Information Technology Reference
In-Depth Information
Banerjee, A., Venkatasubramanian, K., & Gupta,
S. K. (2009). Challenges of implementing cyber-
physical security solutions in body area networks.
4
th
International Conference on Body Area Net-
works.
Los Angeles, CA: ICST.
Gagliano, D. a. (1999).
Mobile telemedicine tes-
tbed.
American Medical Informatics Association
Symposium.
Garcia-Morchon, O., & Wehrle, K. (2010). Modu-
lar context-aware access control.
Symposium on
Access Control Models and Technologies
(pp.
129-138). Pittsburgh, PA: ACM.
Bass, M. J., & Christensen, C. M. (2002). The
future of the microprocessor business.
IEEE
Spectrum
,
39
(4), 34-39. doi:10.1109/6.993786
Gupta, S. K., Mukherjee, T., & Venkatasubrama-
nian, K. (2006). Criticality aware access control
model for pervasive applications.
4
th
Conference
on Pervasive Computing.
Pisa, Italy: IEEE.
Cardenas, A. A., Amin, S., & Sastry, S. (2008).
Research challenges for the security of control
systems.
Proceedings of the 3rd conference on
Hot topics in security
(
HOTSEC'08)
(pp. 1-6).
San Jose, CA: Usenix Association.
Hachisuka, K., Takeda, T., Terauchi, Y., Sasaki,
K., Hosaka, H., & Itao, K. (2005). Intra-body data
transmission for the personal area network.
Micro-
system Technologies
,
11
, 1020-1027. doi:10.1007/
s00542-005-0500-1
Cherukuri, S., Venkatasubramanian, K., & Gupta,
S. K. (2003). BioSec: A biometric based approach
for securing communication in wireless.
Wireless
Security and Privacy Workshop
(pp. 432-439).
International Conference on Parallel Processing
Workshops, Taiwan.
Halperin, D., Heydt-Benjamin, T., Fu, K., Kohno,
T., & Maisel, W. (2008). Security and privacy
for implantable medical devices.
IEEE Perva-
sive Computing / IEEE Computer Society [and]
IEEE Communications Society
,
7
(1). doi:10.1109/
MPRV.2008.16
Denning, T., Du, K., & Kohno, T. (2008). Absence
makes the heart grow fonder: New directions for
implantable medical device security.
Proceedings
of the 3
rd
Conference on Hot topics in security
(HOTSEC'08)
(pp. 1-7). Berkeley, CA: USENIX.
Halperin, D., Heydt-Benjamin, T., Ransford, B.,
Clark, S. S., Defend, B., & Morgan, W. …Maisel,
W. H. (2008). Pacemakers and implantable cardiac
defibrillators: Software radio attacks and zero-
power defenses.
IEEE Symposium on Security
and Privacy,
Oakland, CA.
Department of Economic and Social Affairs.
Population Division. (2002).
World Population
Ageing:1950-2050
(Report). United Nations.
Devabhaktuni, V., & Haslett, J. (July 2004). Intro-
duction to theory and applications of self organiz-
ing wireless sensor networks.
16
th
International
Conference on Wireless Communications.
Jovanov, E., Raskovic, D., Price, J., Chapman,
J., Moore, A., & Krishnamurthy, A. (2001). Pa-
tient monitoring using personal area networks of
wireless intelligent sensors.
Biomedical Sciences
Instrumentation
, 373-378.
Eschenauerl, L., & Gligor, V. D. (2002). A
key-management scheme for distributed sensor
networks.
9
th
Conference on Computer and Com-
munications Security
(pp. 41-47). Washington,
DC: ACM.
Lee, E. A. (2008). Cyber physical systems: Design
challenges.
International Symposium on Object/
Component/Service-Oriented Real-Time Distrib-
uted Computing (ISORC).
European Union. (1995). Final EU data protec-
tion directive.
Official Journal of the European
Communities
,
281
, 31.
Search WWH ::
Custom Search