default search action
Tyrone Grandison
Person information
- affiliation: IBM Almaden Research Center, San Jose, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j14]Quincy Brown, Tyrone Grandison, Jamika D. Burge, Odest Chadwicke Jenkins, Tawanna Dillahunt:
Reflections on black in computing. Commun. ACM 64(4): 23-24 (2021) - [j13]Weizhi Meng, Piotr Cofta, Tyrone W. A. Grandison:
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions. Int. J. Netw. Manag. 31(2) (2021) - [j12]Quincy Brown, Tyrone Grandison, Odest Chadwicke Jenkins, Jamika D. Burge, Tawanna Dillahunt, Jakita Owensby Thomas, Sheena Erete, Yolanda A. Rankin:
Reflecting on being black in computing. Interactions 28(5): 34-37 (2021) - 2015
- [j11]Tyrone Grandison, Larry Koved:
Security and Privacy on the Web [Guest editors' introduction]. IEEE Softw. 32(4): 36-39 (2015) - 2014
- [j10]Tyrone Grandison:
Security and Privacy in Web 2.0 [Guest editor's introduction]. IEEE Internet Comput. 18(6): 41-42 (2014) - 2013
- [j9]Esraa Omran, Tyrone Grandison, David Nelson, Albert Bokma:
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain. Int. J. Inf. Secur. Priv. 7(3): 36-52 (2013) - 2011
- [j8]Joseph P. Bigus, Murray Campbell, Boaz Carmeli, Melissa Cefkin, Henry Chang, Ching-Hua Chen-Ritzo, William F. Cody, Shahram Ebadollahi, Alexandre V. Evfimievski, Ariel Farkash, Susanne Glissmann, David Gotz, Tyrone Grandison, Daniel Gruhl, Peter J. Haas, Mark J. H. Hsiao, Pei-Yun Sabrina Hsueh, Jianying Hu, Joseph M. Jasinski, James H. Kaufman, Cheryl A. Kieliszewski, Martin S. Kohn, Sarah E. Knoop, Paul P. Maglio, Ronald L. Mak, Haim Nelken, Chalapathy Neti, Hani Neuvirth, Yue Pan, Yardena Peres, Sreeram Ramakrishnan, Michal Rosen-Zvi, Sondra R. Renly, Pat Selinger, Amnon Shabo, Robert Sorrentino, Jimeng Sun, Tanveer Fathima Syeda-Mahmood, Wang Chiew Tan, Ying Y. Y. Tao, Reza Yaesoubi, Xinxin Zhu:
Information technology for healthcare transformation. IBM J. Res. Dev. 55(5): 6 (2011) - 2010
- [j7]Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Access control for smarter healthcare using policy spaces. Comput. Secur. 29(8): 848-858 (2010) - [j6]Tyrone Grandison, Rafae Bhatti:
Regulatory Compliance and the Correlation to Privacy Protection in Healthcare. Int. J. Comput. Model. Algorithms Medicine 1(2): 37-52 (2010) - 2009
- [j5]Varun Bhagwan, Tyrone Grandison, Daniel Gruhl:
Sound index: charts for the people, by the people. Commun. ACM 52(9): 64-70 (2009) - 2008
- [j4]Kun Liu, Evimaria Terzi, Tyrone Grandison:
ManyAspects: a system for highlighting diverse concepts in documents. Proc. VLDB Endow. 1(2): 1444-1447 (2008) - 2007
- [j3]Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Enabling the 21st century health care information technology revolution. Commun. ACM 50(2): 34-42 (2007) - [j2]Christopher M. Johnson, Tyrone Grandison:
Compliance with data protection laws using Hippocratic Database active enforcement and auditing. IBM Syst. J. 46(2): 255-264 (2007) - 2000
- [j1]Tyrone Grandison, Morris Sloman:
A Survey of Trust in Internet Applications. IEEE Commun. Surv. Tutorials 3(4): 2-16 (2000)
Conference and Workshop Papers
- 2023
- [c45]Ziang Xiao, Q. Vera Liao, Michelle X. Zhou, Tyrone Grandison, Yunyao Li:
Powering an AI Chatbot with Expert Sourcing to Support Credible Health Information Access. IUI 2023: 2-18 - 2020
- [c44]Sean S. E. Thorpe, Julian Jarrett, Tyrone Grandison:
Envisioning a Cyber-Security Incident Managed Campus Environment. TPS-ISA 2020: 307-309 - 2016
- [c43]Star Ying, Tyrone Grandison:
Big Data Privacy Risk: Connecting Many Large Data Sets. CIC 2016: 86-91 - 2014
- [c42]Rohan Malcolm, Cherrelle Morrison, Tyrone Grandison, Sean S. E. Thorpe, Kimron Christie, Akim Wallace, Damian Green, Julian Jarrett, Arnett Campbell:
Increasing the accessibility to Big Data systems via a common services API. IEEE BigData 2014: 883-892 - [c41]Julian Jarrett, Iman Saleh, M. Brian Blake, Rohan Malcolm, Sean S. E. Thorpe, Tyrone Grandison:
Combining human and machine computing elements for analysis via crowdsourcing. CollaborateCom 2014: 312-321 - [c40]Julian Jarrett, Iman Saleh, M. Brian Blake, Sean S. E. Thorpe, Tyrone Grandison, Rohan Malcolm:
Mobile Services for Enhancing Human Crowdsourcing with Computing Elements. IEEE MS 2014: 149-152 - [c39]Tyrone Grandison, E. Michael Maximilien, Raquel L. Hill:
First international workshop on privacy and security in programming (PSP). SPLASH (Companion Volume) 2014: 83-84 - 2013
- [c38]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations. DBSec 2013: 97-112 - [c37]Sean S. E. Thorpe, Tyrone Grandison, Arnett Campbell, Janet Williams, Khalilah Burrell, Indrajit Ray:
Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs. SERVICES 2013: 75-83 - [c36]Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth:
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems. SERVICES 2013: 290-297 - 2012
- [c35]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir:
Cloud Log Forensics Metadata Analysis. COMPSAC Workshops 2012: 194-199 - [c34]Sean S. E. Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir:
Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. Secure Data Management 2012: 156-161 - [c33]Varun Bhagwan, Tyrone Grandison, Carlos Maltzahn:
Recommendation-Based De-identification: A Practical Systems Approach towards De-identification of Unstructured Text in Healthcare. SERVICES 2012: 155-162 - [c32]Pei-Yun Sabrina Hsueh, Tyrone Grandison, Liangzhao Zeng, Xinxin (Katie) Zhu, Ci-Wei Lan, Jen-Hao Hsiao, Henry Chang, Hao-Ting Pai:
Privacy protection for personal data integration and sharing in care coordination services: A case study on wellness cloud. SOLI 2012: 111-116 - 2011
- [c31]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. CISIS 2011: 259-264 - [c30]Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison:
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. CISIS 2011: 265-271 - [c29]Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. ICDF2C 2011: 156-171 - [c28]Chi-Wei Lan, Yi-Hui Chen, Tyrone Grandison, Angus F. M. Huang, Jen-Yao Chung, Li-Feng Tseng:
A Privacy Reinforcement Approach against De-identified Dataset. ICEBE 2011: 370-375 - 2010
- [c27]T. W. A. Grandison:
Patient-Centric Privacy: Envisioning collaboration between payers, providers & patients with the patient at the core. CollaborateCom 2010: 1-5 - [c26]T. W. A. Grandison, Varun Bhagwan, Daniel Gruhl:
Simulating collaboration from multiple, potentially non-collaborative healthcare systems to create a single view of a patient. CollaborateCom 2010: 1-6 - [c25]James J. Gardner, Li Xiong, Fusheng Wang, Andrew R. Post, Joel H. Saltz, Tyrone Grandison:
An evaluation of feature sets and sampling techniques for de-identification of medical records. IHI 2010: 183-190 - [c24]Esraa Omran, Tyrone Grandison, Shereef Abu Al-Maati:
Healthcare Chains - Enabling Application and Data Privacy Controls for Healthcare Information Systems. MedInfo 2010: 879-883 - [c23]Tyrone Grandison, Rafae Bhatti:
HIPAA Compliance and Patient Privacy Protection. MedInfo 2010: 884-888 - [c22]Tyrone Grandison:
New access models for healthcare. SACMAT 2010: 1-2 - [c21]Tyrone Grandison, E. Michael Maximilien, Sean S. E. Thorpe, Alfredo Alba:
Towards a Formal Definition of a Computing Cloud. SERVICES 2010: 191-192 - [c20]Tyrone Grandison, Murat Kantarcioglu:
A Risk Management Framework for Health Care Data Anonymization. HealthSec 2010 - 2009
- [c19]Varun Bhagwan, Tyrone Grandison, Alfredo Alba, Daniel Gruhl, Jan Pieper:
MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction. IEEE CLOUD 2009: 214-220 - [c18]E. Michael Maximilien, Tyrone Grandison, Kun Liu, Tony Sun, Dwayne Richardson, Sherry Guo:
Enabling Privacy as a Fundamental Construct for Social Networks. CSE (4) 2009: 1015-1020 - [c17]Alfredo Alba, Varun Bhagwan, Tyrone Grandison, Daniel Gruhl, Jan Pieper:
Change Detection and Correction Facilitation for Web Applications and Services. ICWS 2009: 1012-1013 - [c16]Varun Bhagwan, Tyrone Grandison:
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection. ICWS 2009: 1014-1015 - [c15]Ashish Verma, Tyrone Grandison, Himanshu Chauhan:
Enabling Scaleable, Efficient, Non-visual Web Browsing Services. ICWS 2009: 1037-1038 - [c14]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Evimaria Terzi, Tyrone Grandison:
Efficient Privacy-Preserving Link Discovery. PAKDD 2009: 16-27 - [c13]Kun Liu, Evimaria Terzi, Tyrone Grandison:
Highlighting Diverse Concepts in Documents. SDM 2009: 545-556 - 2008
- [c12]Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Regulating Exceptions in Healthcare Using Policy Spaces. DBSec 2008: 254-267 - [c11]Alfredo Alba, Varun Bhagwan, Tyrone Grandison:
Accessing the deep web: when good ideas go bad. OOPSLA Companion 2008: 815-818 - 2007
- [c10]Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara:
Security Usability Principles for Vulnerability Analysis and Risk Assessment. ACSAC 2007: 269-278 - [c9]Tyrone Grandison, Marcel Bilger, L. O'Connor, Marcel Graf, Morton Swimmer, Matthias Schunter, Andreas Wespi, Nev Zunic:
Elevating the Discussion on Security Management: The Data Centric Paradigm. BDIM 2007: 84-93 - [c8]Tyrone Grandison, Han Reichgelt:
Formalizing Trust-based Decision Making in Electronic Commerce Transactions. CAT@IFIPTM 2007 - [c7]Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Braun, James H. Kaufman:
Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities. MedInfo 2007: 483-487 - [c6]Alvin Cheung, Tyrone Grandison, Christopher M. Johnson, Stefan Schönauer:
Ïnfïnïty: a generic platform for application development and information sharing on mobile devices. MobiDE 2007: 25-32 - [c5]Rafae Bhatti, Tyrone Grandison:
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. Secure Data Management 2007: 158-173 - 2006
- [c4]Steve Beier, Tyrone Grandison, Karin Kailing, Ralf Rantzau:
Discovery Services-Enabling RFID Traceability in EPCglobal Networks. COMAD 2006: 214-217 - 2005
- [c3]Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry Kiernan, Scott Logan, Walid Rjaibi:
Extending Relational Database Systems to Automatically Enforce Privacy Policies. ICDE 2005: 1013-1022 - 2003
- [c2]Tyrone Grandison, Morris Sloman:
Trust Management Tools for Internet Applications. iTrust 2003: 91-107 - 2002
- [c1]Tyrone Grandison, Morris Sloman:
Specifying and Analysing Trust for Internet Applications. I3E 2002: 145-157
Parts in Books or Collections
- 2008
- [p2]Kun Liu, Kamalika Das, Tyrone Grandison, Hillol Kargupta:
Privacy-Preserving Data Analysis on Graphs and Social Networks. Next Generation of Data Mining 2008 - [p1]Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Hippocratic Databases: Current Capabilities and Future Trends. Handbook of Database Security 2008: 409-429
Editorship
- 2019
- [e2]Weizhi Meng, Piotr Cofta, Christian Damsgaard Jensen, Tyrone Grandison:
Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings. IFIP Advances in Information and Communication Technology 563, Springer 2019, ISBN 978-3-030-33715-5 [contents] - 2014
- [e1]Tyrone Grandison, Raquel L. Hill, E. Michael Maximilien:
Proceedings of the 2014 International Workshop on Privacy & Security in Programming, Portland, OR, USA, October 21, 2014. ACM 2014, ISBN 978-1-4503-2296-6 [contents]
Reference Works
- 2018
- [r4]Tyrone Grandison:
Privacy-Preserving DBMSs. Encyclopedia of Database Systems (2nd ed.) 2018 - [r3]Tyrone Grandison, Evimaria Terzi:
Intrusion Detection Technology. Encyclopedia of Database Systems (2nd ed.) 2018 - 2011
- [r2]Tyrone Grandison, Kristen LeFevre:
Hippocratic Database. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 556-559 - 2009
- [r1]Tyrone Grandison, Evimaria Terzi:
Intrusion Detection Technology. Encyclopedia of Database Systems 2009: 1568-1570
Informal and Other Publications
- 2023
- [i2]Ziang Xiao, Q. Vera Liao, Michelle X. Zhou, Tyrone Grandison, Yunyao Li:
Powering an AI Chatbot with Expert Sourcing to Support Credible Health Information Access. CoRR abs/2301.10710 (2023) - 2015
- [i1]Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean S. E. Thorpe:
Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015. CoRR abs/1506.06791 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint