Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Kotz, David Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 8 reviews    
  Security for mobile and cloud frontiers in healthcare
Kotz D., Fu K., Gunter C., Rubin A. Communications of the ACM 58(8): 21-23, 2015.  Type: Article

Healthcare organizations need secure clinical information systems to provide better quality medical services, increase access to medical records, and reduce the operative costs of business. What technologies do healthcare providers nee...
...
Dec 1 2015  
  Privacy in mobile technology for personal healthcare
Avancha S., Baxi A., Kotz D. ACM Computing Surveys 45(1): 1-54, 2012.  Type: Article

When you are sick, everyone wants your data. Advances in mobile computing are helping to create systems that gather detailed data from patients in real-life settings, and convey it to clinicians for individualized care. This trove of d...
...
Feb 25 2013  
  A privacy framework for mobile health and home-care systems
Kotz D., Avancha S., Baxi A.  SPIMACS 2009 (Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-care Systems, Chicago, IL, Nov 13, 2009) 1-12, 2009.  Type: Proceedings

Health systems enabled by new information and communications technologies are discussed in this paper. The emergence of mobile communication systems, health information processing systems, and e-health portfolios with embedded tele-med...
...
Jul 19 2010  
  The changing usage of a mature campus-wide wireless network
Henderson T., Kotz D., Abyzov I. Computer Networks 52(14): 2690-2712, 2008.  Type: Article

Nearly a decade since the technology’s debut, 802.11-based wireless local area networks (WLANs) have become an indispensable type of infrastructure, upon which mobile computer and handheld device users increasingly rely. In o...
...
Feb 5 2009  
  Active behavioral fingerprinting of wireless devices
Bratus S., Cornelius C., Kotz D., Peebles D.  Wireless network security (Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, 56-61, 2008.  Type: Proceedings

Fingerprinting for wireless devices, especially for those using 802.11 series standards, has a wide variety of targets and approaches. Is there any approach that exploits the stimulus-response nature of devices such that fingerprinting...
...
Jul 18 2008  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy