Information Technology Reference
In-Depth Information
Banerjee, A., Venkatasubramanian, K., & Gupta,
S. K. (2009). Challenges of implementing cyber-
physical security solutions in body area networks.
4 th International Conference on Body Area Net-
works. Los Angeles, CA: ICST.
Gagliano, D. a. (1999). Mobile telemedicine tes-
tbed. American Medical Informatics Association
Symposium.
Garcia-Morchon, O., & Wehrle, K. (2010). Modu-
lar context-aware access control. Symposium on
Access Control Models and Technologies (pp.
129-138). Pittsburgh, PA: ACM.
Bass, M. J., & Christensen, C. M. (2002). The
future of the microprocessor business. IEEE
Spectrum , 39 (4), 34-39. doi:10.1109/6.993786
Gupta, S. K., Mukherjee, T., & Venkatasubrama-
nian, K. (2006). Criticality aware access control
model for pervasive applications. 4 th Conference
on Pervasive Computing. Pisa, Italy: IEEE.
Cardenas, A. A., Amin, S., & Sastry, S. (2008).
Research challenges for the security of control
systems. Proceedings of the 3rd conference on
Hot topics in security ( HOTSEC'08) (pp. 1-6).
San Jose, CA: Usenix Association.
Hachisuka, K., Takeda, T., Terauchi, Y., Sasaki,
K., Hosaka, H., & Itao, K. (2005). Intra-body data
transmission for the personal area network. Micro-
system Technologies , 11 , 1020-1027. doi:10.1007/
s00542-005-0500-1
Cherukuri, S., Venkatasubramanian, K., & Gupta,
S. K. (2003). BioSec: A biometric based approach
for securing communication in wireless. Wireless
Security and Privacy Workshop (pp. 432-439).
International Conference on Parallel Processing
Workshops, Taiwan.
Halperin, D., Heydt-Benjamin, T., Fu, K., Kohno,
T., & Maisel, W. (2008). Security and privacy
for implantable medical devices. IEEE Perva-
sive Computing / IEEE Computer Society [and]
IEEE Communications Society , 7 (1). doi:10.1109/
MPRV.2008.16
Denning, T., Du, K., & Kohno, T. (2008). Absence
makes the heart grow fonder: New directions for
implantable medical device security. Proceedings
of the 3 rd Conference on Hot topics in security
(HOTSEC'08) (pp. 1-7). Berkeley, CA: USENIX.
Halperin, D., Heydt-Benjamin, T., Ransford, B.,
Clark, S. S., Defend, B., & Morgan, W. …Maisel,
W. H. (2008). Pacemakers and implantable cardiac
defibrillators: Software radio attacks and zero-
power defenses. IEEE Symposium on Security
and Privacy, Oakland, CA.
Department of Economic and Social Affairs.
Population Division. (2002). World Population
Ageing:1950-2050 (Report). United Nations.
Devabhaktuni, V., & Haslett, J. (July 2004). Intro-
duction to theory and applications of self organiz-
ing wireless sensor networks. 16 th International
Conference on Wireless Communications.
Jovanov, E., Raskovic, D., Price, J., Chapman,
J., Moore, A., & Krishnamurthy, A. (2001). Pa-
tient monitoring using personal area networks of
wireless intelligent sensors. Biomedical Sciences
Instrumentation , 373-378.
Eschenauerl, L., & Gligor, V. D. (2002). A
key-management scheme for distributed sensor
networks. 9 th Conference on Computer and Com-
munications Security (pp. 41-47). Washington,
DC: ACM.
Lee, E. A. (2008). Cyber physical systems: Design
challenges. International Symposium on Object/
Component/Service-Oriented Real-Time Distrib-
uted Computing (ISORC).
European Union. (1995). Final EU data protec-
tion directive. Official Journal of the European
Communities , 281 , 31.
Search WWH ::




Custom Search