39Cloud Log Forensics Metadata Analysis. Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison, Abbie Barbir. COMPSAC Workshops 2012, 194-199. Web SearchBibTeXDownload
38Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. Sean S. E. Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir. Secure Data Management 2012, 156-161. Web SearchBibTeXDownload
37Recommendation-Based De-identification: A Practical Systems Approach towards De-identification of Unstructured Text in Healthcare. Varun Bhagwan, Tyrone Grandison, Carlos Maltzahn. SERVICES 2012, 155-162. Web SearchBibTeXDownload
36Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison. CISIS 2011, 265-271. Web SearchBibTeXDownload
35Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs. Sean S. E. Thorpe, Indrajit Ray, Tyrone Grandison. CISIS 2011, 259-264. Web SearchBibTeXDownload
34Hippocratic Database. Tyrone Grandison, Kristen LeFevre. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 556-559. Web SearchBibTeXDownload
33Information technology for healthcare transformation. Joseph P. Bigus, Murray Campbell, Boaz Carmeli, Melissa Cefkin, Henry Chang, Ching-Hua Chen-Ritzo, William F. Cody, Shahram Ebadollahi, Alexandre V. Evfimievski, Ariel Farkash, Susanne Glissmann, David Gotz, Tyrone Grandison, Daniel Gruhl, Peter J. Haas, Mark J. H. Hsiao, Pei-Yun Sabrina Hsueh, Jianying Hu, Joseph M. Jasinski, James H. Kaufman, Cheryl A. Kieliszewski, Martin S. Kohn, Sarah E. Knoop, Paul P. Maglio, Ronald L. Mak, Haim Nelken, Chalapathy Neti, Hani Neuvirth, Yue Pan, Yardena Peres, Sreeram Ramakrishnan, Michal Rosen-Zvi, Sondra R. Renly, Pat Selinger, Amnon Shabo, Robert Sorrentino, Jimeng Sun, Tanveer Fathima Syeda-Mahmood, Wang-Chiew Tan, Ying Y. Y. Tao, Reza Yaesoubi, Xinxin Zhu. IBM Journal of Research and Development (55): 6 (2011). Web SearchBibTeXDownload
32Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France. ICDF2C 2011, 156-171. Web SearchBibTeXDownload
31A Privacy Reinforcement Approach against De-identified Dataset. Chi-Wei Lan, Yi-Hui Chen, Tyrone Grandison, Angus F. M. Huang, Jen-Yao Chung, Li-Feng Tseng. ICEBE 2011, 370-375. Web SearchBibTeXDownload
30Access control for smarter healthcare using policy spaces. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. Computers & Security (29): 848-858 (2010). Web SearchBibTeXDownload
29An evaluation of feature sets and sampling techniques for de-identification of medical records. James J. Gardner, Li Xiong, Fusheng Wang, Andrew R. Post, Joel H. Saltz, Tyrone Grandison. IHI 2010, 183-190. Web SearchBibTeXDownload
28Regulatory Compliance and the Correlation to Privacy Protection in Healthcare. Tyrone Grandison, Rafae Bhatti. IJCMAM (1): 37-52 (2010). Web SearchBibTeXDownload
27New access models for healthcare. Tyrone Grandison. SACMAT 2010, 1-2. Web SearchBibTeXDownload
26Towards a Formal Definition of a Computing Cloud. Tyrone Grandison, E. Michael Maximilien, Sean Thorpe, Alfredo Alba. SERVICES 2010, 191-192. Web SearchBibTeXDownload
25Sound index: charts for the people, by the people. Varun Bhagwan, Tyrone Grandison, Daniel Gruhl. Commun. ACM (52): 64-70 (2009). Web SearchBibTeXDownload
24Enabling Privacy as a Fundamental Construct for Social Networks. E. Michael Maximilien, Tyrone Grandison, Kun Liu, Tony Sun, Dwayne Richardson, Sherry Guo. CSE (4) 2009, 1015-1020. Web SearchBibTeXDownload
23Intrusion Detection Technology. Tyrone Grandison, Evimaria Terzi. Encyclopedia of Database Systems 2009, 1568-1570. Web SearchBibTeXDownload
22Enabling Scaleable, Efficient, Non-visual Web Browsing Services. Ashish Verma, Tyrone Grandison, Himanshu Chauhan. ICWS 2009, 1037-1038. Web SearchBibTeXDownload
21Change Detection and Correction Facilitation for Web Applications and Services. Alfredo Alba, Varun Bhagwan, Tyrone Grandison, Daniel Gruhl, Jan Pieper. ICWS 2009, 1012-1013. Web SearchBibTeXDownload
20Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection. Varun Bhagwan, Tyrone Grandison. ICWS 2009, 1014-1015. Web SearchBibTeXDownload
19MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction. Varun Bhagwan, Tyrone Grandison, Alfredo Alba, Daniel Gruhl, Jan Pieper. IEEE CLOUD 2009, 214-220. Web SearchBibTeXDownload
18Efficient Privacy-Preserving Link Discovery. Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Evimaria Terzi, Tyrone Grandison. PAKDD 2009, 16-27. Web SearchBibTeXDownload
17Highlighting Diverse Concepts in Documents. Kun Liu, Evimaria Terzi, Tyrone Grandison. SDM 2009, 545-556. Web SearchBibTeXDownload
16Regulating Exceptions in Healthcare Using Policy Spaces. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. DBSec 2008, 254-267. Web SearchBibTeXDownload
15Hippocratic Databases: Current Capabilities and Future Trends. Tyrone Grandison, Christopher W. Johnson, Jerry Kiernan. Handbook of Database Security 2008, 409-429. Web SearchBibTeXDownload
14Accessing the deep web: when good ideas go bad. Alfredo Alba, Varun Bhagwan, Tyrone Grandison. OOPSLA Companion 2008, 815-818. Web SearchBibTeXDownload
13ManyAspects: a system for highlighting diverse concepts in documents. Kun Liu, Evimaria Terzi, Tyrone Grandison. PVLDB (1): 1444-1447 (2008). Web SearchBibTeXDownload
12Security Usability Principles for Vulnerability Analysis and Risk Assessment. Audun J°sang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara. ACSAC 2007, 269-278. Web SearchBibTeXDownload
11Elevating the Discussion on Security Management: The Data Centric Paradigm. Tyrone Grandison, Marcel Bilger, L. O'Connor, Marcel Graf, Morton Swimmer, Matthias Schunter, Andreas Wespi, Nev Zunic. BDIM 2007, 84-93. Web SearchBibTeXDownload
10Enabling the 21st century health care information technology revolution. Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan. Commun. ACM (50): 34-42 (2007). Web SearchBibTeXDownload
9Compliance with data protection laws using Hippocratic Database active enforcement and auditing. Christopher M. Johnson, Tyrone Grandison. IBM Systems Journal (46): 255-264 (2007). Web SearchBibTeXDownload
8Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities. Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Braun, James Kaufman. MedInfo 2007, 483-487. Web SearchBibTeXDownload
7Ïnfïnïty: a generic platform for application development and information sharing on mobile devices. Alvin Cheung, Tyrone Grandison, Christopher M. Johnson, Stefan Sch÷nauer. MobiDE 2007, 25-32. Web SearchBibTeXDownload
6Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. Rafae Bhatti, Tyrone Grandison. Secure Data Management 2007, 158-173. Web SearchBibTeXDownload
5Discovery Services-Enabling RFID Traceability in EPCglobal Networks. Steve Beier, Tyrone Grandison, Karin Kailing, Ralf Rantzau. COMAD 2006, 214-217. Web SearchBibTeXDownload
4Extending Relational Database Systems to Automatically Enforce Privacy Policies. Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry Kiernan, Scott Logan, Walid Rjaibi. ICDE 2005, 1013-1022. Cited by 52Web SearchBibTeXDownload
3Trust Management Tools for Internet Applications. Tyrone Grandison, Morris Sloman. iTrust 2003, 91-107. Web SearchBibTeXDownload
2Specifying and Analysing Trust for Internet Applications. Tyrone Grandison, Morris Sloman. I3E 2002, 145-157. Web SearchBibTeX
1A Survey of Trust in Internet Applications. Tyrone Grandison, Morris Sloman. IEEE Communications Surveys and Tutorials (3): 2-16 (2000). Web SearchBibTeXDownload
from DBLP and Google Scholar

Related People

Developed by the Database Group at the University of Wisconsin and Yahoo! Research