The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tyrone Grandison: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tyrone Grandison, Morris Sloman
    Specifying and Analysing Trust for Internet Applications. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:145-157 [Conf]
  2. Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry Kiernan, Scott Logan, Walid Rjaibi
    Extending Relational Database Systems to Automatically Enforce Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:1013-1022 [Conf]
  3. Tyrone Grandison, Morris Sloman
    Trust Management Tools for Internet Applications. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:91-107 [Conf]
  4. Rakesh Agrawal, Tyrone Grandison, Christopher Johnson, Jerry Kiernan
    Enabling the 21st century health care information technology revolution. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:2, pp:34-42 [Journal]
  5. Tyrone Grandison, Morris Sloman
    A Survey of Trust in Internet Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Communications Surveys and Tutorials, 2000, v:3, n:4, pp:- [Journal]
  6. Alvin Cheung, Tyrone Grandison, Christopher Johnson, Stefan Schönauer
    Ïnfïnïty: a generic platform for application development and information sharing on mobile devices. [Citation Graph (0, 0)][DBLP]
    MobiDE, 2007, pp:25-32 [Conf]
  7. Rafae Bhatti, Tyrone Grandison
    Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:158-173 [Conf]

  8. Security Usability Principles for Vulnerability Analysis and Risk Assessment. [Citation Graph (, )][DBLP]


  9. Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP]


  10. Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection. [Citation Graph (, )][DBLP]


  11. Enabling Scaleable, Efficient, Non-visual Web Browsing Services. [Citation Graph (, )][DBLP]


  12. Change Detection and Correction Facilitation for Web Applications and Services. [Citation Graph (, )][DBLP]


  13. Accessing the deep web: when good ideas go bad. [Citation Graph (, )][DBLP]


  14. Efficient Privacy-Preserving Link Discovery. [Citation Graph (, )][DBLP]


  15. New access models for healthcare. [Citation Graph (, )][DBLP]


  16. Highlighting Diverse Concepts in Documents. [Citation Graph (, )][DBLP]


  17. Elevating the Discussion on Security Management: The Data Centric Paradigm. [Citation Graph (, )][DBLP]


  18. Enabling Privacy as a Fundamental Construct for Social Networks. [Citation Graph (, )][DBLP]


  19. Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities. [Citation Graph (, )][DBLP]


  20. Towards a Formal Definition of a Computing Cloud. [Citation Graph (, )][DBLP]


  21. Sound index: charts for the people, by the people. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002