Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Rubin, Aviel D. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 8 reviews    
  Securing medical records on smart phones
Gardner R., Garera S., Pagano M., Green M., Rubin A.  SPIMACS 2009 (Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, Chicago, Illinois, Nov 13, 2009) 31-40, 2009.  Type: Proceedings

One major concern of emergency medical technicians (EMTs) is having ready access to a patient’s medical records, especially when the patient is unconscious. Lacking such access, significant delays in providing appropriate car...
...
Jan 28 2010  
  Analyzing Internet voting security
Jefferson D., Rubin A., Simons B., Wagner D. Communications of the ACM 47(10): 59-64, 2004.  Type: Article

Even though this article on voting security is five years old, the basic requirements have not changed and astonishingly little progress has been made in establishing secure voting systems in real-world elections....
...
Dec 1 2009  
  A framework for detection and measurement of phishing attacks
Garera S., Provos N., Chew M., Rubin A.  Recurring malcode (Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, Nov 2, 2007) 1-8, 2007.  Type: Proceedings

Several features are identified that can be used to distinguish a phishing uniform resource locator (URL). High accuracy (97.31 percent) is achieved by a logistic regression filter based on these features. An advantage of feature-based...
...
Jan 3 2008  
  Defending against an Internet-based attack on the physical world
Byers S., Rubin A., Kormann D. ACM Transactions on Internet Technology 4(3): 239-254, 2004.  Type: Article

How might an attack carried out in the cyber world manifest itself in the physical realm? That is the question that the authors of this paper attempt to answer....
...
Oct 26 2005  
   Firewalls and Internet security: repelling the wily hacker
Cheswick W., Bellovin S., Rubin A., Addison-Wesley Longman Publishing Co, Inc., Boston, MA, 2003. 433 pp.  Type: Book (9780201634662)

After almost ten years, the second edition of this classic firewall book has finally appeared. The first edition [1] was released at a time when firewalls were up-and-coming. This text was one of the first practical guides written abou...
...
May 25 2004  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy