Yan Bai's research while affiliated with University of Washington Tacoma and other places

Publications (23)

Article
The Internet of Things (IoT) envisions a multitude of heterogeneous objects and interactions with physical environments. It has provided a promising opportunity to build powerful services and applications by leveraging the growing ubiquity of smart objects connected to the Internet. In this environment, it is challenging to locate desirable service...
Article
With the widespread eHealth usage, security of eHealth services is becoming increasingly important. In this paper, we analyze the security problems in eHealth systems, discuss various approaches of securing health data collection and sharing proposed in the recent literature on eHealth security, and provide comparative evaluations that include adva...
Chapter
Drug discovery is a lengthy, expensive and difficult process. Indentifying and understanding the hidden relationships among drugs, genes, proteins, and diseases will expedite the process of drug discovery. In this paper, we propose an effective methodology to discover drug-related semantic relationships over large-scale distributed web data in medi...
Article
eHealth is being rapidly deployed. Lower cost and greater productivity attract government and healthcare enterprise to transit from traditional healthcare service to eHealth service. Security and privacy are growing concerns with the widespread deployment of eHealth and the development of next generation of eHealth services. In this paper, we discu...
Article
Drug discovery is a lengthy, expensive and difficult process. Indentifying and understanding the hidden relationships among drugs, genes, proteins, and diseases will expedite the process of drug discovery. In this paper, we propose an effective methodology to discover drug-related semantic relationships over large-scale distributed web data in medi...
Conference Paper
Mobile cloud computing, the combination of mobile computing and cloud computing, is becoming a hot topic of the industry especially in healthcare. In this paper, we describe our design and prototype implementation of a cross-platform mobile activity monitoring system on the cloud. The system incorporates HTTP 2.0 with SPDY to enable secure and fast...
Conference Paper
A number of recent studies have adopted risk assessment in access control for healthcare applications, but few of the work is specifically concerned with the risk assessment in the presence of uncertainties, such as uncertain values of risk factors, and consequences of imprecision. This paper presents a fuzzy modeling-based approach that accounts f...
Article
This chapter explores using service-oriented computing to reengineer non-secure legacy software applications to create new secure target applications. Two objectives of this chapter are: (1) to analyze the architectural changes required in order to adopt new web technologies and cope with resultant vulnerabilities in source code; and (2) to measure...
Chapter
This chapter explores using service-oriented computing to reengineer non-secure legacy software applications to create new secure target applications. Two objectives of this chapter are: (1) to analyze the architectural changes required in order to adopt new web technologies and cope with resultant vulnerabilities in source code; and (2) to measure...
Conference Paper
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop "Bring Your Own Device" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical pr...
Conference Paper
Cloud computing is a cutting edge technology. eHealth is one promising application of this technology. In this paper, we describe a prototype implementation of an HL7-based eHealth application on the cloud. The system is secured with a risk-aware task-based access control. We demonstrate that our access control technique is more effective for preve...
Article
Two cutting edge technologies are cloud computing and social media. Healthcare is a promising application of these technologies. In this paper, we describe our design and prototype implementation of a social healthcare network over the cloud. The system is secured with a trust-aware role-based access control. Our work addresses an unmet need in soc...
Conference Paper
Healthcare social networking is an emerging web 2.0 application that promise to bring about a whole revolution in the way that health care is delivered. In healthcare social networks, health information requires extra protection as its disclosure can have serious repercussions in the content owner's private and professional life. We have developed...
Article
Software product line development paradigm allows the development of intensive products simultaneously. Nonfunctional requirement analysis for the paradigm is a challenge problem, mainly due to the massive products that are involved. Especially in the situation where some products' nonfunctional requirements are not met, how do architects keep the...
Article
Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approach...
Article
Distributing large video files or operating system images over the Internet requires file servers with high bandwidth and large storage capacity. Overlay networks, including content distribution networks (CDN) and peer-topeer (P2P) systems, are promising network models for large file distributions. Both CDN and P2P leverage bandwidth and storage re...
Conference Paper
The transformation of healthcare from human-based to online services can expose e-health to the security threats as other online applications. The identities of legitimate e-health users need to be verified cautiously before the access privileges are granted. Since each treatment service of a patient occurs within a time interval and specific locat...
Conference Paper
e-Health services are gaining popularity due to largely reduced cost and wider range of advanced services. Securing e-health data transmission is challenging due to both (a) the criticality of personal medical information on effective medical treatment and privacy protection and (b) the significant computational needs of encryption algorithms. In t...
Conference Paper
VoIP applications have gained popularity due to largely reduced cost and wider range of advanced services, as compared to traditional telephone networks. However, SPIT (spam over Internet telephony), known as unsolicited bulk calls sent via VoIP networks, is becoming a major problem that would undermine the usability of VoIP. Unlike detection and f...
Conference Paper
Spit (Spam over Internet Telephony), known as unsolicited bulk calls sent via VoIP networks, is a major problem that undermines the usability of VoIP. Countermeasures against spit face challenges in identifying and filtering spit in real time. A user behavior based on three parameters (interaction,historical, and social ratio) is used to design an...
Conference Paper
Multiple reference frames and variable block sizes improve compression efficiency of H.264, however, they also increase the encoder complexity and motion estimation time. This paper proposes a new algorithm, called local reference with early termination (LRET) to reduce the H.264 motion estimation time without adding to the encoder complexity. The...
Conference Paper
QoS guarantee is very important and challenging for voice over IP (VoIP) applications. In this paper, a new packet scheduling scheme, called UTS, for transmitting voice flows in a fair and prioritized manner is proposed. UTS first translates user-requested voice quality into network delay requirements and then schedules the transmission of voice pa...

Citations

... Como limitações, destacam-se principalmente as condições socioeconômicas, escolaridade, e acesso à internet, como possíveis fatores de exclusão ao acesso a estes serviços de saúde mental online, como visto também em outros serviços de saúde em diferentes áreas (Lokshina & Lanting, 2018;Bai, et al., 2014). Além disso, Hennemann, et al., (2017) destacam o interesse e atualização na temática dos profissionais de saúde como um fator limitante para a implantação e difusão de serviços de saúde online, sendo necessários maiores investimentos em educação continuada dos profissionais e em fundos de acesso a internet para a população que necessita de auxílio. ...
... The proposed system was implemented using OpenStack and offers platform scalability which could be applied to the medical applications having a psychological component, such as addictions and chronic diseases. Bai et al. (2014) proposed a highlevel security framework which consists of an adaptive trust-aware tag-based privacy control, decentralised authorisation and hybrid trust management mechanism that addresses access control information depository on a cloud server. Barua et al. (2011) proposed a scheme which provides secure communication between remote patient and e-healthcare provider with acceptable communication delay and more reliability. ...
... Bring Your Own Device (BYOD) articles propose several policies or precautionary measurements that must be followed by enterprise companies and employees to protect themselves from malware that specifically target their smartphones. These articles focus on several topics, including an automated security protection for companies that orchestrate various plug-in security services by checking mobile devices for malware, misbehaving apps and configurations [133], a security architecture that improves the security of a mobile office, identifies the appropriate procedures and analyses the expected enhancements in security [134] and a protection scheme that solves the BYOD problem in businesses via distributed cloud-based access control [135]. Cryptography Solutions protect data from malware infection during their transfer from one smartphone to another. ...
... Cheng et al. [16] proposed a fuzzy multi-level access control model to quantify the risk of access and dynamically control the flow of risk information according to the current system environment, business requirements, and risk tolerance. Li et al. [17] proposed a method based on fuzzy modeling, which takes the sensitivity of data, the risk of doctors' behavior, and historical risk as input and combines historical data and fuzzy sets to calculate the risk level of medical data access. However, this method is aimed at medical data and is not universal. ...
... Their proposed Web Real-Time Communication (WebRTC) based communication approach has proven to be very effective in assisting information sharing among doctors and patients under emergency case of disaster. Choh et al. [28] proposed a HTTP 2.0 based network infrastructure for mobile cloud health, which enabled secure and fast transmission of medical information to individual users. De et al. [35] incorporated the femtocell into mobile cloud systems. ...
... Since there are no available real-world data that can be used, the values of risk factors were assumed based on the literature review [31,43]. For contextual and real-time attributes (user context), time and location features were utilized. ...
... However, research on patient data (Alagiakrishnan et al., 2016) and the anonymised exchange of sensitive information (e.g., diseases, treatments and cures) remains limited. This may be because the leaking of highly sensitive data to the public (e.g., due to unintended sharing or hacking) can lead to severe legal issues for the responsible organisation (Wooten et al., 2012). In this context, we reviewed three streams of the existing literature: IS support of (distributed) research projects in general (Franklin et al., 2011;Zheng et al., 2017); design and use of IS in cancer prevention, early detection or registration (Abuzaghleh et al., 2013;Hart et al., 2012;Kincaid et al., 2003); and IS in cancer collaboration projects (Giannoulis et al., 2017;Quo et al., 2005;Xing et al., 2007). ...
... b) ( Dai & Bai, 2011) menggunakan pendekatan dengan menggabungkan Unit Modeling Language untuk menjebatani keamanan perangkat lunak dengan aplikasi keamanan perangkat lunak dengan cara mengkoordinasikan sumber daya untuk mengembangkan perangkat lunak yang dengan keamanan sistematis dan efesien. c) ( Carlsson & Baca, 2005) melakukan revisi kode dengan menggabungkan pemeriksaan manual dan analisis static tools untuk melihat rata-rata baris kode untuk satu kerentanan yang dieksploitasi. ...
... Profiling of callers has been investigated by several researchers [16], [17], [36]. However, they assume access to large CDR datasets which have associated privacy concerns and telephony service providers do not make such datasets available due to privacy reasons. ...