Tyrone Grandison

ORCID: 0000-0003-1989-3913
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection
  • Cryptography and Data Security
  • Advanced Database Systems and Queries
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Blockchain Technology Applications and Security
  • Data Quality and Management
  • Peer-to-Peer Network Technologies
  • Scientific Computing and Data Management
  • Information and Cyber Security
  • Data Management and Algorithms
  • Mobile Crowdsensing and Crowdsourcing
  • Caching and Content Delivery
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Service-Oriented Architecture and Web Services
  • Electronic Health Records Systems
  • Web Data Mining and Analysis
  • Cloud Computing and Resource Management
  • Business Process Modeling and Analysis
  • Complex Network Analysis Techniques

Gulf University for Science & Technology
2022

Global Young Academy
2020

University of Technology, Jamaica
2020

Ashland (United States)
2013-2018

Institute for Health Metrics and Evaluation
2016

IBM Research - Almaden
2007-2012

IBM (United States)
2005-2012

IBM Research - Thomas J. Watson Research Center
2011

Imperial College London
2000-2003

Imperial Valley College
2003

Trust is an important aspect of decision making for Internet applications and particularly influences the specification security policy, i.e., who authorized to perform actions as well techniques needed manage implement applications. This survey examines various definitions trust in literature provides a working definition The properties relationships are explained classes different types identified discussed with examples. Some influential examples management systems described.

10.1109/comst.2000.5340804 article EN IEEE Communications Surveys & Tutorials 2000-01-01

During a public health crisis like the COVID-19 pandemic, credible and easy-to-access information portal is highly desirable. It helps with disease prevention, planning, misinformation mitigation. However, creating such an challenging because 1) domain expertise required to identify curate intelligible content, 2) needs be updated promptly in response fast-changing environment, 3) should easily accessible by general public; which particularly difficult when most people do not have about...

10.1145/3581641.3584031 article EN 2023-03-27

Databases are at the core of successful businesses. Due to voluminous stores personal data being held by companies today, preserving privacy has become a crucial requirement for operating business. This paper proposes how current relational database management systems can be transformed into their privacy-preserving equivalents. Specifically, we present language constructs and implementation design fine-grained access control achieve this goal.

10.1109/icde.2005.64 article EN 2005-04-19

Usability is the weakest link in security chain of many prominent applications. A set usability prin- ciples should therefore be considered when designing and engineering IT solutions. When improving us- ability existing applications, it necessary to examine underlying technologies used build them, consider whether they need replaced by to- tally new that provide a better basis for good usability. This paper examines principles, proposes how can incorporated into risk management process,...

10.1109/acsac.2007.14 article EN 2007-12-01

Cloud computing has been endorsed by the IT community as new paradigm shift in industry that charts way forward. Unfortunately, field is still on its path to rigor and robustness. This epitomized numerous fuzzy articulations of "what cloud computing". paper makes a first attempt at remedying this conundrum providing core technical specification model for demonstrating how current future deployments can use foster more productive discussion future.

10.1109/services.2010.111 article EN 2010-07-01

The U.S. government's vision of the health care information infrastructure is possible using technologies that support sharing medical e-records while maintaining patient privacy.

10.1145/1216016.1216018 article EN Communications of the ACM 2007-02-01

Computation . 433 21.7 Conclusion and Future Work 434 References 43521.1 Introduction The proliferation of social networks, online communities, peer-to-peer file sharing,and telecommunication systems has created large, complex graphs. These graphs are of significant interest to researchers in various application domains such as marketing, psychology, epidemiology. Research these areas revealed interesting properties the data presented efficient ways maintaining, mining, querying them....

10.1201/9781420085877-31 article EN 2008-12-24

Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These impose administrative financial burdens on companies manage information may hinder legitimate valuable sharing analysis this In paper we describe an integrated set technologies, known as Hippocratic Database (HDB), which enables compliance with security privacy regulations without impeding flow HDB's Control Center allows to specify fine-grained policies based...

10.1147/sj.462.0255 article EN IBM Systems Journal 2007-01-01

Cloud computing log digital investigations relate to the investigation of a potential crime using forensic evidence from virtual machine (VM) host operating system hypervisor event logs. In cloud forensics, work on reconstruction VM hosts is required, but with heterogeneous complexity involved an enterprise's private not mention public distributed environments, possible Web Services-centric approach may be required for such supported investigations. A data forensics service oriented...

10.1109/services.2013.76 article EN 2013-06-01

The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class Internet applications called software. These systems focus on leveraging the real life relationships people augment them with facilities richness Web. large number even larger user populations these networks are proving that this software is useful complements modern life. However, platforms not without drawbacks significant concerns. One most important considerations need to allow strong...

10.1109/cse.2009.431 article EN 2009-01-01

The increase in the quantity and questionable quality of forensic information retrieved from current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses question what kind is desired virtual machine (VM) hosted operating systems (OS) investigated by a examiner. authors gives an overview that exists on VM OS looking at it's kernel hypervisor logs discusses shortcomings. An...

10.1109/compsacw.2012.44 article EN 2012-07-01

Corporate decision makers have normally been disconnected from the details of security management infrastructures their organizations. The resources has traditionally domain a small group skilled and technically savvy professionals, who report to executive team. As threats become more prevalent, attackers get smarter infrastructure required secure corporate assets complex, communication gap between implementers widened. risk misinterpretation strategy into technical safe controls also...

10.1109/bdim.2007.375015 article EN 2007-05-01

The interpretations of conditionals and condi- tional inference are often disputed. classic logic con- ditional called material implication can easily be proven to invalid, the conditional rule Modus Ponens reEresents a tautology that becomes invalid in face contrary evidence from realistic scenarios. foundations seem plagued with problems also unable realistically model causal relationships world around us. Now in- troduce concepts ignorance uncertainty into framework it seems get even...

10.1109/icif.2003.177484 article EN 2003-01-01

Prevailing wisdom assumes that there are well-defined, effective and efficient methods for accessing Deep Web content. Unfortunately, a host of technical non-technical factors may call this assumption into question. In paper, we present the findings from work on software system, which was commissioned by British Broadcasting Corporation (BBC). The system requires stable periodic extraction content number online data sources. insight project brings an important issue to forefront under-scores...

10.1145/1449814.1449871 article EN 2008-10-19

Rising costs, decreasing quality of care, diminishing productivity, and increasing complexity have all contributed to the present state healthcare industry. The interactions between payers (e.g., insurance companies health plans) providers hospitals laboratories) are growing becoming more complicated. constant upsurge in enhanced diagnostic treatment information has made clinical decision-making process difficult. Medical transaction charges greater than ever. Population-specific financial...

10.1147/jrd.2011.2160684 article EN IBM Journal of Research and Development 2011-09-01

Crowd computing leverages human input in order to execute tasks that are computationally expensive, due complexity and/or scale. Combined with automation, crowd can help solve problems efficiently and effectively. In this work, we introduce an elasticity framework adaptively optimi

10.4108/icst.collaboratecom.2014.257298 article EN 2014-01-01
Coming Soon ...