- Privacy-Preserving Technologies in Data
- Access Control and Trust
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
- Cryptography and Data Security
- Advanced Database Systems and Queries
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Digital and Cyber Forensics
- Blockchain Technology Applications and Security
- Data Quality and Management
- Peer-to-Peer Network Technologies
- Scientific Computing and Data Management
- Information and Cyber Security
- Data Management and Algorithms
- Mobile Crowdsensing and Crowdsourcing
- Caching and Content Delivery
- Security and Verification in Computing
- Internet Traffic Analysis and Secure E-voting
- Service-Oriented Architecture and Web Services
- Electronic Health Records Systems
- Web Data Mining and Analysis
- Cloud Computing and Resource Management
- Business Process Modeling and Analysis
- Complex Network Analysis Techniques
Gulf University for Science & Technology
2022
Global Young Academy
2020
University of Technology, Jamaica
2020
Ashland (United States)
2013-2018
Institute for Health Metrics and Evaluation
2016
IBM Research - Almaden
2007-2012
IBM (United States)
2005-2012
IBM Research - Thomas J. Watson Research Center
2011
Imperial College London
2000-2003
Imperial Valley College
2003
Trust is an important aspect of decision making for Internet applications and particularly influences the specification security policy, i.e., who authorized to perform actions as well techniques needed manage implement applications. This survey examines various definitions trust in literature provides a working definition The properties relationships are explained classes different types identified discussed with examples. Some influential examples management systems described.
During a public health crisis like the COVID-19 pandemic, credible and easy-to-access information portal is highly desirable. It helps with disease prevention, planning, misinformation mitigation. However, creating such an challenging because 1) domain expertise required to identify curate intelligible content, 2) needs be updated promptly in response fast-changing environment, 3) should easily accessible by general public; which particularly difficult when most people do not have about...
Databases are at the core of successful businesses. Due to voluminous stores personal data being held by companies today, preserving privacy has become a crucial requirement for operating business. This paper proposes how current relational database management systems can be transformed into their privacy-preserving equivalents. Specifically, we present language constructs and implementation design fine-grained access control achieve this goal.
Usability is the weakest link in security chain of many prominent applications. A set usability prin- ciples should therefore be considered when designing and engineering IT solutions. When improving us- ability existing applications, it necessary to examine underlying technologies used build them, consider whether they need replaced by to- tally new that provide a better basis for good usability. This paper examines principles, proposes how can incorporated into risk management process,...
Cloud computing has been endorsed by the IT community as new paradigm shift in industry that charts way forward. Unfortunately, field is still on its path to rigor and robustness. This epitomized numerous fuzzy articulations of "what cloud computing". paper makes a first attempt at remedying this conundrum providing core technical specification model for demonstrating how current future deployments can use foster more productive discussion future.
The U.S. government's vision of the health care information infrastructure is possible using technologies that support sharing medical e-records while maintaining patient privacy.
Computation . 433 21.7 Conclusion and Future Work 434 References 43521.1 Introduction The proliferation of social networks, online communities, peer-to-peer file sharing,and telecommunication systems has created large, complex graphs. These graphs are of significant interest to researchers in various application domains such as marketing, psychology, epidemiology. Research these areas revealed interesting properties the data presented efficient ways maintaining, mining, querying them....
Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These impose administrative financial burdens on companies manage information may hinder legitimate valuable sharing analysis this In paper we describe an integrated set technologies, known as Hippocratic Database (HDB), which enables compliance with security privacy regulations without impeding flow HDB's Control Center allows to specify fine-grained policies based...
Cloud computing log digital investigations relate to the investigation of a potential crime using forensic evidence from virtual machine (VM) host operating system hypervisor event logs. In cloud forensics, work on reconstruction VM hosts is required, but with heterogeneous complexity involved an enterprise's private not mention public distributed environments, possible Web Services-centric approach may be required for such supported investigations. A data forensics service oriented...
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class Internet applications called software. These systems focus on leveraging the real life relationships people augment them with facilities richness Web. large number even larger user populations these networks are proving that this software is useful complements modern life. However, platforms not without drawbacks significant concerns. One most important considerations need to allow strong...
The increase in the quantity and questionable quality of forensic information retrieved from current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses question what kind is desired virtual machine (VM) hosted operating systems (OS) investigated by a examiner. authors gives an overview that exists on VM OS looking at it's kernel hypervisor logs discusses shortcomings. An...
Corporate decision makers have normally been disconnected from the details of security management infrastructures their organizations. The resources has traditionally domain a small group skilled and technically savvy professionals, who report to executive team. As threats become more prevalent, attackers get smarter infrastructure required secure corporate assets complex, communication gap between implementers widened. risk misinterpretation strategy into technical safe controls also...
The interpretations of conditionals and condi- tional inference are often disputed. classic logic con- ditional called material implication can easily be proven to invalid, the conditional rule Modus Ponens reEresents a tautology that becomes invalid in face contrary evidence from realistic scenarios. foundations seem plagued with problems also unable realistically model causal relationships world around us. Now in- troduce concepts ignorance uncertainty into framework it seems get even...
Prevailing wisdom assumes that there are well-defined, effective and efficient methods for accessing Deep Web content. Unfortunately, a host of technical non-technical factors may call this assumption into question. In paper, we present the findings from work on software system, which was commissioned by British Broadcasting Corporation (BBC). The system requires stable periodic extraction content number online data sources. insight project brings an important issue to forefront under-scores...
Rising costs, decreasing quality of care, diminishing productivity, and increasing complexity have all contributed to the present state healthcare industry. The interactions between payers (e.g., insurance companies health plans) providers hospitals laboratories) are growing becoming more complicated. constant upsurge in enhanced diagnostic treatment information has made clinical decision-making process difficult. Medical transaction charges greater than ever. Population-specific financial...
Crowd computing leverages human input in order to execute tasks that are computationally expensive, due complexity and/or scale. Combined with automation, crowd can help solve problems efficiently and effectively. In this work, we introduce an elasticity framework adaptively optimi