Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daisuke Mashima is active.

Publication


Featured researches published by Daisuke Mashima.


recent advances in intrusion detection | 2012

Evaluating electricity theft detectors in smart grid networks

Daisuke Mashima; Alvaro A. Cárdenas

Electricity theft is estimated to cost billions of dollars per year in many countries. To reduce electricity theft, electric utilities are leveraging data collected by the new Advanced Metering Infrastructure (AMI) and using data analytics to identify abnormal consumption trends and possible fraud. In this paper, we propose the first threat model for the use of data analytics in detecting electricity theft, and a new metric that leverages this threat model in order to evaluate and compare anomaly detectors. We use real data from an AMI system to validate our approach.


IEEE Transactions on Visualization and Computer Graphics | 2012

Visualizing Dynamic Data with Maps

Daisuke Mashima; Stephen G. Kobourov; Yifan Hu

Maps offer a familiar way to present geographic data (continents, countries), and additional information (topography, geology), can be displayed with the help of contours and heat-map overlays. In this paper, we consider visualizing large-scale dynamic relational data by taking advantage of the geographic map metaphor. We describe a map-based visualization system which uses animation to convey dynamics in large data sets, and which aims to preserve the viewers mental map while also offering readable views at all times. Our system is fully functional and has been used to visualize user traffic on the Internet radio station last.fm, as well as TV-viewing patterns from an IPTV service. All map images in this paper are available in high-resolution at [CHECK END OF SENTENCE] as are several movies illustrating the dynamic visualization.


international health informatics symposium | 2012

Enhancing accountability of electronic health record usage via patient-centric monitoring

Daisuke Mashima; Mustaque Ahamad

Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and efficiency of their healthcare. Unfortunately, misuse of information stored in EHR and PHR systems will create new risks for patients, and we need to empower them to safeguard their health information to avoid problems such as medical identity theft. In this paper, we introduce the notion of accountable use and update of electronic health records and design a patient-centric monitoring system based on it. We develop a system architecture and associated protocols that enable either explicit or implicit patient control over when and how health information is accessed. Our approach provides a reasonable solution rather than addressing the more general information flow control problem in distributed systems. We also implement and evaluate a prototype system motivated by a health record sharing scenario based on NHIN Direct to demonstrate that enhanced accountability can be supported with acceptable performance and integration overheads.


international conference on internet monitoring and protection | 2008

Towards a User-Centric Identity-Usage Monitoring System

Daisuke Mashima; Mustaque Ahamad

The misuse of identity-related information in cyberspace is one of the biggest concerns among all Internet users. So far several technologies have been proposed and implemented to prevent and detect identity theft and misuse, but none of them are completely successful in terms of privacy, user-centricity and generality. In this paper, we identify the requirements for a user-centric identity-usage monitoring system to solve such problems and propose a monitoring system that runs on a trusted third party. This system can transparently use context information of a request to detect anomalous use of online identity. Finally, we provide a prototypical implementation in an OpenID setting and evaluate it in terms of scalability, performance, user-centricity, and security.


ieee pacific visualization symposium | 2011

Visualizing dynamic data with maps

Daisuke Mashima; Stephen G. Kobourov; Yifan Hu

Maps offer a familiar way to present geographic data (continents, countries), and additional information (topography, geology), can be displayed with the help of contours and heat-map overlays. In this paper we consider visualizing large-scale dynamic relational data by taking advantage of the geographic map metaphor. We describe a system that visualizes user traffic on the Internet radio station last.fm and address challenges in mental map preservation, as well as issues in animated map-based visualization.12


european symposium on research in computer security | 2009

User-centric handling of identity agent compromise

Daisuke Mashima; Mustaque Ahamad; Swagath Kannan

Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery of potentially compromised credentials is desirable. By following a user-centric identity-usage monitoring concept, we propose a way to enhance a user-centric IdMS by introducing an online monitoring agent and an inexpensive storage token that allow users to flexibly choose transactions to be monitored and thereby to balance security, privacy and usability. In addition, by utilizing a threshold signature scheme, our system enables users to revoke and recover credentials without communicating with identity providers. Our contributions include a system architecture, associated protocols and an actual implementation of an IdMS that achieves these goals.


digital identity management | 2009

Using identity credential usage logs to detect anomalous service accesses

Daisuke Mashima; Mustaque Ahamad

For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a variety of defenses and invest significant time and effort to the analysis of a large amount of log data to detect malicious activities and their impact. To reduce this burden, we explore the effectiveness of an anomaly detection based approach that relies on identity credential usage log records. More specifically, we use an anomaly-based metric to score the risk of each identity credential usage, e.g., a login request. Scores are determined based on categorical attribute values extracted from log records, such as timestamps. We utilize actual log data of login attempts to a university portal to evaluate the effectiveness of this approach. Our approach can work in conjunction with intrusion or fraud detection systems. It is also possible that stronger authentication can be required only when the risk score is high, which can help balance security and usability demands.


pervasive computing and communications | 2011

Privacy settings from contextual attributes: A case study using Google Buzz

Daisuke Mashima; Prateek Sarkar; Elaine Shi; Chris Li; Richard Chow; Dawn Song

Social networks provide users with privacy settings to control what information is shared with connections and other users. In this paper, we analyze factors influencing changes in privacy-related settings in the Google Buzz social network. Specifically, we show statistics on contextual data related to privacy settings that are derived from crawled datasets and analyze the characteristics of users who changed their privacy settings. We also investigate potential neighboring effects among such users.


Archive | 2009

A Patient-centric, Attribute-based, Source-verifiable Framework for Health Record Sharing

Apurva Mohan; David Bauer; Douglas M. Blough; Mustaque Ahamad; Bhuvan Bamba; Ramkumar Krishnan; Ling Liu; Daisuke Mashima; Balaji Palanisamy


HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy | 2012

Enabling robust information accountability in E-healthcare systems

Daisuke Mashima; Mustaque Ahamad

Collaboration


Dive into the Daisuke Mashima's collaboration.

Top Co-Authors

Avatar

Mustaque Ahamad

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David Bauer

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Douglas M. Blough

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alvaro A. Cárdenas

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dawn Song

University of California

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge