Thesis Chapters by Milson Munakami
In the advent of the digital transformation, online business processes need to be automated and m... more In the advent of the digital transformation, online business processes need to be automated and modeled as workflows. A workflow typically involves a sequence of coordinated tasks and shared data that need to be secured and protected from unauthorized access. In other words, a workflow can be described simply as the movement of documents and activities through a business process among different users. Such connected flow of information among various users with different permission level offers many benefits along with new challenges. Cyber threats are becoming more sophisticated as skilled and motivated attackers both insiders and outsiders are equipped with advanced and diverse penetration tools and techniques. So apart from standard functional requirements, security is a critical requirement for such systems. We need to have a new approach to more secure design, configuration, implementation and management of workflow systems. In this paper, we propose a new software design model when developing a workflow system that inherently decouples the system level functional requirements from the security specifications. This externalization of authorization from the code makes it more flexible to support dynamic business agility. Moreover, the proposed model is combined with contextual information to accommodate dynamic access control enforcement. The given architecture provides outstanding levels of control, security, privacy and compliance with regulatory standards by using more fine-grained static as well as dynamic Attribute Based Access Control (ABAC) policies. We also develop a viable implementation called Grant Proposal Workflow Management System (GPWFMS) that supports not only functional and security specifications of workflow but also extended complex features like Obligations and Delegation of Authority which is lacking in the much existing literature.
Papers by Milson Munakami
Concern over climate change is driving interest in changing the U.S. energy system, which is the ... more Concern over climate change is driving interest in changing the U.S. energy system, which is the result of two centuries of gradual development. Visualizing this evolution is vital to understanding this system, but visualizations in energy history do not fully capture its dynamics. In this project, we present an animated “Sankey diagram” that shows the evolution of the U.S. energy system from 1800 to the present. Sankey diagrams are commonly used to compactly represent energy systems, showing the flow of various energy types from primary sources to end uses. However, Sankey diagrams are rarely animated, because of the computational and graphical challenge in developing a generalizable architecture for presenting information cleanly. The project we present therefore involves both archival historical research and development of new software tools.
ISMRM Annual Meeting
We created an interactive application Learn Radiology with multi-parametric MRI - whole mount his... more We created an interactive application Learn Radiology with multi-parametric MRI - whole mount histology correlation for enhanced prostate MRI training of radiologists and validated whether the use of a newly created learning application can enhance prostate MRI training of radiologists using an observer study. Sensitivity (R1: 54%→64%, R2: 44%→59%, R3: 62%→72%), PPV (R1: 68%→76%, R2: 52%→79%, R3: 48%→65%) and confidence score (R1: 4.0±1.0→4.3±0.8, R2: 3.1±0.8→4.0±1.1, R3: 2.8±1.2→4.1±1.1, p<0.05) for prostate cancer diagnosis using mpMRI improved for all three radiologists along with inter-observer agreement (α 0.78→0.85) after being exposed to our developed teaching app.
2015 Second International Conference on Trustworthy Systems and Their Applications, 2015
ABSTRACT In programmable networks firewalls are software applications that are flexible to develo... more ABSTRACT In programmable networks firewalls are software applications that are flexible to develop and interact with. However, from a Quality Assurance (QA) perspective, the process to verify conformance and correctness of those firewalls is complex and challenging. Our approach is to use model-based methods to describe firewall functionalities. We used MISTA modeling tool to describe functional and structural models for Floodlight firewall module. Test cases are then generated automatically by MISTA from the model. We evaluated the model using mutation coverage through PIT mutation framework. Based on comparison with original test cases provided by Floodlight, test cases generated from our model showed a significantly improved mutation coverage.
In the advent of the digital transformation, online business processes need to be automated and m... more In the advent of the digital transformation, online business processes need to be automated and modeled as workflows. A workflow typically involves a sequence of coordinated tasks and shared data that need to be secured and protected from unauthorized access. In other words, a workflow can be described simply as the movement of documents and activities through a business process among different users. Such connected flow of information among various users with different permission level offers many benefits along with new challenges. Cyber threats are becoming more sophisticated as skilled and motivated attackers both insiders and outsiders are equipped with advanced and diverse penetration tools and techniques. So apart from standard functional requirements, security is a critical requirement for such systems. We need to have a new approach to more secure design, configuration, implementation and management of workflow systems. In this paper, we propose a new software design model when developing a workflow system that inherently decouples the system level functional requirements from the security specifications. This externalization of authorization from the code makes it more flexible to support dynamic business agility. Moreover, the proposed model is combined with contextual information to accommodate dynamic access control enforcement. The given architecture provides outstanding levels of control, security, privacy and compliance with regulatory standards by using more fine-grained static as well as dynamic Attribute Based Access Control (ABAC) policies. We also develop a viable implementation called Grant Proposal Workflow Management System (GPWFMS) that supports not only functional and security specifications of workflow but also extended complex features like Obligations and Delegation of Authority which is lacking in the much existing literature.
Bulletin of the American Physical Society, 2018
Uploads
Thesis Chapters by Milson Munakami
Papers by Milson Munakami