Biomedical Data &
Applications Security
- Tingting Chen, Sheng Zhong, "Emergency
Access Authorization for Personally Controlled Online Health
Care Data", 2010, to appear in Journal of Medical Systems
- Ankur Bansal, Tingting Chen, Sheng
Zhong, "Privacy Preserving Back-Propagation Neural Network
Learning over Arbitrarily Partitioned Data". 2010, to appear in
Journal of Neural Computing and Applications
- Sunu Mathew, Michalis Petropoulos,
Hung Q. Ngo, Shambhu Upadhyaya, "A
Data-Centric Approach to Insider Attack Detection in Database
Systems", International Symposium on Recent Advances in
Intrusion Detection (RAID), 2010
- Ponnurangam Kumaraguru, Shambhu
Upadhyaya and H.R. Rao, "Protecting
Senior Citizens from Cyber Security Attacks in the e-Health
Scenario: An International Perspective", 6th Annual Cyber
Security and Information Intelligence Research Workshop (CSIIRW),
Oakridge, TN, April 2010
- Abhijith Kashyap, Vagelis Hristidis,
Michalis Petropoulos, Sotiria Tavoulari, "BioNav:
Effective Navigation on Query Results of Biomedical Databases",
IEEE International Conference on Data Engineering (ICDE), 2009
- Tingting Chen, Sheng Zhong. ,
Privacy
Preserving Back-Propagation Neural Network Learning", IEEE
Transactions on Neural Networks, Volume 20, No. 10, 2009, Pages
1554-1564
- Sheng Zhong, Zhiqiang Yang, Tingting
Chen. "k-Anonymous Data Collection", Information Sciences,
Volume 179, No. 17, 2009, Pages 2948-2963
- Abhijith Kashyap, Vagelis Hristidis,
Michalis Petropoulos, Sotiria Tavoulari, "Exploring
Biomedical Databases with BioNav", ACM International
Conference on Management of Data (SIGMOD), 2009
- Sunu Mathew, Shambhu Upadhyaya, Duc Ha
and Hung Ngo, “Insider
Abuse Comprehension through Capability Acquisition Graphs”,
11th International Conference on Information Fusion, Cologne,
Germany, July 2008
- Brendan Gilbert, Raj Sharman, Manish
Gupta, H.R. Rao, Shambhu Upadhyaya, Kenneth P. Mortensen, "Content-sensitive,
Temporally Adaptive Metadata", 11th Annual New York State
Cyber Security Conference, Albany, NY, June 2008, pp. 47-52
(Best Paper Award)
- Ebrahim Randeree, Rajiv Kishore, H.R.
Rao, "Investigating Trust in Outsourcing: A Study in the
Healthcare Industry", IS Monograph in Outsourcing: Editors -
Suzanne Rivard, Benoit Aubert, 2007, 135-160
- Zhiqiang Yang, Sheng Zhong, Rebecca N.
Wright, "Privacy-Preserving Queries on Encrypted Data",
Proceedings of the 11th European Symposium on Research in
Computer Security, ESORICS 2006, Pages 479-495
- Ramkumar Chinchani, Anusha Iyer, Hung
Ngo and Shambhu Upadhyaya, "Towards
a Theory of Insider Threat Assessment", IEEE International
Conference on Dependable Systems and Networks (DSN 2005),
Yokohama, Japan, June 2005
- Ebrahim Randeree and H.R. Rao, "E-health
and assurance: curing hospital websites", International
Journal of Electronic Healthcare, Issue: Volume 1, Number 1,
2004, Pages: 33 - 46
- Raj Sharman, Himabindu Challapalli,
H.R. Rao, Shambhu Upadyaya,, “A
Framework for a Secure Federated Patient Healthcare System,”
Proceedings of Symposium on Intelligence and Security
Informatics, Springer-Verlag Lecture Notes in Computer Science,
June 2004 (poster)
- Ebrahim Randeree, S.P. Judd, H.R. Rao,
Rajiv Kishore, "Antecedents to the Adoption of Application
Service Providers in the Healthcare Industry", Journal of
Healthcare Information Management, Fall 2003, 17(4), 67-71
|