[ Publications of year 2010 ]

Articles in journals or book chapters (3)
  1. L. Jean Camp. Identity management's misaligned incentives. IEEE Security & Privacy, 8(6):90--94, 2010.
    Note: IEEE.
    @Article{ camp2010identity,
    title = {Identity management's misaligned incentives},
    author = {Camp, L. Jean},
    journal = {IEEE Security \& Privacy},
    volume = {8},
    number = {6},
    pages = {90--94},
    year = {2010},
    note = {IEEE} }

  2. Nathaniel Husted, Vaibhav Garg, and L. Jean Camp. Organized Digital Crime: The Smuggling Theory Approach (A Short Paper). Available at SSRN 1713372, 2010.
    @Article{ husted2010organized,
    title = {Organized Digital Crime: The Smuggling Theory Approach (A Short Paper)},
    author = {Husted, Nathaniel and Garg, Vaibhav and Camp, L. Jean},
    journal = {Available at SSRN 1713372},
    year = {2010} }

  3. Debin Liu, L. Jean Camp, XiaoFeng Wang, and Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1):29--45, 2010.
    Keywords: Economics of Security, Insider Threat.
    @Article{ liu2010using,
    title = {Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders},
    url = {http://isyou.info/jowua/papers/jowua-v1n1-3.pdf},
    author = {Liu, Debin and Camp, L. Jean and Wang, XiaoFeng and Wang, Lusha},
    journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications},
    volume = {1},
    number = {1},
    pages = {29--45},
    keywords = {Economics of Security, Insider Threat},
    year = {2010} }

Conference publications (11)
  1. Shrirang Mare and David Kotz. Is Bluetooth the right technology for mHealth?. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2010.
    Note: Position paper.
    Keywords: ists, mhealth, position, project-tish, security.
    @InProceedings{ mare:healthsec10,
    author = {Shrirang Mare and David Kotz},
    booktitle = usenix-healthsec,
    entrysubtype = {positionpaper},
    keywords = {ists, mhealth, position, project-tish, security},
    month = {August},
    note = {Position paper},
    title = {Is {B}luetooth the right technology for {mH}ealth?},
    url = {https://www.shrirangmare.com/papers/mare2010-healthsec.pdf},
    year = {2010} }

  2. Z. Zimmerman and L. Jean Camp. Elder—friendly Design Effects on Acceptance of Novel Technologies. In , April 2010. Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.).
    Keywords: Aging.
    @InProceedings{ zimmerman2010_aging,
    title = {Elder—friendly Design Effects on Acceptance of Novel Technologies},
    author = {Zimmerman, Z. and Camp, L. Jean},
    organization = {Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.)},
    url = {http://www.ljean.com/files/TrustCube.pdf},
    keywords = "Aging",
    month = {April},
    year = {2010} }

  3. Kelly E Caine, Celine Y Zimmerman, Zachary Schall-Zimmerman, William R Hazlewood, Alexander C Sulgrove, L. Jean Camp, Katherine H Connelly, Lesa L Huber, and Kalpana Shankar. DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 153--162, 2010. ACM.
    Keywords: Aging.
    @InProceedings{ caine2010digiswitch,
    title = {DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home},
    url = {http://www.ljean.com/files/Digiswitch.pdf},
    author = {Caine, Kelly E and Zimmerman, Celine Y and Schall-Zimmerman, Zachary and Hazlewood, William R and Sulgrove, Alexander C and Camp, L. Jean and Connelly, Katherine H and Huber, Lesa L and Shankar, Kalpana},
    booktitle = {Proceedings of the 1st ACM International Health Informatics Symposium},
    pages = {153--162},
    year = {2010},
    keywords = "Aging",
    organization = {ACM} }

  4. L. Jean Camp, L Lorenzen Huber, and L Borrero. WHAT DO OLDER ADULTS UNDERSTAND ABOUT THEIR PRIVACY RISKS WHILE ONLINE?. In GERONTOLOGIST, volume 50, pages 490--490, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA.
    @InProceedings{ camp2010older,
    title = {WHAT DO OLDER ADULTS UNDERSTAND ABOUT THEIR PRIVACY RISKS WHILE ONLINE?},
    author = {Camp, L. Jean and Huber, L Lorenzen and Borrero, L},
    booktitle = {GERONTOLOGIST},
    volume = {50},
    pages = {490--490},
    year = {2010},
    organization = {OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA} }

  5. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Managing the last eights: three ways forward for IPv6. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pages 53--60, 2010. ACM.
    @InProceedings{ camp2010managing,
    title = {Managing the last eights: three ways forward for IPv6},
    author = {Camp, L. Jean and Wang, Rui and Zhou, Xiaoyong},
    booktitle = {Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies},
    pages = {53--60},
    year = {2010},
    organization = {ACM} }

  6. Zheng Dong and L. Jean Camp. Policy Proposal: Limit Address Allocation to Extend the Lifetime of IPv4 in the APNIC Region. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, GTIP '10, New York, NY, USA, pages 43--51, 2010. ACM.
    Keywords: Economics of Security.
    @InProceedings{ dong:2010:ppl:1920320.1920327,
    author = {Dong, Zheng and Camp, L. Jean},
    title = {Policy Proposal: Limit Address Allocation to Extend the Lifetime of IPv4 in the APNIC Region},
    booktitle = {Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies},
    series = {GTIP '10},
    year = {2010},
    isbn = {978-1-4503-0446-7},
    location = {Austin, Texas, USA},
    pages = {43--51},
    numpages = {9},
    url = {http://doi.acm.org/10.1145/1920320.1920327},
    doi = {10.1145/1920320.1920327},
    acmid = {1920327},
    publisher = {ACM},
    keywords = {Economics of Security},
    address = {New York, NY, USA} }

  7. V Gargv and L. Jean Camp. How Safe is Safe Enough: Online Version. In Workshop on Security and Human Behavior, 2010.
    @InProceedings{ gargv2010safe,
    title = {How Safe is Safe Enough: Online Version},
    author = {Gargv, V and Camp, L. Jean},
    booktitle = {Workshop on Security and Human Behavior},
    year = {2010} }

  8. L Lorenzen Huber, L. Jean Camp, K Connelly, K Shankar, K Caine, W Hazlewood, and Z Zimmerman. A PRIVACY FRAMEWORK FOR EVALUATING IN-HOME TECHNOLOGIES. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA.
    @InProceedings{ huber2010privacy,
    title = {A PRIVACY FRAMEWORK FOR EVALUATING IN-HOME TECHNOLOGIES},
    author = {Huber, L Lorenzen and Camp, L. Jean and Connelly, K and Shankar, K and Caine, K and Hazlewood, W and Zimmerman, Z},
    booktitle = {GERONTOLOGIST},
    volume = {50},
    pages = {455--455},
    year = {2010},
    organization = {OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA} }

  9. Shrirang Mare, David Kotz, and Anurag Kumar. Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks. In Proceedings of the Workshop on Wireless Systems: Advanced Research and Development (WISARD), January 2010.
    Keywords: mobility, project-wifi, wifi.
    @InProceedings{ mare:models,
    author = {Shrirang Mare and David Kotz and Anurag Kumar},
    booktitle = {Proceedings of the Workshop on Wireless Systems: Advanced Research and Development (WISARD)},
    doi = {10.1109/COMSNETS.2010.5431957},
    entrysubtype = {workshop},
    keywords = {mobility, project-wifi, wifi},
    month = jan,
    numpages = {8},
    title = {Experimental Validation of Analytical Performance Models for {IEEE} 802.11 Networks},
    year = {2010} }

  10. Azadeh Nematzadeh and L. Jean Camp. Threat analysis of online health information system. In Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, pages 31, 2010. ACM.
    @InProceedings{ nematzadeh2010threat,
    title = {Threat analysis of online health information system},
    author = {Nematzadeh, Azadeh and Camp, L. Jean},
    booktitle = {Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments},
    pages = {31},
    year = {2010},
    organization = {ACM} }

  11. B Walker, L Lorenzen Huber, and L. Jean Camp. DO THE COSTS OUTWEIGH THE BENEFITS? USING A RESOURCE-ORIENTED PERSPECTIVE TO EVALUATE MOBILE PHONE APPS. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA.
    @InProceedings{ walker2010costs,
    title = {DO THE COSTS OUTWEIGH THE BENEFITS? USING A RESOURCE-ORIENTED PERSPECTIVE TO EVALUATE MOBILE PHONE APPS},
    author = {Walker, B and Huber, L Lorenzen and Camp, L. Jean},
    booktitle = {GERONTOLOGIST},
    volume = {50},
    pages = {455--455},
    year = {2010},
    organization = {OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA} }

Posters and Presentations (1)
  1. L CAMP, John DUNCAN, and others. PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES, Jan # 22 2010.
    Note: WO Patent 2,010,009,361.
    @Misc{ camp2010privacy,
    title = {PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=329282},
    author = {CAMP, L and DUNCAN, John and others},
    year = {2010},
    month = jan # "~22",
    note = {WO Patent 2,010,009,361} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:15 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House