IEEE Trans Dependable Secure Comput
January 2024
The use of blockchain technology has been proposed to provide auditable access control for individual resources. Unlike the case where all resources are owned by a single organization, this work focuses on distributed applications such as business processes and distributed workflows. These applications are often composed of multiple resources/services that are subject to the security and access control policies of different organizational domains.
View Article and Find Full Text PDFIEEE Internet Things J
February 2024
Current Internet of Things (IoT) devices provide a diverse range of functionalities, ranging from measurement and dissemination of sensory data observation, to computation services for real-time data stream processing. In extreme situations such as emergencies, a significant benefit of IoT devices is that they can help gain a more complete situational understanding of the environment. However, this requires the ability to utilize IoT resources while taking into account location, battery life, and other constraints of the underlying edge and IoT devices.
View Article and Find Full Text PDFIEEE Trans Serv Comput
September 2021
The emergence of cloud and edge computing has enabled rapid development and deployment of Internet-centric distributed applications. There are many platforms and tools that can facilitate users to develop distributed business process (BP) applications by composing relevant service components in a plug and play manner. However, there is no guarantee that a BP application developed in this way is fault-free.
View Article and Find Full Text PDFIEEE Int Conf Web Serv
July 2022
Cloud and edge-computing based platforms have enabled rapid development of distributed business process (BP) applications in a plug and play manner. However, these platforms do not provide the needed capabilities for identifying or repairing faults in BPs. Faults in BP may occur due to errors made by BP designers because of their lack of understanding of the underlying component services, misconfiguration of these services, or incorrect/incomplete BP workflow specifications.
View Article and Find Full Text PDFProc Int Conf Distrib Comput Syst
July 2022
Cloud computing and Internet-ware software paradigm have enabled rapid development of distributed business process (BP) applications. Several tools are available to facilitate automated/ semi-automated development and deployment of such distributed BPs by orchestrating relevant service components in a plug-and-play fashion. However, the BPs developed using such tools are not guaranteed to be fault-free.
View Article and Find Full Text PDFIEEE Trans Serv Comput
October 2020
An emergency response process outlines the workflow of different activities that need to be performed in response to an emergency. Effective emergency response requires communication and coordination with the operational systems belonging to different collaborating organizations. Therefore, it is necessary to establish information sharing and system-level interoperability among the diverse operational systems.
View Article and Find Full Text PDFProc Int Conf Digit Gov Res
June 2021
The COVID-19 pandemic has identified weaknesses and stresses in the existing healthcare and governance system, even in the most developed countries. Given the scale and scope of the pandemic, existing healthcare systems are heavily resource constrained, and home-based isolation has been considered as a potential first step for reducing both the disease spread and the stress on the healthcare system. However, the needs and requirements of home-based isolation are extremely unique for each patient, depending on their medical condition and comorbidities, family responsibilities, and environmental constraints.
View Article and Find Full Text PDFProc Int Conf Distrib Comput Syst
February 2021
The use of blockchain technology has been proposed to provide auditable access control for individual resources. However, when all resources are owned by a single organization, such expensive solutions may not be needed. In this work we focus on distributed applications such as business processes and distributed workflows.
View Article and Find Full Text PDFAfrican American women have not benefited equally from recently improved breast cancer survival. We investigated if this was true for all subsets. We identified 395,170 patients with breast adenocarcinoma from the SEER database from 1990 to 2011 with designated race, age, stage, grade, ER and PR status, marital status and laterality, as control.
View Article and Find Full Text PDFInt J Coop Inf Syst
September 2018
Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. The goal of outlier detection is to find abnormal entities that are significantly different from the remaining data. Often the underlying data is distributed across different organizations.
View Article and Find Full Text PDFAMIA Annu Symp Proc
February 2019
Big data coupled with precision medicine has the potential to significantly improve our understanding and treatment of complex disorders, such as cancer, diabetes, depression, etc. However, the essential problem is that data are stuck in silos, and it is difficult to precisely identify which data would be relevant and useful for any particular type of analysis. While the process to acquire and access biomedical data requires significant effort, in many cases the data may not provide much insight to the problem at hand.
View Article and Find Full Text PDFGiven the morass of available data, ranking and best match queries are often used to find records of interest. As such, k-NN queries, which give the k closest matches to a query point, are of particular interest, and have many applications. We study this problem in the context of the financial sector, wherein an investment portfolio database is queried for matching portfolios.
View Article and Find Full Text PDF: African American race negatively impacts survival from localized breast cancer but co-variable factors confound the impact. Data sets were analyzed from the Surveillance, Epidemiology and End Results (SEER) directories from 1973 to 2011 consisting of patients with designated diagnosis of breast adenocarcinoma, race as White or Caucasian, Black or African American, Asian, American Indian or Alaskan Native, Native Hawaiian or Pacific Islander, age, stage I, II or III, grade 1, 2 or 3, estrogen receptor or progesterone receptor positive or negative, marital status as single, married, separated, divorced or widowed and laterality as right or left. The Cox Proportional Hazards Regression model was used to determine hazard ratios for survival.
View Article and Find Full Text PDFAMIA Jt Summits Transl Sci Proc
December 2013
Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data.
View Article and Find Full Text PDFFor health care related research studies the medical records of patients may need to be retrieved from multiple sites with different regulations on the disclosure of health information. Given the sensitive nature of health care information, privacy is a major concern when patients' health care data is used for research purposes. In this paper, we propose an approach for integration and querying of health care data from multiple sources in a secure and privacy preserving manner.
View Article and Find Full Text PDF