[ Publications of year 2005 ]
Articles in journals or book chapters (4) |
-
L. Jean Camp and Allan Friedman.
Peer Production of Privacy and Security Information.
Telecommunications Policy Research Conference,
June 2005.
Keywords: Peer Production, Crowdsourcing of Security, Economics of Security.@Article{ camppeer,
title = {Peer Production of Privacy and Security Information},
url = {http://www.ljean.com/files/nEighborhood.pdf},
keywords = "Peer Production, Crowdsourcing of Security, Economics of Security",
journal = {Telecommunications Policy Research Conference},
month = {June},
year = {2005},
author = {Camp, L. Jean and Friedman, Allan} } -
L. Jean Camp.
The state of economics of information security.
ISJLP,
2:189,
2005.
Keywords: Economics of Security, Governance.@Article{ camp2005state,
title = {The state of economics of information security},
author = {Camp, L. Jean},
journal = {ISJLP},
volume = {2},
pages = {189},
keywords = {Economics of Security, Governance},
year = {2005} } -
Allan Friedman and L. Jean Camp.
Peer-to-peer security.
The Handbook of Information Security. J. Wiley&Sons,
2005.
Note: Citeseer.@Article{ friedman2005peer,
title = {Peer-to-peer security},
url = {http://www.ljean.com/files/P2P.pdf},
author = {Friedman, Allan and Camp, L. Jean},
journal = {The Handbook of Information Security. J. Wiley\&Sons},
year = {2005},
note = {Citeseer} } -
Alla Genkina and L. Jean Camp.
Re-embedding existing social networks into online experiences to aid in trust assessment.
Available at SSRN 707139,
2005.
@Article{ genkina2005re,
title = {Re-embedding existing social networks into online experiences to aid in trust assessment},
author = {Genkina, Alla and Camp, L. Jean},
journal = {Available at SSRN 707139},
year = {2005} }
Conference publications (3) |
-
L. Jean Camp,
Warigia Bowman,
and Allan Friedman.
Voting, vote capture & vote counting symposium.
In Proceedings of the 2005 national conference on Digital government research,
pages 198--199,
May 2005.
Digital Government Society of North America.
Keywords: Peer Production, Crowdsourcing of Security.@InProceedings{ camp2005voting,
title = {Voting, vote capture \& vote counting symposium},
url = {http://www.ljean.com/files/ABPractices.pdf},
author = {Camp, L. Jean and Bowman, Warigia and Friedman, Allan},
booktitle = {Proceedings of the 2005 national conference on Digital government research},
pages = {198--199},
month = {May},
year = {2005},
keywords = "Peer Production, Crowdsourcing of Security",
organization = {Digital Government Society of North America} } -
DongInn Kim,
Jeffrey M. Squyres,
and Andrew Lumsdaine.
Revamping the OSCAR database: A Flexible Approach to Cluster Configuration Data Management.
In Ilias Kotsireas and Deborah Stacey, editors,
19th International Symposium on High Performance Computing Systems and Applications,
Guelph, Ontario, Canada,
pages 326-332,
May 2005.
IEEE Computer Society.
Keywords: OSCAR, high performance computing, cluster.@InProceedings{ kim05:_revam_oscar,
author = {DongInn Kim and Jeffrey M.\ Squyres and Andrew Lumsdaine},
title = {Revamping the {OSCAR} database: A Flexible Approach to Cluster Configuration Data Management},
booktitle = {19th International Symposium on High Performance Computing Systems and Applications},
pages = {326-332},
year = 2005,
editor = {Ilias Kotsireas and Deborah Stacey},
address = {Guelph, Ontario, Canada},
month = {May},
publisher = {IEEE Computer Society},
url = {http://www.csm.ornl.gov/oscar05/},
keywords = "OSCAR, high performance computing, cluster",
institution = {Lilly Endowment} } -
L. Jean Camp,
Kay Connelly,
and Kalpana Shankar.
Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design.
In Proceedings of ETHICOMP,
pages 12--14,
2005.
@InProceedings{ camp2005design,
title = {Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design},
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=627610},
author = {Camp, L. Jean and Connelly, Kay and Shankar, Kalpana},
booktitle = {Proceedings of ETHICOMP},
pages = {12--14},
year = {2005} }
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House