Search Results - "P. Joshi, Karuna"

Refine Results
  1. 1

    Delegated Authorization Framework for EHR Services Using Attribute-Based Encryption by Joshi, Maithilee, Joshi, Karuna P., Finin, Tim

    Published in IEEE transactions on services computing (01-11-2021)
    “…Medical organizations find it challenging to adopt cloud-based Electronic Health Records (EHR) services due to the risk of data breaches and the resulting…”
    Get full text
    Journal Article
  2. 2

    Automating Cloud Services Life Cycle through Semantic Technologies by Joshi, Karuna P., Yesha, Yelena, Finin, Tim

    Published in IEEE transactions on services computing (01-01-2014)
    “…Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of software development are not appropriate for the cloud…”
    Get full text
    Journal Article
  3. 3

    Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance by Clavin, James, Joshi, Karuna P.

    “…Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and…”
    Get full text
    Conference Proceeding
  4. 4

    Analyzing GDPR compliance in Cloud Services' privacy policies using Textual Fuzzy Interpretive Structural Modeling (TFISM) by Razavisousan, Ronak, Joshi, Karuna P.

    “…Cloud Service providers must comply with data protection regulations, like European Union (EU) General Data Protection Regulation (GDPR), to ensure their…”
    Get full text
    Conference Proceeding
  5. 5

    Semantically Rich Differential Access to Secure Cloud EHR by Walid, Redwan, Joshi, Karuna P., Geol Choi, Seung

    “…Existing Cloud-based Electronic Health Record (EHR) services face challenges in handling heterogeneous data and maintaining performance with large records…”
    Get full text
    Conference Proceeding
  6. 6

    Scalability Analysis of Blockchain on a Serverless Cloud by Kaplunovich, Alex, Joshi, Karuna P., Yesha, Yelena

    “…While adopting Blockchain technologies to automate their enterprise functionality, organizations are recognizing the challenges of scalability and manual…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems by Kim, Dae-Young, Alodadi, Nujood, Chen, Zhiyuan, Joshi, Karuna P., Crainiceanu, Adina, Needham, Don

    “…Federated Data-as-a-Service systems are helpful in applications that require dynamic coordination of multiple organizations, such as maritime search and…”
    Get full text
    Conference Proceeding
  9. 9

    Multi Authority Access Control in a Cloud EHR System with MA-ABE by Dixit, Sharad, P. Joshi, Karuna, Geol Choi, Seung

    “…With the rapid adoption of Cloud-based Electronic Health Record (EHR) systems, health providers are particularly concerned about managing data privacy on the…”
    Get full text
    Conference Proceeding
  10. 10

    Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation by Walid, Redwan, Joshi, Karuna P., Choi, Seung Geol

    “…To ensure a secure Cloud-based Electronic Health Record (EHR) system, we need to encrypt data and impose field-level access control to prevent malicious usage…”
    Get full text
    Conference Proceeding
  11. 11

    Trusted Compliance Enforcement Framework for Sharing Health Big Data by Kim, Dae-Young, Elluri, Lavanya, Joshi, Karuna P.

    “…COVID pandemic management via contact tracing and vaccine distribution has resulted in a large volume and high velocity of Health-related data being collected…”
    Get full text
    Conference Proceeding
  12. 12

    A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases by Schubel, Payton, Chen, Zhiyuan, Crainiceanu, Adina, Joshi, Karuna P, Needham, Don

    “…Contact tracing is the process of identifying people who came into contact with an infected person ("case") and collecting information about these contacts…”
    Get full text
    Conference Proceeding
  13. 13

    Two Tier Analysis of Social Media Collaboration for Student Migration by Razavisousan, Ronak, Joshi, Karuna P.

    “…Global adoption of Social Media as the preferred medium for collaboration and information exchange is increasingly reshaping social realities and facilitating…”
    Get full text
    Conference Proceeding
  14. 14

    Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption by Walid, Redwan, Joshi, Karuna P., Geol Choi, Seung, Kim, Dae-young

    “…Cloud-based electronic health records (EHR) systems provide important security controls by encrypting patient data. However, these records cannot be queried…”
    Get full text
    Conference Proceeding
  15. 15

    A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting by Oni, Samson, Chen, Zhiyuan, Crainiceanu, Adina, Joshi, Karuna P, Needham, Don

    “…Organizations often need to share mission-dependent data in a secure and flexible way. Examples include contact tracing for a contagious disease such as…”
    Get full text
    Conference Proceeding
  16. 16

    Automatic Extraction of Metrics from SLAs for Cloud Service Management by Mittal, Sudip, Joshi, Karuna P., Pearce, Claudia, Joshi, Anupam

    “…To effectively manage cloud based services, organizations need to continuously monitor the performance metrics listed in the Cloud service contracts. However,…”
    Get full text
    Conference Proceeding
  17. 17

    Parallelizing natural language techniques for knowledge extraction from cloud service level agreements by Mittal, Sudip, Joshi, Karuna P., Pearce, Claudia, Joshi, Anupam

    “…To efficiently utilize their cloud based services, consumers have to continuously monitor and manage the Service Level Agreements (SLA) that define the service…”
    Get full text
    Conference Proceeding
  18. 18

    Attribute Based Encryption for Secure Access to Cloud Based EHR Systems by Joshi, Maithilee, Joshi, Karuna, Finin, Tim

    “…Medical organizations find it challenging to adopt cloud-based electronic medical records services, due to the risk of data breaches and the resulting…”
    Get full text
    Conference Proceeding
  19. 19

    Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage by Joshi, Maithilee, Mittal, Sudip, Joshi, Karuna P., Finin, Tim

    “…Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such…”
    Get full text
    Conference Proceeding
  20. 20

    Semantic approach to automating management of big data privacy policies by Joshi, Karuna P., Gupta, Aditi, Mittal, Sudip, Pearce, Claudia, Joshi, Anupam, Finin, Tim

    “…Ensuring privacy of Big Data managed on the cloud is critical to ensure consumer confidence. Cloud providers publish privacy policy documents outlining the…”
    Get full text
    Conference Proceeding