L. Jean Camp

Learn More
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch vendors, leaving OpenFlow vulnerable to man-in-the-middle attacks. We also highlight the classes of(More)
Introducing a new hobby for other people may inspire them to join with you. Reading, as one of mutual hobby, is considered as the very easy hobby to do. But, many people are not interested in this hobby. Why? Boring is the reason of why. However, this feel actually can deal with the book and time of you reading. Yeah, one that we will refer to break the(More)
The purpose of this study was to develop a privacy framework that could inform the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five-part privacy framework, derived from the literature, and tested it through a qualitative exploration of older adults’ perceptions. Focus-group sessions were conducted(More)
1. Abstract Designing for trust requires identification of the sometimes subtle manner in which trust can be embedded in a system. Defining trust as the intersection of privacy, security and reliability can enable or simplify the identification of trust as embedded in a technical design. Yet while this definition simplifies, it also illuminates a sometimes(More)