Tags: healthcare



  1. O. Clark, T. Reynolds, E. Ugwuabonyi, and K. P. Joshi, "Exploring the Impact of Increased Health Information Accessibility in Cyberspace on Trust and Self-care Practices", InProceedings, ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS ’24) (ACM SaT-CPS 2024)., June 2024, 94 downloads.
  2. R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 258 downloads.
  3. R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 195 downloads.


  1. e., K. P. Joshi, and e., "Developing Ethics and Equity Principles, Terms, and Engagement Tools to Advance Health Equity and Researcher Diversity in AI and Machine Learning: Modified Delphi Approach", Article, JMIR AI 2023;2:e52888, September 2023, 206 downloads.
  2. J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 221 downloads.
  3. K. Roy, M. Gaur, M. Soltani, V. Rawte, and A. Sheth, "ProKnow: Process knowledge for safety constrained and explainable question generation for mental health diagnostic assistance", Article, Frontiers in Big Data, January 2023, 96 downloads.


  1. D. L. Kim, L. Elluri, and K. P. Joshi, "Trusted Compliance Enforcement Framework for Sharing Health Big Data", InProceedings, IEEE BigData 2021 4th Special Session on HealthCare Data, December 2021, 453 downloads.
  2. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 398 downloads.
  3. D. L. Kim and K. P. Joshi, "A Semantically Rich Knowledge Graph to Automate HIPAA Regulations for Cloud Health IT Services", 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 603 downloads.
  4. S. Chukkapalli, S. Aziz, N. Alotaibi, S. Mittal, M. Gupta, and M. Abdelsalam, "Ontology driven AI and Access Control Systems for Smart Fisheries", TechReport, January 2021, 722 downloads.


  1. M. Sills, P. Ranade, and S. Mittal, "Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase", InProceedings, International Conference on Intelligence and Security Informatics (ISI), November 2020, 98 downloads.
  2. J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 768 downloads.


  1. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 1885 downloads.


  1. C. Grasso, "A Semantically Rich Cognitive Search Assistant For Clinical Notes", PhdThesis, UMBC, April 2017, 1127 downloads.


  1. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2097 downloads.


  1. C. Grasso, A. Joshi, and E. Siegel, "Beyond NER: Towards Semantics in Clinical Text", InProceedings, Biomedical Data Mining, Modeling, and Semantic Integration (BDM2I); co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 1017 downloads.
  2. V. Mulwad, "TABEL - A Domain Independent and Extensible Framework for Inferring the Semantics of Tables", PhdThesis, University of Maryland, Baltimore County, January 2015, 2677 downloads.


  1. K. P. Joshi and Y. Yesha, "Workshop on Analytics for Big Data Generated by Healthcare and Personalized Medicine Domain", InProceedings, Conference of the Center for Advanced Studies on Collaborative Research (CASCOn 2012), November 2012.
  2. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1728 downloads.
  3. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1604 downloads.


  1. S. Agarwal, A. Joshi, T. Finin, Y. Yesha, and T. Ganous, "A Pervasive Computing System for the Operating Room of the Future", Article, Mobile Networks and Applications, August 2007, 3710 downloads.


  1. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.


  1. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1580 downloads, 21 citations.