[ Publications of year 1997 ]

Articles in journals or book chapters (1)
  1. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security.
    @Article{ camp1997critical,
    title = {Critical issues in internet commerce},
    author = {Camp, L. Jean and Sirbu, Marvin},
    journal = {IEEE Communications Magazine},
    volume = {35},
    number = {5},
    pages = {58--62},
    month = {May},
    year = {1997},
    keywords = "Human-Centered Security",
    publisher = {IEEE} }

Conference publications (4)
  1. David A Evensky, Ann C Gentile, L. Jean Camp, and Robert C Armstrong. Lilith: Scalable execution of user code for distributed computing. In High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on, pages 305--314, August 1997. IEEE.
    Keywords: Network Engineering.
    @InProceedings{ evensky1997lilith,
    title = {Lilith: Scalable execution of user code for distributed computing},
    url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=626436},
    author = {Evensky, David A and Gentile, Ann C and Camp, L. Jean and Armstrong, Robert C},
    booktitle = {High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on},
    pages = {305--314},
    month = {August},
    year = {1997},
    keywords = "Network Engineering",
    organization = {IEEE} }

  2. L. Jean Camp and D.A. Evensky. Survivability & Trust. In , pages 12--14, May 1997. Research Directions for the Next Generation Internet, Washington, DC.
    Keywords: Design for Trust, Network Engineering.
    @InProceedings{ camp1997trust,
    title = {Survivability \& Trust},
    author = {Camp, L. Jean and Evensky, D.A.},
    keywords = "Design for Trust, Network Engineering",
    url = {http://www.ljean.com/files/NGIwhitepaper.pdf},
    organization = {Research Directions for the Next Generation Internet, Washington, DC},
    pages = {12--14},
    month = {May},
    year = {1997} }

  3. L. Jean Camp and Donna M Riley. Bedrooms, Barrooms, and Boardrooms on the Interner. In Interconnection and the Internet: selected papers from the 1996 Telecommunications Policy Research Conference, pages 205, 1997. Lawrence Erlbaum.
    Keywords: Gender Online.
    @InProceedings{ camp1997bedrooms,
    title = {Bedrooms, Barrooms, and Boardrooms on the Interner},
    url = {http://www.ljean.com/files/media.html},
    author = {Camp, L. Jean and Riley, Donna M},
    booktitle = {Interconnection and the Internet: selected papers from the 1996 Telecommunications Policy Research Conference},
    pages = {205},
    year = {1997},
    keywords = "Gender Online",
    organization = {Lawrence Erlbaum} }

  4. L. Jean Camp. Opportunities, Options, Obstacles for Payment in Internet Commerce. In EDI FORUM-OAK PARK-, volume 10, pages 19--32, 1997. THE EDI GROUP, LTD..
    @InProceedings{ camp1997opportunities,
    title = {Opportunities, Options, Obstacles for Payment in Internet Commerce},
    author = {Camp, L. Jean},
    booktitle = {EDI FORUM-OAK PARK-},
    volume = {10},
    pages = {19--32},
    year = {1997},
    organization = {THE EDI GROUP, LTD.} }

Internal reports (1)
  1. RC Armstrong, L. Jean Camp, DA Evensky, and AC Gentile. Lilith: A scalable secure tool for massively parallel distributed computing. Technical report, Sandia National Labs., Albuquerque, NM (United States), 1997.
    @TechReport{ armstrong1997lilith,
    title = {Lilith: A scalable secure tool for massively parallel distributed computing},
    author = {Armstrong, RC and Camp, L. Jean and Evensky, DA and Gentile, AC},
    year = {1997},
    institution = {Sandia National Labs., Albuquerque, NM (United States)} }

Posters and Presentations (1)
  1. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering.
    @Misc{ painton1997_presentation,
    title = {Risk—based characterization of network vulnerability},
    author = {L. Painton and T. Gaylor and Camp, L. Jean and C. Phillips and G. Wyss},
    month = {February},
    year = {1997},
    keywords = "Network Engineering",
    howpublished = {CERT Information Survivability Workshop},
    url = {http://www.ljean.com/files/isw.pdf} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Aug 11 01:00:07 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House