Tyrone Grandison

Orcid: 0000-0003-1989-3913

Affiliations:
  • IBM Almaden Research Center, San Jose, USA


According to our database1, Tyrone Grandison authored at least 66 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Powering an AI Chatbot with Expert Sourcing to Support Credible Health Information Access.
Proceedings of the 28th International Conference on Intelligent User Interfaces, 2023

2021
Reflecting on being black in computing.
Interactions, 2021

Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions.
Int. J. Netw. Manag., 2021

Reflections on black in computing.
Commun. ACM, 2021

2020
Envisioning a Cyber-Security Incident Managed Campus Environment.
Proceedings of the Second IEEE International Conference on Trust, 2020

2018
Intrusion Detection Technology.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Privacy-Preserving DBMSs.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

2016
Big Data Privacy Risk: Connecting Many Large Data Sets.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Security and Privacy on the Web [Guest editors' introduction].
IEEE Softw., 2015

Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015.
CoRR, 2015

2014
Security and Privacy in Web 2.0 [Guest editor's introduction].
IEEE Internet Comput., 2014

First international workshop on privacy and security in programming (PSP).
Proceedings of the SPLASH'14, 2014

Mobile Services for Enhancing Human Crowdsourcing with Computing Elements.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

Combining human and machine computing elements for analysis via crowdsourcing.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Increasing the accessibility to Big Data systems via a common services API.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain.
Int. J. Inf. Secur. Priv., 2013

Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud.
Proceedings of 2012 IEEE International Conference on Service Operations and Logistics, 2012

Recommendation-Based De-identification: A Practical Systems Approach towards De-identification of Unstructured Text in Healthcare.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Cloud Log Forensics Metadata Analysis.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Hippocratic Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Information technology for healthcare transformation.
IBM J. Res. Dev., 2011

A Privacy Reinforcement Approach against De-identified Dataset.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Regulatory Compliance and the Correlation to Privacy Protection in Healthcare.
Int. J. Comput. Model. Algorithms Medicine, 2010

Access control for smarter healthcare using policy spaces.
Comput. Secur., 2010

A Risk Management Framework for Health Care Data Anonymization.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Towards a Formal Definition of a Computing Cloud.
Proceedings of the 6th World Congress on Services, 2010

New access models for healthcare.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Healthcare Chains - Enabling Application and Data Privacy Controls for Healthcare Information Systems.
Proceedings of the MEDINFO 2010, 2010

HIPAA Compliance and Patient Privacy Protection.
Proceedings of the MEDINFO 2010, 2010

An evaluation of feature sets and sampling techniques for de-identification of medical records.
Proceedings of the ACM International Health Informatics Symposium, 2010

Simulating collaboration from multiple, potentially non-collaborative healthcare systems to create a single view of a patient.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Patient-Centric Privacy: Envisioning collaboration between payers, providers & patients with the patient at the core.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Intrusion Detection Technology.
Proceedings of the Encyclopedia of Database Systems, 2009

Sound index: charts for the people, by the people.
Commun. ACM, 2009

Highlighting Diverse Concepts in Documents.
Proceedings of the SIAM International Conference on Data Mining, 2009

Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Enabling Scaleable, Efficient, Non-visual Web Browsing Services.
Proceedings of the IEEE International Conference on Web Services, 2009

Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection.
Proceedings of the IEEE International Conference on Web Services, 2009

Change Detection and Correction Facilitation for Web Applications and Services.
Proceedings of the IEEE International Conference on Web Services, 2009

Enabling Privacy as a Fundamental Construct for Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2008
Hippocratic Databases: Current Capabilities and Future Trends.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

ManyAspects: a system for highlighting diverse concepts in documents.
Proc. VLDB Endow., 2008

Accessing the deep web: when good ideas go bad.
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

Privacy-Preserving Data Analysis on Graphs and Social Networks.
Proceedings of the Next Generation of Data Mining., 2008

2007
Compliance with data protection laws using Hippocratic Database active enforcement and auditing.
IBM Syst. J., 2007

Enabling the 21st century health care information technology revolution.
Commun. ACM, 2007

Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Ïnfïnïty: a generic platform for application development and information sharing on mobile devices.
Proceedings of the Sixth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2007

Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

Formalizing Trust-based Decision Making in Electronic Commerce Transactions.
Proceedings of the First International Workshop on Combining Context with Trust, 2007

Elevating the Discussion on Security Management: The Data Centric Paradigm.
Proceedings of BDIM 2007, 2007

Security Usability Principles for Vulnerability Analysis and Risk Assessment.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Discovery Services-Enabling RFID Traceability in EPCglobal Networks.
Proceedings of the 13th International Conference on Management of Data, 2006

2005
Extending Relational Database Systems to Automatically Enforce Privacy Policies.
Proceedings of the 21st International Conference on Data Engineering, 2005

2003
Trust Management Tools for Internet Applications.
Proceedings of the Trust Management, First International Conference, 2003

2002
Specifying and Analysing Trust for Internet Applications.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

2000
A Survey of Trust in Internet Applications.
IEEE Commun. Surv. Tutorials, 2000


  Loading...