Search For:

Displaying 1-14 out of 14 total
An Atomicity-Generating Protocol for Anonymous Currencies
Found in: IEEE Transactions on Software Engineering
By L. Jean Camp
Issue Date:March 2001
pp. 272-278
<p><b>Abstract</b>—Atomicity is necessary for reliable electronic commerce transactions [<ref rid=
 
Aging, Privacy, and Home-Based Computing: Developing a Design Framework
Found in: IEEE Pervasive Computing
By Kalpana Shankar,L. Jean Camp,Kay Connelly,Lesa Huber
Issue Date:October 2012
pp. 46-54
Applications for "aging in place" focus on supporting elders and informing the caregiver but often at the risk of abrogating privacy. The authors developed and tested various prototypes to create a privacy framework for designing home-based compu...
 
First Principles of Copyright for DRM Design
Found in: IEEE Internet Computing
By L. Jean Camp
Issue Date:May 2003
pp. 59-65
<p>The copyright system?s legal, technological, and economic foundations define key concepts that have significant implications for digital rights management system design.</p>
 
Helping You Protect You
Found in: IEEE Security & Privacy
By M. Angela Sasse,Charles C. Palmer,Markus Jakobsson,Sunny Consolvo,Rick Wash,L. Jean Camp
Issue Date:January 2014
pp. 39-42
Guest editors M. Angela Sasse and Charles C. Palmer speak with security practitioners about what companies are doing to keep customers secure, and what users can do to stay safe.
 
Security Risk Management Using Incentives
Found in: IEEE Security and Privacy
By Debin Liu,Ninghui Li,XiaoFeng Wang,L. Jean Camp
Issue Date:November 2011
pp. 20-28
The authors propose an incentive-based access control (IBAC) that uses separate mechanisms for controlling aggregated risks and incentivizing users to reduce unnecessary risks. This mechanism encourages users to make necessary accesses while discouraging t...
 
OpenFlow vulnerability assessment
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Chris Small, Kevin Benton, L. Jean Camp
Issue Date:August 2013
pp. 151-152
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch v...
     
Pools, clubs and security: designing for a party not a person
Found in: Proceedings of the 2012 workshop on New security paradigms (NSPW '12)
By Apu Kapadia, L. Jean Camp, Vaibhav Garg, Zheng Dong
Issue Date:September 2012
pp. 77-86
Security solutions fail not only because of technological or usability limitations, but also due to economic constraints and lack of coordinated adoption. Existing research conceptualizes security as a public good suffering from underinvestment, or as a pr...
     
Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences
Found in: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER '12)
By Douglas Stebila, L. Jean Camp, Suzanne Lien, Timothy Kelley
Issue Date:July 2012
pp. 47-54
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggr...
     
Managing the last eights: three ways forward for IPv6
Found in: Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies (GTIP '10)
By L. Jean Camp, Rui Wang, Xiaoyong Zhou
Issue Date:December 2010
pp. 53-60
IP addresses are critical resources for Internet development. The available IPv4 address pool is projected to fully allocated within 3--5 years, but the deployment of the alternative protocol, IPv6, is not accelerating. Recently, several proposals have int...
     
Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region
Found in: Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies (GTIP '10)
By L. Jean Camp, Zheng Dong
Issue Date:December 2010
pp. 43-51
The fourth revision of the Internet protocol (IPv4) has been so widely implemented, that the IPv4 address pool approaches full allocation. Currently, only 8% of the IPv4 address blocks are not yet allocated by IANA. Based on the allocation history, IPv4 ad...
     
Threat analysis of online health information system
Found in: Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA '10)
By Azadeh Nematzadeh, L. Jean Camp
Issue Date:June 2010
pp. 1-7
Electronic health records are increasingly used to enhance availability, recovery, and transfer of health records. Newly developed online health systems such as Google-Health create new security and privacy risks. In this paper, we elucidate a clear threat...
     
The portal monitor: a privacy-enhanced event-driven system for elder care
Found in: Proceedings of the 4th International Conference on Persuasive Technology (Persuasive '09)
By John Duncan, L. Jean Camp, William R. Hazelwood
Issue Date:April 2009
pp. 1-32
We describe an innovative monitoring system designed for elder care. This system is an example of privacy-aware design that addresses specific risks based on gerontology literature and confirmed by focus groups with representations of the target group. The...
     
The code of elections
Found in: Communications of the ACM
By L. Jean Camp, Rebecca T. Mercuri
Issue Date:October 2004
pp. 52-57
The disparity between the code of election law and the code that comprises election equipment reflects inherent problems in the translation of social policies into computer procedures and overseeing processes.
     
DRM: doesn't really mean digital copyright management
Found in: Proceedings of the 9th ACM conference on Computer and communications security (CCS '02)
By L. Jean Camp
Issue Date:November 2002
pp. 78-87
Copyright is a legal system embedded in a larger technological system. In order to examine the functions of copyright it is critical to examine the larger technological context of copyright: analog media and printed paper in particular. The copyright syste...
     
 1