Papers by Tyrone Grandison
Medinfo 2007: Proceedings of the 12th World Congress on Health (Medical) Informatics; Building Sustainable Health Systems, 2007
Bookmarks Related papers MentionsView impact
Cloud computing is becoming commonplace in industry. With this rise in adoption and use, there is... more Cloud computing is becoming commonplace in industry. With this rise in adoption and use, there is a growing requirement to enable forensic investigators to collect, analyze and produce evidence that can be used in court cases. Unfortunately, traditional and digital forensics techniques cannot be directly applied to the cloud computing paradigm. In this paper, we explore the need created by cloud computing log forensics, discuss the issues involved, and highlight the unsolved research challenges in the space.
Bookmarks Related papers MentionsView impact
IEEE Software, Jul 1, 2015
Bookmarks Related papers MentionsView impact
arXiv (Cornell University), Jun 22, 2015
ABSTRACT This is the Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 201... more ABSTRACT This is the Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, held in San Jose, CA, USA, on May 21, 2015. The workshop was held as part of the IEEE Computer Society Security and Privacy Workshops, in conjunction with the IEEE Symposium on Security and Privacy.
Bookmarks Related papers MentionsView impact
International Journal of Network Management, Dec 9, 2020
Bookmarks Related papers MentionsView impact
ACM conference on Systems, Programming, Languages and Applications: Software for Humanity, Oct 21, 2014
It is our great pleasure to welcome you to Portland and to the Privacy and Security in Programmin... more It is our great pleasure to welcome you to Portland and to the Privacy and Security in Programming (PSP) workshop -- the first of its kind. Security and privacy in software engineering is a pressing concern. Over the last decade, many programmers have recognized the importance of including security and privacy requirements at project start. This has led to efforts in secure/security engineering and privacy engineering, which focus on guidelines and best practices that can be used at the design stage to create safer code. Unfortunately, these disciplines are not pervasive and still in their infancy. By gathering the different communities doing work in the related spaces, we hope to spark conversation, collaboration and come up with ways to make security and privacy first class citizens in programming and programming languages. Specifically, we seek to help research and industry professionals further the agenda on how to: codify the principles from secure and privacy engineering into programming language constructs and or tools, create programming languages that have security and privacy as foundational tenets, and create/codify constructs or tools that enables secure and privacy-preserving (business) operations. As expected for a workshop in its inaugural year that is promoted as a highly interactive forum and a meeting of the minds, the number of submissions was not significant. However, the program committee accepted three very high quality papers for presentation. The team of Nathan Fulton, Cyrus Omar and Jonathan Aldrich won the best paper award for "Statically Typed String Sanitation Inside a Python" and Lucas Waye received second place for "Privacy Integrated Data Stream". The program also includes an interesting talk from Stephen Chong from Harvard University on "Language-based Security". Beyond the formal program, there was a lot of spirited discussion and engagement during the sessions and breaks. We are happy that you are able to join us for this exciting workshop, and hope that the ideas you take home with you will enrich your work moving forward.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Interactions, 2021
Bookmarks Related papers MentionsView impact
TRENDS IN THE SCIENCES, 2020
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
Home Home. ...
Bookmarks Related papers MentionsView impact
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
A supercharger for an internal combustion, diesel engine includes a clutch disc for engaging or d... more A supercharger for an internal combustion, diesel engine includes a clutch disc for engaging or disengaging the flywheel of the engine for transmitting power to the transmission and wheels of a vehicle in which the engine is mounted. A blower assembly for the supercharger is fixedly connected to the clutch disc for rotation in unison therewith. The blower includes a cover secured to the clutch disc and a plurality of impeller vanes disposed about its periphery. In operation, when the clutch disc is engaged with the flywheel of the engine, the blower of the supercharger rotates in unison with the clutch plate to draw in air and supply compressed air to the engine to perform the supercharging functions. However, during idling, when the clutch is disengaged, the supercharger blower does not rotate thereby minimizing fuel consumption.
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
Bookmarks Related papers MentionsView impact
Encyclopedia of Database Systems, 2009
Bookmarks Related papers MentionsView impact
Encyclopedia of Cryptography and Security, 2011
Bookmarks Related papers MentionsView impact
Uploads
Papers by Tyrone Grandison