Faculty Details
Sourya Joyee De
Designation
Asst. Professor
Post Doc (INRIA Lyon & Universite de Lyon, France), Fellow (IIM Calcutta), B.E.(Bengal Engineering and Science University, Shibpur)
Information Systems
Contact Information
souryajoyee@iimraipur.ac.in
ii. Post doctorant (2015 - 2017), Team PRIVATICS, INRIA Lyon & Universite de Lyon, France
iii. Visiting Scientist (2014 – 2015), Indian Statistical Institute, Kolkata, India
Books
>> Sourya Joyee De, Daniel le Metayer(2016). Privacy Risk Analysis. Morgan & Claypool Publishers.
Journal Publications
>> De, S. J., & Imine, A.(2020). Consent for targeted advertising: the case of Facebook. [AI & Society], ,
>> De, S. J., & Shukla, R.(2020). Privacy policies of e‐governance initiatives: Evidence from India. [Journal of Public Affairs], ,
>> Sourya Joyee De, Sushmita Ruj(2017). Efficient Decentralized Attribute Based Access Control for Mobile Clouds. [IEEE Transactions on Cloud Computing (TCC) (Impact factor: 7.928)], ,
>> Arpita Maitra, Sourya Joyee De, Goutam Paul, Asim Kumar Pal(2015). A Proposal for Quantum Rational Secret Sharing. [Physical Review A, 92, 022305. (Impact Factor: 2.925)], ,
Conference Papers
>> (2018). To Reveal or Not to Reveal: Balancing User-Centric Social Benefit and Privacy in Online Social Networks. 33rd ACM Symposium on Applied Computing (SAC'18). ACM.
>> De, S. J., & Imine, A.(2018). Enabling Users to Balance Social Benefit and Privacy in Online Social Networks. 16th Annual Conference on Privacy, Security and Trust (PST'18). IEEE.
>> De, S. J., & Imine, A. (2018)(2018). On Consent in Online Social Networks: Privacy Impacts and Research Directions. 13th International Conference on Risks andSecurity of Internet and Systems (CRiSIS'18). Springer
>> De, S. J., & Le Metayer, D.(2018). Privacy Risk Analysis to Enable Informed Privacy Settings. International Workshop on Privacy Engineering (IWPE'18)
>> De, S. J., & Imine, A.(2017). Privacy Scoring of Social Network User Profiles through Risk Analysis. 12th International Conference on Risks and Security of Internet and Systems (CRiSIS'17)
>> De, S. J., & Le Metayer, D.(2017). A Refinement Approach for the Reuse of Privacy Risk Analysis Results. Privacy Technologies and Policy - 5th Annual Privacy Forum (APF'17), Vienna, Austria: Springer
>> De, S. J., & Le Metayer, D.(2016). PRIAM: A Privacy Risk Analysis Methodology. 11th International Workshop on Data Privacy Management (DPM'16), Heraklion, Crete, Greece: Springer
>> De, S. J., & Le Metayer, D.(2016). Privacy Harm Analysis: A Case Study on Smart Grids. International Workshop on Privacy Engineering (IWPE'16), IEEE, San Jose, United States
>> De, S. J., & Ruj, S.(2016). Failure Tolerant Rational Secret Sharing. The 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016) (pp. 925-932). Le Régent Congress Centre, Crans-Montana, Switzerland
>> De, S. J., & Ruj, S.(2015). Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption. 2015 IEEE Global Communications Conference (GLOBECOM'15) (pp. 1-6). IEEE
>> De, S. J., & Pal, A. K.(2014). A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud. 47th Hawaii International Conference on System Sciences (HICSS'14) (pp. 4986- 4997). IEEE.
>> De, S. J., Ruj, S., & Pal, A. K.(2014). Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-Silent Players. 13th International Conference on Cryptology and Network Security (CANS'14) (pp. 240-255). Switzerland: Springer International Publishing
>> Ghosh, A., De, S. J., & Mahanti, A.(2014). A Mobile Banking Model in the Cloud for Financial Inclusion in India. ACM SIGDOC Conference, Colorado Springs, CO, USA
>> De, S. J., & Pal, A. K.(2013). Achieving Correctness in Fair Rational Secret Sharing. 12th International Conference on Cryptology and Network Security 2013 (CANS'13) (pp.139-161). Switzerland: Springer International Publishing
>> De, S. J., & Pal, A. K.(2013). Auctions with Rational Adversary. 9th International Conference on Information System Security (ICISS'13) (pp. 91-105). Springer-Verlag Berlin Heidelberg
>> De, S. J., Saha, S., & Pal, A. K.(2013). Achieving Energy Efficiency and Security in Mobile Cloud Computing. 3rd International Conference on Cloud Computing and Services Sciences (CLOSER'13) (pp. 469-474). SciTePress
>> Ghosh, A., De, S. J., & Mahanti, A.(2013). Cloud-based Privacy Aware Preference Aggregation Service. Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, Regensburg, Germany
ii. Co-Program Director and Co-Instructor, Business Management in Digital Economy (e-learning course for working executives)