Tyrone Grandison

CEO

Proficiency Labs

Location
Ashland, Oregon, United States
Discipline
Computer and Information Science
Interests
Security, Privacy, Data, Mobile, Healthcare, Trust Management
more... less...

Followers (2)

Following (2)

About

I am the Program Manager for Core Healthcare Services in IBM Research's Service organization. My current focus areas are Privacy & Security and Healthcare Information Integration. Previously, I led the Intelligent Information Systems (IIS) team in the Computer Science department at the IBM Almaden Research Center. The group is focused on fundamental science in the field of data disclosure management that is relevant and applicable to industry verticals.
more... less...

Publications

A Survey of Trust in Internet Applications.

Grandison T, Sloman M

IEEE Communications Surveys and Tutorials (2000)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Discovery Services-Enabling RFID Traceability in EPCglobal Networks.

Beier S, Grandison T, Kailing K, Rantzau R

COMAD (2006)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Regulatory Compliance and the Correlation to Privacy Protection in Healthcare

Grandison T, Bhatti R

International Journal of Computational Models and Algorithms in Medicine (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

New access models for healthcare

Grandison T

Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10 (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Don't Trade Privacy for Security

Grandison T

Communications of the ACM (2005)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Optimizing The Delivery Of Social Services

Liu K, Grandison T

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Access Control For Smarter Healthcare Using Policy Spaces

Ardagna C

Computers & … (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

A National Healthcare Data Network for India

Batra V, Grandison T

… 2007: Proceedings of … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Change Detection and Correction Facilitation for Web Applications and Services

Alba A, Bhagwan V

Web Services, 2009. … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

A Risk Management Framework for Health Care Data Anonymization

utdallas.edu

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

An evaluation of feature sets and sampling techniques for de-identification of medical records

Gardner J, Xiong L, Wang F

Proceedings of the … (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

TURNING WEB X. 0 DATA INTO COMPETITIVE ADVANTAGE

research.ibm.com

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Enabling Privacy As a Fundamental Construct for Social Networks

Maximilien E, Grandison T

… , 2009. CSE'09. … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Enabling Biomedical Research in Europe: Using the Dutch Experience as a Template

Verheij R

… 2007: Proceedings of the … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Enabling Scaleable, Efficient, Non-Visual Web Browsing Services

Verma A

Web Services, 2009. ICWS … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection

Web Services, 2009. ICWS 2009. … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Towards a Formal Definition of a Computing Cloud

Grandison T, Maximilien E

2010 6th World Congress … (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Privacy-Preserving Data Mining

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Leveraging Online Data To Deliver Better Decision Support For Personalized Chronic Disease Management

Grandison T, Grant C, Liu K

Citeseer

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Intrusion Detection Technology

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Conceptions of Trust: Definition, Constructs, and Models

Grandison T

R. Song (ed.),Trust in E-Services: Technologies, …

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Improving Security Policy Coverage in Healthcare

igi-global.com

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Asset reuse and service science: The delicate balance

Management of Engineering & … (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Efficient Privacy-Preserving Link Discovery

He X, Vaidya J, Shafiq B, Adam N

… Discovery and Data … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Formalizing trust-based decision making in electronic commerce transactions

Proceedings of the First International Workshop on …

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Managing disclosure of private health data with hippocratic databases

Agrawal R, Asonov D

IBM Research White … (2005)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Mongoose: Monitoring global online opinions via semantic extraction

Bhagwan V, Grandison T

… , 2009. CLOUD'09. … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Supervision and discovery of electronic communications in the financial services industry

Edlund S, Grandison T

Proceedings of the 1st … (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Protecting privacy while sharing medical data between regional healthcare entities

Grandison T, Ganta S

Studies in health … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Managing Disclosure of Private Financial Data with Hippocratic Databases

Agrawal R, Asonov D

IBM Almaden Research … (2005)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Privacy-as-a-service: Models, algorithms, and results on the facebook platform

Maximilien E, Grandison T

Workshop Program- … (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Trust Management Tools

Grandison T

Trust in E-Services: Technologies, Practices and …

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Research proposals on trust modelling

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Highlighting diverse concepts in documents

Liu K

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

ManyAspects: a system for highlighting diverse concepts in documents

Liu K

Proceedings of the VLDB Endowment (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Self-Service–Lessons From Industry

Proceedings of the International … (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

The impact of industry constraints on model-driven data disclosure controls

Proc. of the 1st International Workshop on Model- … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Elevating the Discussion on Security Management: The Data Centric Paradigm

Grandison T, Bilger M

Business-Driven IT … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Regulating exceptions in healthcare using policy spaces

Ardagna C

Data and Applications … (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Sound index: charts for the people, by the people

Bhagwan V

Communications of the ACM (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Ïnfïnïty: a generic platform for application development and information sharing on mobile devices

Cheung A, Grandison T

Proceedings of the 6th … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Towards improved privacy policy coverage in healthcare using policy refinement

Secure Data Management (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Towards privacy propagation in the social web

2008 Web 2.0 Security and Privacy ( …

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Security usability principles for vulnerability analysis and risk assessment

Josang A, AlFayyadh B

… 2007. ACSAC 2007 … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Accessing the deep web: when good ideas go bad

Alba A

Companion to the 23rd ACM … (2008)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Trust specification and analysis for internet applications

Grandison T

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Sultan-a language for trust specification and analysis

Proceedings of the 8th Annual Workshop HP … (2001)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Conditional inference in subjective logic

Proceedings of the 6th International Conference … (2003)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Enabling the 21st century health care information technology revolution

Agrawal R, Grandison T

Communications of the … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Specifying and analysing trust for internet applications

… the knowledge society: e-commerce, e … (2002)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Extending relational database systems to automatically enforce privacy policies

Agrawal R, Bird P

US Patent … (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Trust management tools for internet applications

Trust Management (2003)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Healthcare chains - enabling application and data privacy controls for healthcare information systems.

Omran E, Grandison T, Abu Almaati S

Studies in health technology and informatics (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

HIPAA compliance and patient privacy protection.

Grandison T, Bhatti R

Studies in health technology and informatics (2010)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Privacy preserving data mining

Evfimievski A, Grandison T

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Compliance with data protection laws using Hippocratic Database active enforcement and auditing

Johnson C, Grandison T

IBM Systems Journal (2007)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Enabling Scaleable, Efficient, Non-visual Web Browsing Services

Verma A, Grandison T, Chauhan H

2009 IEEE International Conference on Web Services (2009)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Trust management tools for internet applications

Grandison T, Sloman M

Proceedings of the 1st international conference on Trust management (2003)

  • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Professional experience

CEO

Proficiency Labs

November 2012 - Present

Education history

Imperial College

PhD

September 1999 - June 2003 (3 years 9 months)