Patrice Darmon

Patrice Darmon
umanis · Research & Innovation

Research & Innovation Director

About

27
Publications
3,638
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Citations since 2016
27 Research Items
58 Citations
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520

Publications

Publications (27)
Conference Paper
Full-text available
Afin d’améliorer la protection de données personnelles dans les lacs de données, nous proposons un méta-modèle qui comprend plusieurs aspects de privacy. Notre méta-modèle permet de décrire les contraintes nécessaires pour l’implémentation des procédures de protection de données personnelles (pseudonymisation/anonymisation). Il permet également de...
Preprint
Full-text available
Today with Big Data and data lakes, we are faced of a mass of data that is very difficult to manage it manually. The protection of personal data in this context requires an automatic analysis for data discovery. Storing the names of attributes already analyzed in a knowledge base could optimize this automatic discovery. To have a better knowledge b...
Research Proposal
Full-text available
Avec le Big Data et les lacs de données d'aujourd'hui, nous sommes en face d'une masse de données difficile à gérer manuellement. La protection de données personnelles dans ce contexte nécessite donc une analyse automatique pour la découverte des données. Un stockage dans une base de connaissances des noms des attributs déjà analysés pourrait optim...
Chapter
Recently, container technology is gaining increasing attention and has become an alternative to the traditional virtual machines artifact. The technology is used to deploy large-scale applications in several areas such as Big Data, AI, and High-Performance Computing (HPC). In the HPC field, several management tools exist as Slurm in one hand. On th...
Chapter
Although fuzzy-based recommendation systems are widely used in several services, scanty efforts have been carried out to investigate the efficiency of such approaches in job recommendation applications. In fact, most of the existing fuzzy-based job recommendation systems are only considering two crisp criteria: Curriculum Vitae (CV) content and job...
Conference Paper
Full-text available
Ce papier présente une nouvelle implémentation des méthodes de protection des données à caractère personnel basées sur des algorithmes de chiffre-ment et de généralisation spécifiques mis en oeuvre dans des plugins Logstash. Notre algorithme de chiffrement est adapté aux données personnelles en consi-dérant les différentes catégories : identifiants...
Preprint
Full-text available
Ce papier présente une nouvelle implémentation des méthodes de protection des données à caractère personnel basées sur des algorithmes de chiffre-ment et de généralisation spécifiques mis en œuvre dans des plugins Logstash. Notre algorithme de chiffrement est adapté aux données personnelles en considérant les différentes catégories : identifiants,...
Chapter
This paper presents an accelerated Promethee (Preference Ranking Organization METHod for Enrichment Evaluations) multi-criteria algorithm based on dimensionality reduction in large scale environments. In our context, the Promethee algorithm is used to select from a large set of objects, one or a small set of objects with a good compromise between s...
Chapter
Full-text available
Mapping personal data in the process for de-identification is always a prerequisite. Today with the big data, we are obliged to automate the data discovery step in this process. That avoids time-consuming, increases the accuracy of detection and allow to ensure confidentiality. For all these reasons we have proposed a new approach to automate detec...
Conference Paper
Personal data governance is became a key issue within organisations. This is mainly due to (i) the strategic value of personal data which provide more insights improving commercial and operational efficiency ; and (ii) data security risk issues and privacy regulation restrictions (e.g., GDPR and CCPA). Creating data catalogs is an important step f...
Chapter
Containers are increasingly gaining popularity and are going to be a major deployment model in cloud computing. However, consolidation technique is also used extensively in the cloud context to optimize resources utilization and reduce the power consumption. In this paper, we present a new containers scheduling consolidation approach for cloud comp...
Chapter
Recently, containers have been used extensively in the cloud computing field, and several frameworks have been proposed to schedule containers using a scheduling strategy. The main idea of the different scheduling strategies consist to select the most suitable node, from a set of nodes that forms the cloud platform, to execute each new submitted co...
Preprint
Full-text available
Mapping personal data in the process for de-identification is always a prerequisite. Today with the big data, we are obliged to automate the data discovery step in this process. That avoids time-consuming, increases the accuracy of detection and allow to ensure confidentiality. For all these reasons we have proposed a new approach to automate detec...
Conference Paper
Full-text available
Cartographier les données à caractère personnel dans la démarche de la de-identification est toujours un vrai pré-requis. Aujourd'hui avec les bases de données de grandes masses, nous sommes dans l'obligation d'automatiser l'étape de la détection dans cette démarche. Ce qui permet d'éviter les étapes chronophages, d'augmenter la précision de la dét...
Article
Assurer la conformité au règlement général sur la protection des données (RGPD) passe par la mise en place de la protection de la vie privée dès la conception des processus métiers des organisations (privacy by design). Il est par conséquent nécessaire de prendre en compte les contraintes liées à l'usage des données à caractère personnel dans le pl...
Chapter
Full-text available
Multifunction OLAP allows to associate several types of aggregation functions to the same measure: general, dimensional for each analysis axis, hierarchical for each hierarchy and differentiated for each granularity level. These functions are generally non-commutative, so, an execution order between the functions is predefined. Pivot tables and sev...
Conference Paper
Recently blockchain technology has attracted increasing attention. It provides a distributed peer-to-peer network. It also allows to enlarge the contracting space using smart contracts. Smart contract is a numeric protocol which define a promises between parties. In a blockchain platform, we can find millions of smart contracts which are created by...
Conference Paper
Full-text available
Dans le contexte d'OLAP multifonctions, le modèle conceptuel de l'entrepôt de données permet d'associer à une même mesure, une fonction d'agrégation différente pour chaque axe d'analyse, chaque hiérarchie et chaque niveau de granularité. Un système OLAP permet d'analyser les données multidimensionnelles interactivement à l'aide de tableaux croisés...
Conference Paper
For companies, the need to efficiently deal with vast amounts of integrated multi-source data is becoming crucial. Core concerns are 1) proper and flexible human resources management approaches, for 2) more effective resource allocation, as well as 3) team staffing. We here propose to address the talent search problem. Our approach is based on prof...
Conference Paper
Teambuilder is a prototype of a recommendation engine based on a Big Human Resources Data platform, allowing to securely retrieve the best candidates (resume) for a specific mission.
Conference Paper
Teambuilder is a prototype of a recommendation engine-based Big Human Resources Data platform, allowing to securely retrieve the best candidates (resume) for a specific mission

Network

Cited By

Projects

Projects (3)
Project
A project to study Anonymization techniques