[ Publications of Allan Friedman ]

Articles in journals or book chapters (3)
  1. L. Jean Camp and Allan Friedman. Peer Production of Privacy and Security Information. Telecommunications Policy Research Conference, June 2005.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Information Security. [bibtex-entry]

  2. Allan Friedman and L. Jean Camp. Peer-to-peer security. The Handbook of Information Security. J. Wiley&Sons, 2005.
    Note: Citeseer. [bibtex-entry]

  3. L. Jean Camp and Allan Friedman. Security in Peer to Peer Systems. In The Handbook of Information Security. John Wiley & Sons, 2004.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-entry]

Conference publications (4)
  1. L. Jean Camp, Warigia Bowman, and Allan Friedman. Voting, vote capture & vote counting symposium. In Proceedings of the 2005 national conference on Digital government research, pages 198--199, May 2005. Digital Government Society of North America.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-entry]

  2. L. Jean Camp and Allan Friedman. Peer Patching--Rapid Response in Distributed Systems. In 24th Army Science Conference, December 2004.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-entry]

  3. L. Jean Camp and Allan Friedman. Good neighbors can make good fences: A peer-to-peer user security system. In Telecommunications Policy and Research Conference, 2004. [bibtex-entry]

  4. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Information Security. [bibtex-entry]

Posters and Presentations (1)
  1. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, July 2008. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Sun Sep 27 01:00:06 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House