Thibaud Antignac

ORCID: 0000-0003-0670-3439
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • User Authentication and Security Systems
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Advanced Malware Detection Techniques
  • Laser and Thermal Forming Techniques
  • Information and Cyber Security
  • Additive Manufacturing Materials and Processes
  • Outsourcing and Supply Chain Management
  • Advanced materials and composites
  • Elder Abuse and Neglect
  • Digital and Cyber Forensics
  • Advanced Surface Polishing Techniques
  • Laser Material Processing Techniques
  • Advanced ceramic materials synthesis
  • Digital Economy and Work Transformation
  • Adhesion, Friction, and Surface Interactions
  • Materials Engineering and Processing
  • Vehicular Ad Hoc Networks (VANETs)
  • Metallurgy and Material Forming

CEA LIST
2019-2022

Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2019-2022

University of Gothenburg
2016-2017

Chalmers University of Technology
2016-2017

Citigroup
2015

Institut national de recherche en informatique et en automatique
2014-2015

Université Claude Bernard Lyon 1
2014-2015

Institut National des Sciences Appliquées de Lyon
2014-2015

École Normale Supérieure Paris-Saclay
2010

Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software. However, technical plane, a profusion privacy-oriented guidelines approaches coexists, which provides partial solutions to overall problem aids engineers during different stages system development lifecycle. As result, find difficult understand what they should do make their abide by privacy design, thus hindering adoption...

10.1109/spw.2015.22 preprint EN 2015-05-01

In the selective laser melting process, one has to strike a balance between power and scan speed. When small speed is used, thermal gradients are important local solidification can lead cracks. On other hand, when high be huge phenomena due heat transfer, like delamination or balling, arise. this paper, we study different possible scanning strategies indicate those that homogeneous heating of part until its point. The results compared numerical simulations.

10.1080/17452751003688368 article EN Virtual and Physical Prototyping 2010-06-01

Due to the upcoming, more restrictive regulations (like European GDPR), designing privacy preserving architectures for information systems is becoming a pressing concern practitioners. In particular, verifying that design compliant with might be challenging task engineers. This work presents an approach based on model transformations, which guarantee architectural encompasses regulation-oriented principles such as purpose limitation, or accountability of data controller. Our improves state...

10.1109/eurospw.2018.00024 article EN 2018-04-01

Data minimisation is a privacy enhancing principle, stating that personal data collected should be no more than necessary for the specific purpose consented by user. Checking program satisfies principle not easy, even simple case when considering deterministic programs-as-functions. In this paper we prove (im)possibility results concerning runtime monitoring of (non-)minimality programs both has one input source (monolithic) and general inputs come from independent sources (distributed...

10.48550/arxiv.1801.02484 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Differential privacy enjoys increasing popularity thanks to both a precise semantics for and effective enforcement mechanisms. Many tools have been proposed spread its use ease the task of concerned data scientist. The most promising among them completely discharge user concerns by transparently taking care budget. However, their implementation proves be delicate, introduce flaws falsifying some theoretical assumptions made guarantee differential privacy. Moreover, such rely on leading...

10.1109/pst.2016.7906954 article EN 2016-12-01

In systems design, we generally distinguish the architecture and protocol levels. context of privacy by in first case, talk about architectures, which define goals main features system at high level. latter consider underlying concrete protocols enhancing technologies that implement architectures. this paper, address question whether a given conforms to provide answer based on formal methods. We propose process algebra variant reason properties, as well mapping procedure from architectures...

10.48550/arxiv.1501.03593 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Data minimisation is a privacy-enhancing principle considered as one of the pillars personal data regulations. This dictates that collected should be no more than necessary for specific purpose consented by user. In this paper we study from programming language perspective. We assume given program embodies collection, and define minimiser pre-processor input which reduces amount information available to without compromising its functionality. context formal definitions minimisation, present...

10.48550/arxiv.1611.05642 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Though controversial, surveillance activities are more and performed for security reasons. However, such extremely privacy-intrusive. This is seen as a necessary side-effect to ensure the success of operations. In this paper, we propose an accountability-aware protocol designed purposes. It relies on strong incentive organisation register its activity data protection authority. We first elicit list account-ability requirements, provide architecture showing interaction different involved...

10.1145/3019612.3019826 article EN 2017-04-03

Verifying how personal data is used in industrial applications of utmost importance for evaluating privacy. Existing works propose many definitions privacy and offer a wide variety approaches verifying properties. Yet, as far we know, there currently no generic setting allowing to model all these concepts, well express verify related properties, whilst taking into account the various abstraction levels involved when designing implementing computer system. This work proposes representation...

10.1109/eurospw55150.2022.00027 article EN 2022-06-01
Coming Soon ...