Tyrone Grandison

CEO

Proficiency Labs

Location
Ashland, Oregon, United States
Discipline
Computer and Information Science
Interests
Security, Privacy, Data, Mobile, Healthcare, Trust Management
More... Less...

  • 2 Followers

About

I am the Program Manager for Core Healthcare Services in IBM Research's Service organization. My current focus areas are Privacy & Security and Healthcare Information Integration. Previously, I led the Intelligent Information Systems (IIS) team in the Computer Science department at the IBM Almaden Research Center. The group is focused on fundamental science in the field of data disclosure management that is relevant and applicable to industry verticals.
More... Less...

Publications

  • A Survey of Trust in Internet Applications.

    Grandison T, Sloman M

    IEEE Communications Surveys and Tutorials (2000)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Discovery Services-Enabling RFID Traceability in EPCglobal Networks.

    Beier S, Grandison T, Kailing K, Rantzau R

    COMAD (2006)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Regulatory Compliance and the Correlation to Privacy Protection in Healthcare

    Grandison T, Bhatti R

    International Journal of Computational Models and Algorithms in Medicine (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • New access models for healthcare

    Grandison T

    Proceeding of the 15th ACM symposium on Access control models and technologies - SACMAT '10 (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Don't Trade Privacy for Security

    Grandison T

    Communications of the ACM (2005)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Optimizing The Delivery Of Social Services

    Liu K, Grandison T

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Access Control For Smarter Healthcare Using Policy Spaces

    Ardagna C

    Computers & … (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • A National Healthcare Data Network for India

    Batra V, Grandison T

    … 2007: Proceedings of … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Change Detection and Correction Facilitation for Web Applications and Services

    Alba A, Bhagwan V

    Web Services, 2009. … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • A Risk Management Framework for Health Care Data Anonymization

    utdallas.edu

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • An evaluation of feature sets and sampling techniques for de-identification of medical records

    Gardner J, Xiong L, Wang F

    Proceedings of the … (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • TURNING WEB X. 0 DATA INTO COMPETITIVE ADVANTAGE

    research.ibm.com

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Enabling Privacy As a Fundamental Construct for Social Networks

    Maximilien E, Grandison T

    … , 2009. CSE'09. … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Enabling Biomedical Research in Europe: Using the Dutch Experience as a Template

    Verheij R

    … 2007: Proceedings of the … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Enabling Scaleable, Efficient, Non-Visual Web Browsing Services

    Verma A

    Web Services, 2009. ICWS … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection

    Web Services, 2009. ICWS 2009. … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Towards a Formal Definition of a Computing Cloud

    Grandison T, Maximilien E

    2010 6th World Congress … (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Privacy-Preserving Data Mining

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Leveraging Online Data To Deliver Better Decision Support For Personalized Chronic Disease Management

    Grandison T, Grant C, Liu K

    Citeseer

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Intrusion Detection Technology

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Conceptions of Trust: Definition, Constructs, and Models

    Grandison T

    R. Song (ed.),Trust in E-Services: Technologies, …

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Improving Security Policy Coverage in Healthcare

    igi-global.com

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Asset reuse and service science: The delicate balance

    Management of Engineering & … (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Efficient Privacy-Preserving Link Discovery

    He X, Vaidya J, Shafiq B, Adam N

    … Discovery and Data … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Formalizing trust-based decision making in electronic commerce transactions

    Proceedings of the First International Workshop on …

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Managing disclosure of private health data with hippocratic databases

    Agrawal R, Asonov D

    IBM Research White … (2005)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Mongoose: Monitoring global online opinions via semantic extraction

    Bhagwan V, Grandison T

    … , 2009. CLOUD'09. … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Supervision and discovery of electronic communications in the financial services industry

    Edlund S, Grandison T

    Proceedings of the 1st … (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Protecting privacy while sharing medical data between regional healthcare entities

    Grandison T, Ganta S

    Studies in health … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Managing Disclosure of Private Financial Data with Hippocratic Databases

    Agrawal R, Asonov D

    IBM Almaden Research … (2005)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Privacy-as-a-service: Models, algorithms, and results on the facebook platform

    Maximilien E, Grandison T

    Workshop Program- … (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Trust Management Tools

    Grandison T

    Trust in E-Services: Technologies, Practices and …

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Research proposals on trust modelling

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Highlighting diverse concepts in documents

    Liu K

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • ManyAspects: a system for highlighting diverse concepts in documents

    Liu K

    Proceedings of the VLDB Endowment (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Self-Service–Lessons From Industry

    Proceedings of the International … (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • The impact of industry constraints on model-driven data disclosure controls

    Proc. of the 1st International Workshop on Model- … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Elevating the Discussion on Security Management: The Data Centric Paradigm

    Grandison T, Bilger M

    Business-Driven IT … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Regulating exceptions in healthcare using policy spaces

    Ardagna C

    Data and Applications … (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Sound index: charts for the people, by the people

    Bhagwan V

    Communications of the ACM (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Ïnfïnïty: a generic platform for application development and information sharing on mobile devices

    Cheung A, Grandison T

    Proceedings of the 6th … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Towards improved privacy policy coverage in healthcare using policy refinement

    Secure Data Management (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Towards privacy propagation in the social web

    2008 Web 2.0 Security and Privacy ( …

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Security usability principles for vulnerability analysis and risk assessment

    Josang A, AlFayyadh B

    … 2007. ACSAC 2007 … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Accessing the deep web: when good ideas go bad

    Alba A

    Companion to the 23rd ACM … (2008)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Trust specification and analysis for internet applications

    Grandison T

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Sultan-a language for trust specification and analysis

    Proceedings of the 8th Annual Workshop HP … (2001)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Conditional inference in subjective logic

    Proceedings of the 6th International Conference … (2003)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Enabling the 21st century health care information technology revolution

    Agrawal R, Grandison T

    Communications of the … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Specifying and analysing trust for internet applications

    … the knowledge society: e-commerce, e … (2002)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Extending relational database systems to automatically enforce privacy policies

    Agrawal R, Bird P

    US Patent … (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Trust management tools for internet applications

    Trust Management (2003)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Healthcare chains - enabling application and data privacy controls for healthcare information systems.

    Omran E, Grandison T, Abu Almaati S

    Studies in health technology and informatics (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • HIPAA compliance and patient privacy protection.

    Grandison T, Bhatti R

    Studies in health technology and informatics (2010)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Privacy preserving data mining

    Evfimievski A, Grandison T

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Compliance with data protection laws using Hippocratic Database active enforcement and auditing

    Johnson C, Grandison T

    IBM Systems Journal (2007)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Enabling Scaleable, Efficient, Non-visual Web Browsing Services

    Verma A, Grandison T, Chauhan H

    2009 IEEE International Conference on Web Services (2009)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.
  • Trust management tools for internet applications

    Grandison T, Sloman M

    Proceedings of the 1st international conference on Trust management (2003)

    • -- Readers Readers not available. This publication is not currently accessible in the Mendeley catalog.

Professional experience

CEO

Proficiency Labs

November 2012 - Present

Education history

Imperial College

PhD

September 1999 - June 2003 (3 years 9 months)