[ Publications of year 2010 ]

Articles in journals or book chapters (3)
  1. L. Jean Camp. Identity management's misaligned incentives. IEEE Security & Privacy, 8(6):90--94, 2010.
    Note: IEEE. [bibtex-entry]

  2. Nathaniel Husted, Vaibhav Garg, and L. Jean Camp. Organized Digital Crime: The Smuggling Theory Approach (A Short Paper). Available at SSRN 1713372, 2010. [bibtex-entry]

  3. Debin Liu, L. Jean Camp, XiaoFeng Wang, and Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1):29--45, 2010.
    Keywords: Economics of Security, Insider Threat. [bibtex-entry]

Conference publications (11)
  1. Shrirang Mare and David Kotz. Is Bluetooth the right technology for mHealth?. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2010.
    Note: Position paper.
    Keywords: ists, mhealth, position, project-tish, security. [bibtex-entry]

  2. Z. Zimmerman and L. Jean Camp. Elder—friendly Design Effects on Acceptance of Novel Technologies. In , April 2010. Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.).
    Keywords: Aging. [bibtex-entry]

  3. Kelly E Caine, Celine Y Zimmerman, Zachary Schall-Zimmerman, William R Hazlewood, Alexander C Sulgrove, L. Jean Camp, Katherine H Connelly, Lesa L Huber, and Kalpana Shankar. DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 153--162, 2010. ACM.
    Keywords: Aging. [bibtex-entry]

  4. L. Jean Camp, L Lorenzen Huber, and L Borrero. WHAT DO OLDER ADULTS UNDERSTAND ABOUT THEIR PRIVACY RISKS WHILE ONLINE?. In GERONTOLOGIST, volume 50, pages 490--490, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]

  5. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Managing the last eights: three ways forward for IPv6. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pages 53--60, 2010. ACM. [bibtex-entry]

  6. Zheng Dong and L. Jean Camp. Policy Proposal: Limit Address Allocation to Extend the Lifetime of IPv4 in the APNIC Region. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, GTIP '10, New York, NY, USA, pages 43--51, 2010. ACM.
    Keywords: Economics of Security. [bibtex-entry]

  7. V Gargv and L. Jean Camp. How Safe is Safe Enough: Online Version. In Workshop on Security and Human Behavior, 2010. [bibtex-entry]

  8. L Lorenzen Huber, L. Jean Camp, K Connelly, K Shankar, K Caine, W Hazlewood, and Z Zimmerman. A PRIVACY FRAMEWORK FOR EVALUATING IN-HOME TECHNOLOGIES. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]

  9. Shrirang Mare, David Kotz, and Anurag Kumar. Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks. In Proceedings of the Workshop on Wireless Systems: Advanced Research and Development (WISARD), January 2010.
    Keywords: mobility, project-wifi, wifi. [bibtex-entry]

  10. Azadeh Nematzadeh and L. Jean Camp. Threat analysis of online health information system. In Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, pages 31, 2010. ACM. [bibtex-entry]

  11. B Walker, L Lorenzen Huber, and L. Jean Camp. DO THE COSTS OUTWEIGH THE BENEFITS? USING A RESOURCE-ORIENTED PERSPECTIVE TO EVALUATE MOBILE PHONE APPS. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-entry]

Posters and Presentations (1)
  1. L CAMP, John DUNCAN, and others. PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES, Jan # 22 2010.
    Note: WO Patent 2,010,009,361. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:14 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House