierra: Pseudonyization Framework with Availability Options. Winter semester 2015/16.
    • Johannes vom Dorp: A Tool for the User-friendly Definition of Availability Policies of Pseudonymized Data in XACML. Summer semester 2015.

Reviewing Activities

Reviewer:

  • Annual Privacy Forum 2020.
  • Special Session "Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches", International Workshop on Digital-forensics and Watermarking (IWDW) 2017.

  • IEEE Security & Privacy, Special Issue "Digital Forensics" 2017.

Subreviewer:

  • ARES 2021
  • IFIP Sec 2016
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response 2015
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2015
  • IFIP Sec 2015
  • Local Computer Networks (LCN) 2014
  • DFN-Konferenz "Sicherheit in vernetzten Systemen" 2014
  • Cryptographic Hardware and Embedded Systems (CHES) 2013
  • Cryptographic Hardware and Embedded Systems (CHES) 2012