Author image not provided
 Aviel David Rubin

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article26.68
Citation Count1,601
Publication count60
Publication years1994-2016
Available for download21
Average downloads per article1,883.38
Downloads (cumulative)39,551
Downloads (12 Months)1,398
Downloads (6 Weeks)163
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


60 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 60
Result page: 1 2 3 4

Sort by:

1 published by ACM
October 2016 BCB '16: Proceedings of the 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 48,   Downloads (Overall): 156

Full text available: PDFPDF
Secure location sensing has the potential to improve healthcare processes regarding security, efficiency, and safety. For example, enforcing close physical proximity to a patient when using a barcode medication administration system (BCMA) can mitigate the consequences of unsafe barcode scanning workarounds. We present Beacon+, a Bluetooth Low Energy (BLE) device ...
Keywords: BLE, location sensing, beacon

2 published by ACM
July 2015 Communications of the ACM: Volume 58 Issue 8, August 2015
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 19,   Downloads (12 Months): 277,   Downloads (Overall): 1,879

Full text available: HtmlHtml  PDFPDF
Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.

3 published by ACM
December 2014 ACSAC '14: Proceedings of the 30th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 29,   Downloads (Overall): 199

Full text available: PDFPDF
As an avid poker player, I enjoyed playing low stakes cash games and low buy-in tournaments on Full Tilt Poker before Black Friday. i However, as a Computer Scientist specializing in network and software security, I would never play poker online for any significant stakes, due to security concerns around ...
Keywords: security, online applications security, two-factor

4 published by ACM
September 2013 BCB'13: Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 7,   Downloads (Overall): 137

Full text available: PDFPDF
One of the most important requirements of HIPAA is the "minimum-necessary" access requirement, which states that healthcare personnel must be granted no more access to electronic healthcare data than is necessary in order to work effectively. Due to the complexity of constructing such a policy, many hospitals do not comply ...

5 published by ACM
October 2011 SPSM '11: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Publisher: ACM
Bibliometrics:
Citation Count: 19
Downloads (6 Weeks): 16,   Downloads (12 Months): 87,   Downloads (Overall): 1,461

Full text available: PDFPDF
We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare organizations to export EMRs to locations outside of their trust boundary. In contrast to previous approaches, our solution is designed to maintain EMR availability even when providers are ...
Keywords: access control, attribute-based encryption, continuity of care record, electronic medical record, medical security, mobile device, privacy, public-key cryptography

6
August 2011 HealthSec'11: Proceedings of the 2nd USENIX conference on Health security and privacy
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0


7
January 2010 FC'10: Proceedings of the 14th international conference on Financial Cryptography and Data Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Thoroughly auditing voting machine software has proved to be difficult, and even efforts to reduce its complexity have relied on significant amounts of external code. We design and implement a device that allows a voter to confirm and cast her vote while trusting only 1,034 lines of ARM assembly. The ...

8
December 2009 IEEE Transactions on Information Forensics and Security - Special issue on electronic voting: Volume 4 Issue 4, December 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The 13 papers in this special issue focus on electronic voting.

9
December 2009 IEEE Transactions on Information Forensics and Security - Special issue on electronic voting: Volume 4 Issue 4, December 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 8

We develop a new technique whereby a poll worker can determine whether the software executing on electronic voting machines on election day has been altered from its factory version. Our generalized approach allows a human, using a known challenge-response pair, to detect attacks that involve modification or replacement of software ...
Keywords: software protection, software verification and validation, Computer security, computer security, computer viruses

10 published by ACM
November 2009 SPIMACS '09: Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 2,   Downloads (12 Months): 17,   Downloads (Overall): 884

Full text available: PDFPDF
There is an inherent conflict between the desire to maintain privacy of one's medical records and the need to make those records available during an emergency. To satisfy both objectives, we introduce a flexible architecture for the secure storage of medical records on smart phones. In our system, a person ...
Keywords: authentication, privacy, security, medical information, portable health records

11
July 2009 Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been considered only when voting devices are honest, and in many schemes, voters can be forced or incentivized to cast votes of an adversary's ...
Keywords: end-to-end voting, privacy, coercion, cryptography

12
May 2008 IEEE Security and Privacy: Volume 6 Issue 3, May 2008
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

Voting systems have become controversial in the years following the multiple election disasters that occurred in the United States during and after 2000. Of particular note were the electronic voting (e-voting) systems that were widely deployed to replace the pre-scored punch-card systems, systems that had have been frequently judged to ...
Keywords: e-voting, e-voting, electronic voting, election, security, election technology, election, election technology, electronic voting, security

13 published by ACM
November 2007 WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode
Publisher: ACM
Bibliometrics:
Citation Count: 56
Downloads (6 Weeks): 42,   Downloads (12 Months): 285,   Downloads (Overall): 2,866

Full text available: PDFPDF
Phishing is form of identity theft that combines social engineering techniques and sophisticated attack vectors to harvest financial information from unsuspecting consumers. Often a phisher tries to lure her victim into clicking a URL pointing to a rogue page. In this paper, we focus on studying the structure of URLs ...
Keywords: URL obfuscation, phishing

14 published by ACM
October 2007 CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 16,   Downloads (Overall): 754

Full text available: PDFPDF
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. One of the problems is that the elections held on these machines cannot be independently audited. In this paper we address ...
Keywords: software independence, virtualization, voting audit

15
August 2007 EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Publisher: USENIX Association
Bibliometrics:
Citation Count: 9

We studied the notion of human verification of software-based attestation, which we base on the Pioneer framework. We demonstrate that the current state of the art in software-based attestation is not sufficiently robust to provide humanly verifiable voting machine integrity in practice. We design and implement a self-attesting machine based ...

16
June 2006 ISCC '06: Proceedings of the 11th IEEE Symposium on Computers and Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

The stability and robustness of BGP remains one of the most critical elements in sustaining today's Internet. In this paper, we study the structure and stability of origin advertisements in inter-domain routing. We visualize and quantitatively characterize the frequency, size, and effect of address assignment and origin changes by analyzing ...

17
June 2006 ACNS'06: Proceedings of the 4th international conference on Applied Cryptography and Network Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being globally deployed. Recently, Abadi et. al. [1] and Dwork et. al. [2] addressed this limitation by showing that memory access times vary much ...

18 published by ACM
June 2006 Communications of the ACM - Hacking and innovation: Volume 49 Issue 6, June 2006
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 19,   Downloads (Overall): 1,779

Full text available: HtmlHtml  PDFPDF
The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.

19
December 2005 FAST'05: Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Publisher: USENIX Association
Bibliometrics:
Citation Count: 22

We present algorithms and an architecture for the secure deletion of individual versions of a file. The principal application of this technology is federally compliant storage; it is designed to eliminate data after a mandatory retention period. However, it applies to any storage system that shares data between files, most ...

20
August 2005 Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security: Volume 48 Issue 5, 5 August 2005
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0




The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us