Papers by Edward L Jones, PhD
Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion, 2010
Bookmarks Related papers MentionsView impact
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference, 2013
ABSTRACT Our experiences show that the earlier students learn secure coding concepts, even at the... more ABSTRACT Our experiences show that the earlier students learn secure coding concepts, even at the same time as they first learn to write code, the better they will continue using secure coding practices. In this paper, modules for teaching secure coding practices to STEM students are built and those modules are ready for most common programming courses for STEM students. Those modules will provide the essential and fundamental skills to programmers and application developers in secure programming. In addition, most of the modules will use static-analysis tools to help with detecting vulnerabilities in any given code. In addition, some survey's results are reposted here.
Bookmarks Related papers MentionsView impact
Proceedings of the 2006 Winter Simulation Conference, 2006
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2006
Bookmarks Related papers MentionsView impact
2008 IEEE Asia-Pacific Services Computing Conference, 2008
ABSTRACT The inability to share information across systems is just one of the major impediments i... more ABSTRACT The inability to share information across systems is just one of the major impediments in the health care business that hinders progress towards efficiency and cost-effectiveness. Workflow management systems are very popular and largely being used in a business environment for inter-organizations. This paper investigates workflow involvement of healthcare process in order to support and complement the transition of information and tasks among different healthcare organizations. This research examined dataflow between organizations. The purpose of this study is to propose a security access control model, based on role based access control, for integrating healthcare information systems of various healthcare organizations. A case study among pharmacies, hospitals and clinics is presented in this paper. Our experimental results show that this model is scalable and it can be easily extended to a pervasive computing environment.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Proceedings 12th International Symposium on Software Reliability Engineering
Bookmarks Related papers MentionsView impact
Journal of Computing Sciences in Colleges, Apr 20, 2001
Bookmarks Related papers MentionsView impact
Journal of Computing Sciences in Colleges, 2001
Bookmarks Related papers MentionsView impact
Proceedings of the Australasian conference on Computing education, 2000
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Frontiers in Education Conference, Oct 10, 2001
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Proceedings of the 44th annual Southeast regional conference, 2006
Bookmarks Related papers MentionsView impact
Proceedings of the 42nd annual Southeast regional conference, 2004
Bookmarks Related papers MentionsView impact
Service Science: Research and Innovations in the Service Economy, 2008
Bookmarks Related papers MentionsView impact
Procedia Computer Science, 2012
Bookmarks Related papers MentionsView impact
Proceedings ADMI, 2000
Bookmarks Related papers MentionsView impact
Uploads
Papers by Edward L Jones, PhD