[ Publications of year 2009 ]

Articles in journals or book chapters (5)
  1. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, pp 1--16, February 2009.
    Keywords: E-Crime.
    @Article{ liu2009mitigating,
    title = {Mitigating inadvertent insider threats with incentives},
    url = {http://www.ljean.com/files/FC09.pdf},
    author = {Liu, Debin and Wang, XiaoFeng and Camp, L. Jean},
    journal = {Financial Cryptography and Data Security},
    pages = {1--16},
    month = {February},
    year = {2009},
    keywords = "E-Crime",
    publisher = {Springer} }

  2. Farzaneh Asgharpour, Alex Tsow, Preeti Hariharan, and L. Jean Camp. A Usability Study on the Net Trust Anti-Fraud Toolbar. 2009.
    @Article{ asgharpour2009usability,
    title = {A Usability Study on the Net Trust Anti-Fraud Toolbar},
    author = {Asgharpour, Farzaneh and Tsow, Alex and Hariharan, Preeti and Camp, L. Jean},
    year = {2009} }

  3. L. Jean Camp. Mental models of privacy and security. Technology and Society Magazine, IEEE, 28(3):37--46, 2009.
    @Article{ camp2009mental,
    title = {Mental models of privacy and security},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735},
    author = {Camp, L. Jean},
    journal = {Technology and Society Magazine, IEEE},
    volume = {28},
    number = {3},
    pages = {37--46},
    year = {2009},
    publisher = {IEEE} }

  4. L. Jean Camp. Power and Security in the Information Age. Routledge, 2009.
    @Article{ camp2009power,
    title = {Power and Security in the Information Age},
    author = {Camp, L. Jean},
    year = {2009},
    journal = {Routledge} }

  5. Camilo Viecco and L. Jean Camp. A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy. Trust Management III, pp 234--251, 2009.
    Note: Springer.
    @Article{ viecco2009risk,
    title = {A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy},
    author = {Viecco, Camilo and Camp, L. Jean},
    journal = {Trust Management III},
    pages = {234--251},
    year = {2009},
    note = {Springer} }

Conference publications (3)
  1. L. Jean Camp. Design for trust in ambient and ubiquitous computing. In International Conference on Autonomic and Trusted Computing, pages 1--1, 2009. Springer Berlin Heidelberg.
    @InProceedings{ camp2009design,
    title = {Design for trust in ambient and ubiquitous computing},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=627610},
    author = {Camp, L. Jean},
    booktitle = {International Conference on Autonomic and Trusted Computing},
    pages = {1--1},
    year = {2009},
    organization = {Springer Berlin Heidelberg} }

  2. L. Jean Camp. Hardening the Network from the Friend Within. In Information Security and Privacy, pages 249--249, 2009. Springer.
    @InProceedings{ camp2009hardening,
    title = {Hardening the Network from the Friend Within},
    author = {Camp, L. Jean},
    booktitle = {Information Security and Privacy},
    pages = {249--249},
    year = {2009},
    organization = {Springer} }

  3. John Duncan, L. Jean Camp, and William R Hazelwood. The portal monitor: a privacy-enhanced event-driven system for elder care. In Proceedings of the 4th International Conference on Persuasive Technology, pages 36, 2009. ACM.
    @InProceedings{ duncan2009portal,
    title = {The portal monitor: a privacy-enhanced event-driven system for elder care},
    author = {Duncan, John and Camp, L. Jean and Hazelwood, William R},
    booktitle = {Proceedings of the 4th International Conference on Persuasive Technology},
    pages = {36},
    year = {2009},
    organization = {ACM} }

Posters and Presentations (2)
  1. L. Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. Data for cybersecurity research: Process and wish list. Academic Press, 2009.
    @Misc{ camp2009data,
    title = {Data for cybersecurity research: Process and "wish list"},
    url = {http://www.ljean.com/files/data-wishlist.pdf},
    author = {Camp, L. Jean and Cranor, Lorrie and Feamster, Nick and Feigenbaum, Joan and Forrest, Stephanie and Kotz, Dave and Lee, Wenke and Lincoln, Patrick and Paxson, Vern and Reiter, Mike and others},
    journal = {http://www.stapleton-gray.com/papers/data-wishlist.pdf},
    year = {2009},
    howpublished = {Academic Press} }

  2. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4. ARIN, 2009.
    Keywords: Network Engineering.
    @Misc{ camp2009policy,
    title = {Policy proposal: Limit the address allocation to extend the lifetime of ipv4},
    url = {http://www.cs.indiana.edu/~zhdong/publication/ipv6.pdf},
    author = {Camp, L. Jean and Wang, Rui and Zhou, Xiaoyong},
    year = {2009},
    keywords = "Network Engineering",
    howpublished = {ARIN} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Aug 11 01:00:07 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House