Author image not provided
 Jean Jean Camp

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.12
Citation Count181
Publication count58
Publication years1993-2016
Available for download25
Average downloads per article617.68
Downloads (cumulative)15,442
Downloads (12 Months)1,862
Downloads (6 Weeks)143
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


58 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 58
Result page: 1 2 3

Sort by:

1 published by ACM
October 2016 SafeConfig '16: Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 39,   Downloads (Overall): 72

Full text available: PDFPDF
In this paper we describe a system that allows the real time creation of firewall rules in response to geographic and political changes in the control-plane. This allows an organization to mitigate data exfiltration threats by analyzing Border Gateway Protocol (BGP) updates and blocking packets from being routed through problematic ...
Keywords: prefix hijacking, BGP, routing security

2 published by ACM
September 2016 ACM Transactions on Privacy and Security (TOPS): Volume 19 Issue 2, September 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 73,   Downloads (12 Months): 537,   Downloads (Overall): 734

Full text available: PDFPDF
Rogue certificates are valid certificates issued by a legitimate certificate authority (CA) that are nonetheless untrustworthy; yet trusted by web browsers and users. With the current public key infrastructure, there exists a window of vulnerability between the time a rogue certificate is issued and when it is detected. Rogue certificates ...
Keywords: Certificates, machine learning

3 published by ACM
July 2015 ACM SIGCAS Computers and Society: Volume 45 Issue 2, June 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 632,   Downloads (Overall): 1,174

Full text available: PDFPDF
How do cybercrime markets emerge, evolve, and persist? How can cybercrime be prevented, decreased and mitigated? Extant anti-cybercrime efforts have concentrated on deterrence through criminal prosecution and technical mitigation. Deterrence-only strategies, however, may be more expensive for the network than for attackers, particularly considering the asymmetric nature of computer security. ...
Keywords: cultural theories, cybercrime, economics

4 published by ACM
June 2015 Communications of the ACM: Volume 58 Issue 7, July 2015
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6,   Downloads (12 Months): 150,   Downloads (Overall): 717

Full text available: HtmlHtml  PDFPDF
Minimizing data collection to protect user privacy and increase security.

5
April 2014
Bibliometrics:
Citation Count: 0

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of ...

6
December 2013 EURASIP Journal on Information Security: Volume 2013 Issue 1, December 2013
Publisher: Hindawi Limited
Bibliometrics:
Citation Count: 1

Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a higher percentage of systems acting as spambots compared to other countries? We begin to answer there questions by ...
Keywords: Spam, Botnets, Cybercrime, Economics, Security

7 published by ACM
August 2013 HotSDN '13: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 14,   Downloads (12 Months): 257,   Downloads (Overall): 1,316

Full text available: PDFPDF
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch vendors, leaving OpenFlow vulnerable to man-in-the-middle attacks. We also ...
Keywords: openflow, software-defined networking

8 published by ACM
February 2013 CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 35,   Downloads (Overall): 306

Full text available: PDFPDF
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user ...
Keywords: experts, eye-tracking, usability, security indicators, web browsers, https, single sign-on

9
October 2012 IEEE Pervasive Computing: Volume 11 Issue 4, October 2012
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 8

Applications for "aging in place" focus on supporting elders and informing the caregiver but often at the risk of abrogating privacy. The authors developed and tested various prototypes to create a privacy framework for designing home-based computing for seniors.
Keywords: Privacy,Prototypes,Monitoring,Gerontology,Aging,Medical services,Biomedical monitoring,gerontechnology,pervasive computing,privacy,design

10 published by ACM
September 2012 NSPW '12: Proceedings of the 2012 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 110

Full text available: PDFPDF
Security solutions fail not only because of technological or usability limitations, but also due to economic constraints and lack of coordinated adoption. Existing research conceptualizes security as a public good suffering from underinvestment, or as a private good with externalities, i.e. consequences that are not part of the price. It ...
Keywords: social networks, peer production, computer security, trust

11
August 2012 HotSec'12: Proceedings of the 7th USENIX conference on Hot Topics in Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Peer production and crowdsourcing have been widely implemented to create various types of goods and services. Although successful examples such as Linux and Wikipedia have been established in other domains, experts have paid little attention to peer-produced systems in computer security beyond collaborative recommender and intrusion detection systems. In this ...

12
August 2012 CSET'12: Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

We conducted a study of student web browsing habits at Indiana University's Bloomington campus, in which we examined the web page requests of over 1,000 students during a period of two months. In this paper, we discuss the details of the study development and implementation from the point of view ...

13 published by ACM
August 2012 ACM SIGCAS Computers and Society: Volume 42 Issue 1, August 2012
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 19,   Downloads (Overall): 235

Full text available: PDFPDF
The interpretation of the terms 'information' and 'ethics' is often culturally situated. A common understanding is contingent to facilitating dialogue concerning the novel ethical issues we face during computer-mediated interactions. Developing a nuanced understanding of information ethics is critical at a point when the number of information and communication technology ...

14 published by ACM
July 2012 LASER '12: Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 10,   Downloads (Overall): 94

Full text available: PDFPDF
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We ...

15
July 2012 PETS'12: Proceedings of the 12th international conference on Privacy Enhancing Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

There are significant differences between older and younger adults in terms of risk perception and risk behaviors offline. The previously unexplored existence of this dissimilitude online is the motivation for our work. What are the risk perceptions of older adults? How are these correlated with the classic dimensions of risk ...
Keywords: video, malware, mental models, phishing, privacy, risk

16
May 2012 SPW '12: Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

Users' mental models of security, though possibly incorrect, embody patterns of reasoning about security that lead to systematic behaviors across tasks and may be shared across populations of users. Researchers have identified widely held mental models of security, usually with the purpose of improving communications and warnings about vulnerabilities. Here, ...
Keywords: computer security, cognitive science, mental models

17
March 2012
Bibliometrics:
Citation Count: 0

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of ...

18
January 2012 HICSS '12: Proceedings of the 2012 45th Hawaii International Conference on System Sciences
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 8

In this paper we leverage a canonical nine dimensional model of offline risk perception to better understand online risk perceptions. Understanding risk perception facilitates the development of better risk communication and mitigation technologies. We conducted a classic off-line survey to identify the dimensions of online risk perceptions of end users. ...
Keywords: Risk Perception, Security, Privacy, End-User

19 published by ACM
October 2011 ACM SIGCAS Computers and Society: Volume 41 Issue 1, October 2011
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 56

Full text available: PDFPDF
The best way to protect information is never to release it. Yet even the earliest definition of security recognizes availability as a necessary quality. In this work, we seek to quantify the value of information disclosure for web resource evaluation and discovery. Communal evaluation tools help users share ratings on ...
Keywords: collaborative search, empirical analysis, network size, communal evaluation

20
April 2011 Journal of Computing Sciences in Colleges: Volume 26 Issue 4, April 2011
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 0

Economic and technical trends have created the need for specialists in computer security. Rather than requiring the creation of ever more narrow programs of study, security informatics offers a different path. Unlike traditional computer security programs in computer science departments, this program focuses on a holistic view of security by ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us