Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    James Joshi

    BACKGROUND The widespread application of technologies such as electronic health record systems, mobile health apps, and telemedicine platforms, has made it easy for health care providers to collect relevant data and deliver health care... more
    BACKGROUND The widespread application of technologies such as electronic health record systems, mobile health apps, and telemedicine platforms, has made it easy for health care providers to collect relevant data and deliver health care regimens. While efficacious, these new technologies also pose serious security and privacy challenges. OBJECTIVE The training program described here aims at preparing well-informed health information security and privacy professionals with enhanced course materials and various approaches. METHODS A new educational track has been built within a health informatics graduate program. Several existing graduate courses have been enhanced with new security and privacy modules. New labs and seminars have been created, and students are being encouraged to participate in research projects and obtain real-world experience from industry partners. Students in this track receive both theoretical education and hands-on practice. Evaluations have been performed on th...
    Dating violence is a type of Intimate Partner Violence (IPV) which is a serious, preventable public health and social justice issue. If dating violence is left unchecked, it can bring short term and long term negative effects to... more
    Dating violence is a type of Intimate Partner Violence (IPV) which is a serious, preventable public health and social justice issue. If dating violence is left unchecked, it can bring short term and long term negative effects to survivors, especially college students who are developing emotionally. We built a mobile application called HELPP Zone (Health, Education on safety, and Legal Participant Preferred) for college students to protect them against potential dating violence. In the HELPP Zone, a user can set a list of trusted contacts and her schedule, and reach them for help based on the context (user’s location, schedule and status) when potential violence occurs. The HELLP Zone is our first step towards creating a platform to end dating violence.
    Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack... more
    Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack or exploit the network. Some recent research efforts have focused on studying security issues in cognitive radios but there are still significant security challenges in the implementation of DSA systems that have not been addressed. In this paper we focus on security issues in DSA. We identify ...
    Policy specification for securing Web services is fastemerging as a key research area due to rapidproliferation of Web services in modern day enterpriseapplications. Whilst the use of XML technology to supportthese Web services has... more
    Policy specification for securing Web services is fastemerging as a key research area due to rapidproliferation of Web services in modern day enterpriseapplications. Whilst the use of XML technology to supportthese Web services has resulted in their tremendousgrowth, it has also introduced a new set of securitychallenges specific to these Web services. Though therehas been recent research in areas of XML-baseddocument security, these challenges have not beenaddressed within the XML framework. In this paper, wepresent X-RBAC, an ...
    Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks. However, a fundamental limitation of such mechanisms is that users in the system are... more
    Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' location privacy while traveling on road networks. However, a fundamental limitation of such mechanisms is that users in the system are inherently trusted and assumed to always report their true locations. Such vulnerability can lead to a new class of attacks called location injection attacks which can successfully break users' anonymity among a set of users through the injection of fake user accounts and incorrect location updates. In this paper, we characterize location injection attacks, demonstrate their effectiveness through experiments on real-world geographic maps and discuss possible defense mechanisms to protect against such attacks.
    Recent advances in computing have enabled cloud storage service, among others, that collect and provide efficient long term storage of huge amounts data that may include users’ privacy sensitive information. Concerns about the security... more
    Recent advances in computing have enabled cloud storage service, among others, that collect and provide efficient long term storage of huge amounts data that may include users’ privacy sensitive information. Concerns about the security and privacy of the sensitive data stored in the cloud is one key obstacle to the success of these cloud based applications and services. To tackle these issues, Attribute based Encryption (ABE) approaches, especially the Ciphertext-Policy Attribute based Encryption (CP-ABE), have been shown to be very promising. ABE helps provide access control solutions to protect the privacy-sensitive information stored in the cloud storage centers. However, use of an ABE approach in such cases suffers from two key insider threats: insider threat due to colluding users; and that due to a potentially malicious or compromised authority center. Even though the users’ collusion has been addressed in the literature, to our best knowledge, the authority center as an insid...
    Research Interests:

    And 79 more