Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleOctober 2021
Longitudinal K-means approaches to clustering and analyzing EHR opioid use trajectories for clinical subtypes
- Sarah Mullin,
- Jaroslaw Zola,
- Robert Lee,
- Jinwei Hu,
- Brianne MacKenzie,
- Arlen Brickman,
- Gabriel Anaya,
- Shyamashree Sinha,
- Angie Li,
- Peter L. Elkin
Journal of Biomedical Informatics (JOBI), Volume 122, Issue Chttps://doi.org/10.1016/j.jbi.2021.103889Graphical abstractDisplay Omitted
Highlights- Identifying subtypes from medication trajectories requires careful preprocessing and model choice.
Identification of patient subtypes from retrospective Electronic Health Record (EHR) data is fraught with inherent modeling issues, such as missing data and variable length time intervals, and the results obtained are highly dependent ...
- articleApril 2017
Role updating in information systems using model checking
Knowledge and Information Systems (KAIS), Volume 51, Issue 1Pages 187–234https://doi.org/10.1007/s10115-016-0974-4The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the associated configurations need to ...
- ArticleNovember 2015
Context Awareness through Reasoning on Private Analysis for Android Application
CSCLOUD '15: Proceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)Pages 148–156https://doi.org/10.1109/CSCloud.2015.63Smartphone contains diverse sensitive private information, such as phone number, contact and credit. The Android platform employs permission mechanism to protect intensive information from illegal leakage. There are several tools to assist users to ...
- ArticleSeptember 2012
Compliance checking for usage-constrained credentials in trust negotiation systems
ISC'12: Proceedings of the 15th international conference on Information SecurityPages 290–305https://doi.org/10.1007/978-3-642-33383-5_18We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a ...
- ArticleJune 2012
Tracking and constraining authorization provenance
IEA/AIE'12: Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligencePages 669–678https://doi.org/10.1007/978-3-642-31087-4_68Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion ...
- research-articleMay 2012
Constraint-enhanced role engineering via answer set programming
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications SecurityPages 73–74https://doi.org/10.1145/2414456.2414499Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security and business requirements. An ...
- articleMay 2011
RAR: A role-and-risk based flexible framework for secure collaboration
Future Generation Computer Systems (FGCS), Volume 27, Issue 5Pages 574–586https://doi.org/10.1016/j.future.2010.09.008Collaboration among virtual organizations enables domains to effectively share resources. However, it also opens ways for several security and privacy breaches; the problem becomes severe along with the increasing complexity and dynamics of grid ...
- ArticleNovember 2010
Towards automatic update of access control policy
Role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are subject to changes, so that the associated configurations need to be updated accordingly in ...
- research-articleJune 2010
Role updating for assignments
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPages 89–98https://doi.org/10.1145/1809842.1809859The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually undergoing changes, whereas the associated user-role, role-role and role-...
- research-articleApril 2010
A logic for authorization provenance
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications SecurityPages 238–249https://doi.org/10.1145/1755688.1755718In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existing authorization logics put few emphasis on this set of principals - ...
- articleJanuary 2010
Nanoconjugate platforms development based in poly(β, L-malic acid) methyl esters for tumor drug delivery
- José Portilla-Arias,
- Rameshwar Patil,
- Jinwei Hu,
- Hui Ding,
- Keith L. Black,
- Montserrat García-Alvarez,
- Sebastián Muñoz-Guerra,
- Julia Y. Ljubimova,
- Eggehard Holler
Journal of Nanomaterials (NANO), Volume 2010Article No.: 8, Pages 1–6https://doi.org/10.1155/2010/825363New copolyesters derived from poly(β,L-malic acid) have been designed to serve as nanoconjugate platforms in drug delivery. 25% and 50%; methylated derivatives (coPMLA-Me25H75 and coPMLA-Me 50 H 50) with absolute molecular weights of 32 600 Da and 33 ...
- ArticleNovember 2009
Managing Authorization Provenance: A Modal Logic Based Approach
ICTAI '09: Proceedings of the 2009 21st IEEE International Conference on Tools with Artificial IntelligencePages 621–624https://doi.org/10.1109/ICTAI.2009.49In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these ...
- ArticleOctober 2009
On Role Mappings for RBAC-Based Secure Interoperation
NSS '09: Proceedings of the 2009 Third International Conference on Network and System SecurityPages 270–277https://doi.org/10.1109/NSS.2009.76The inter-domain role mapping is a basic method for facilitating interoperation in RBAC-based collaborating environments, where each domain employs Role Based Access Control (RBAC) to specify access control policies. Prior to concrete interoperation, ...
- ArticleSeptember 2009
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
ISC '09: Proceedings of the 12th International Conference on Information SecurityPages 403–410https://doi.org/10.1007/978-3-642-04474-8_32Separation-of-Duty (SoD) policy is a fundamental security principle for prevention of fraud and errors in computer security. The research of static SoD (SSoD) policy in recently presented usage control (UCON) model has not been explored. Consequently, ...
- ArticleAugust 2009
RBAC-Based Secure Interoperation Using Constraint Logic Programming
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 02Pages 867–872https://doi.org/10.1109/CSE.2009.249Secure interoperation is an increasingly important issue forlarge-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating environments which employ Role-Based ...
- ArticleMarch 2023
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Information Security and Cryptology - ICISC 2007Pages 49–63https://doi.org/10.1007/978-3-540-76788-6_5AbstractEstablishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the establishment of secure interoperability in decentralized multi-domain ...
- ArticleNovember 2007
Establishing RBAC-based secure interoperability in decentralized multi-domain environments
ICISC'07: Proceedings of the 10th international conference on Information security and cryptologyPages 49–63Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the establishment of secure interoperability in decentralized multi-domain ...