BibTeX for papers by David Kotz; for complete/updated list see https://www.cs.dartmouth.edu/~kotz/research/papers.html @TechReport{landwehr:thaw-tr, author = {Carl Landwehr and David Kotz}, title = {{THaW publications}}, institution = {Dartmouth Computer Science}, year = 2020, month = {December}, number = {TR2020-904}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/landwehr-thaw-tr/index.html}, abstract = {In 2013, the National Science Foundation's Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project's bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to citation materials and abstracts and associates each work with a URL where it may be found, cluster (category), several content tags, and a brief annotation summarizing the work's contribution. For more information about THaW, visit thaw.org.}, } @Article{kotz:agenda, author = {David Kotz and Carl A. Gunter and Santosh Kumar and Jonathan P. Weiner}, title = {{Privacy and Security in Mobile Health~-- A Research Agenda}}, journal = {IEEE Computer}, year = 2016, month = {June}, volume = 49, number = 6, pages = {22--30}, publisher = {IEEE}, copyright = {IEEE}, DOI = {10.1109/MC.2016.185}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-agenda/index.html}, abstract = {Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges.}, } @Article{kotz:frontiers, author = {David Kotz and Kevin Fu and Carl Gunter and Avi Rubin}, title = {{Security for Mobile and Cloud Frontiers in Healthcare}}, journal = {Communications of the ACM}, year = 2015, month = {August}, volume = 58, number = 8, pages = {21--23}, publisher = {ACM}, copyright = {the authors}, DOI = {10.1145/2790830}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-frontiers/index.html}, abstract = {Designers and developers of healthcare information technologies must address preexisting security vulnerabilities and undiagnosed future threats.}, } @Article{avancha:survey, author = {Sasikanth Avancha and Amit Baxi and David Kotz}, title = {{Privacy in mobile technology for personal healthcare}}, journal = {ACM Computing Surveys}, year = 2012, month = {November}, volume = 45, number = 1, articleno = 3, numpages = 54, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/2379776.2379779}, URL = {https://www.cs.dartmouth.edu/~kotz/research/avancha-survey/index.html}, abstract = {Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of \emph{mobile} computing technologies that have the potential to transform healthcare. Such \emph{mHealth} technology enables physicians to remotely monitor patients' health, and enables individuals to manage their own health more easily. Despite these advantages, privacy is essential for any personal monitoring technology. Through an extensive survey of the literature, we develop a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discuss the technologies that could support privacy-sensitive mHealth systems. We end with a list of open research questions.}, } @InProceedings{kotz:mHealth-threats, author = {David Kotz}, title = {{A threat taxonomy for mHealth privacy}}, booktitle = {{Proceedings of the Workshop on Networked Healthcare Technology (NetHealth)}}, year = 2011, month = {January}, articleno = 1, numpages = 6, publisher = {IEEE}, copyright = {IEEE}, DOI = {10.1109/COMSNETS.2011.5716518}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-mHealth-threats/index.html}, abstract = {Networked mobile devices have great potential to enable individuals (and their physicians) to better monitor their health and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called \emph{mHealth} technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges.}, } @InProceedings{kotz:mhealth-spimacs, author = {David Kotz and Sasikanth Avancha and Amit Baxi}, title = {{A privacy framework for mobile health and home-care systems}}, booktitle = {{Proceedings of the Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS)}}, year = 2009, month = {November}, pages = {1--12}, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/1655084.1655086}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-mhealth-spimacs/index.html}, abstract = {In this paper, we consider the challenge of preserving patient privacy in the context of mobile healthcare and home-care systems, that is, the use of mobile computing and communications technologies in the delivery of healthcare or the provision of at-home medical care and assisted living. This paper makes three primary contributions. First, we compare existing privacy frameworks, identifying key differences and shortcomings. Second, we identify a privacy framework for mobile healthcare and home-care systems. Third, we extract a set of privacy properties intended for use by those who design systems and applications for mobile healthcare and home-care systems, linking them back to the privacy principles. Finally, we list several important research questions that the community should address. We hope that the privacy framework in this paper can help to guide the researchers and developers in this community, and that the privacy properties provide a concrete foundation for privacy-sensitive systems and applications for mobile healthcare and home-care systems.}, } @TechReport{baek:survey-tr, author = {Kwang-Hyun Baek and Sean W. Smith and David Kotz}, title = {{A Survey of WPA and 802.11i RSN Authentication Protocols}}, institution = {Dartmouth Computer Science}, year = 2004, month = {November}, number = {TR2004-524}, copyright = {the authors}, address = {Hanover, NH}, URL = {https://www.cs.dartmouth.edu/~kotz/research/baek-survey-tr/index.html}, abstract = {In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.}, } @InProceedings{kotz:ists, author = {David Kotz}, title = {{The Institute for Security Technology Studies (ISTS): overview}}, booktitle = {{Proceedings of the SPIE Defense and Security Symposium}}, year = 2004, month = {April}, pages = {9--17}, publisher = {SPIE}, copyright = {Society of Photo-Optical Instrumentation Engineers (SPIE)}, address = {Orlando, FL}, DOI = {10.1117/12.555797}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-ists/index.html}, note = {Invited paper}, abstract = {The Institute for Security Technology Studies (ISTS) was founded at Dartmouth College in 2000 as a national center of security research and development. The Institute conducts interdisciplinary research and development projects addressing the challenges of cyber and homeland security, to protect the integrity of the Internet, computer networks, and other interdependent information infrastructures. ISTS also develops technology for providing the information and tools necessary to assist communities and first responders with the evolving, complex security landscape. ISTS is a member of and administers the Institute for Information Infrastructure Protection (I3P), a consortium of 24 leading academic institutions, non-profits and federal laboratories that brings industry, academia and government together to articulate and focus on problems that need to be solved to help ensure the nation's information infrastructure is safe, secure, and robust.}, } @TechReport{kotz:privacy, author = {David Kotz}, title = {{Technological Implications for Privacy}}, institution = {Dartmouth Computer Science}, year = 2004, month = {June}, number = {TR2004-505}, copyright = {the author}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-privacy/index.html}, note = {Originally written during Summer 1998 Ethics Institute at Dartmouth College}, abstract = {The World-Wide Web is increasingly used for commerce and access to personal information stored in databases. Although the Web is ``just another medium'' for information exchange, the fact that all the information is stored in computers, and all of the activity happens in computers and computer networks, makes it easier (cheaper) than every to track users' activities. By recording and analyzing user's activities in the Web, activities that may seem to be quite private to many users, it is more likely than ever before that a person's privacy may be threatened. In this paper I examine some of the technology in the Web, and how it affects the privacy of Web users. I also briefly summarize some of the efforts to regulate privacy on the Internet.}, } @InCollection{gray:motivation, author = {Robert S. Gray and George Cybenko and David Kotz and Daniela Rus}, title = {{Mobile agents: Motivations and State of the Art}}, booktitle = {{Handbook of Agent Technology}}, editor = {Jeffrey Bradshaw}, year = 2002, chapter = 0, publisher = {AAAI/MIT Press}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/gray-motivation/index.html}, note = {Accepted for publication, but the book never published. Draft available as Technical Report TR2000-365, Department of Computer Science, Dartmouth College}, abstract = {A mobile agent is an executing program that can migrate, at times of its own choosing, from machine to machine in a heterogeneous network. On each machine, the agent interacts with stationary service agents and other resources to accomplish its task. In this chapter, we first make the case for mobile agents, discussing six strengths of mobile agents and the applications that benefit from these strengths. Although none of these strengths are unique to mobile agents, no competing technique shares all six. In other words, a mobile-agent system provides a single general framework in which a wide range of distributed applications can be implemented efficiently and easily. We then present a representative cross-section of current mobile-agent systems.}, } @TechReport{kotz:dwta-tr, author = {David Kotz and Robert Gray and Daniela Rus}, title = {{Future Directions for Mobile-Agent Research}}, institution = {Dartmouth Computer Science}, year = 2002, month = {January}, number = {TR2002-415}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-dwta-tr/index.html}, note = {Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.}, abstract = {During a discussion in September 2000 the authors examined the future of research on mobile agents and mobile code. (A mobile agent is a running program that can move from host to host in network at times and to places of its own choosing.) In this paper we summarize and reflect on that discussion. It became clear that the field should shift its emphasis toward mobile code, in all its forms, rather than to continue its narrow focus on mobile agents. Furthermore, we encourage the development of modular components, so that application designers may take advantage of code mobility without needing to rewrite their application to fit in a monolithic mobile-agent system. There are many potential applications that may productively use mobile code, but there is no ``killer application'' for mobile agents. Finally, we note that although security is an important and challenging problem, there are many applications and environments with security requirements well within the capability of existing mobile-code and mobile-agent frameworks.}, } @Article{kotz:dwta, author = {David Kotz and Robert Gray and Daniela Rus}, title = {{Future Directions for Mobile-Agent Research}}, journal = {IEEE Distributed Systems Online}, year = 2002, month = {August}, volume = 3, number = 8, numpages = 6, publisher = {IEEE}, copyright = {IEEE}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-dwta/index.html}, note = {Based on a conversation with Jeff Bradshaw, Colin Harrison, Guenter Karjoth, Amy Murphy, Gian Pietro Picco, M. Ranganathan, Niranjan Suri, and Christian Tschudin.}, abstract = {The field of mobile agents should shift its emphasis toward mobile code, in all its forms, rather than continue focusing on mobile agents. The development of modular components will help application designers take advantage of code mobility without having to rewrite their applications to fit in monolithic, mobile agent systems.}, } @InCollection{oldfield:bapp-pario, author = {Ron Oldfield and David Kotz}, title = {{Scientific Applications using Parallel I/O}}, booktitle = {{High Performance Mass Storage and Parallel I/O: Technologies and Applications}}, editor = {Hai Jin and Toni Cortes and Rajkumar Buyya}, year = 2001, month = {September}, chapter = 45, pages = {655--666}, publisher = {Wiley-IEEE Press}, copyright = {Wiley-IEEE Press}, ISBN13 = {978-0-471-20809-9}, URL = {https://www.cs.dartmouth.edu/~kotz/research/oldfield-bapp-pario/index.html}, abstract = {Scientific applications are increasingly being implemented on massively parallel supercomputers. Many of these applications have intense I/O demands, as well as massive computational requirements. This paper is essentially an annotated bibliography of papers and other sources of information about scientific applications using parallel I/O.}, } @TechReport{chen:survey-tr, author = {Guanling Chen and David Kotz}, title = {{A Survey of Context-Aware Mobile Computing Research}}, institution = {Dartmouth Computer Science}, year = 2000, month = {November}, number = {TR2000-381}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/chen-survey-tr/index.html}, abstract = {Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topic and built several context-aware applications to demonstrate the usefulness of this new technology. Context-aware applications (or the system infrastructure to support them), however, have never been widely available to everyday users. In this survey of research on context-aware systems and applications, we looked in depth at the types of context used and models of context information, at systems that support collecting and disseminating context, and at applications that adapt to the changing context. Through this survey, it is clear that context-aware research is an old but rich area for research. The difficulties and possible solutions we outline serve as guidance for researchers hoping to make context-aware computing a reality.}, } @TechReport{gray:motivation-tr, author = {Robert S. Gray and George Cybenko and David Kotz and Daniela Rus}, title = {{Mobile agents: Motivations and State of the Art}}, institution = {Dartmouth Computer Science}, year = 2000, month = {April}, number = {TR2000-365}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/gray-motivation-tr/index.html}, abstract = {A mobile agent is an executing program that can migrate, at times of its own choosing, from machine to machine in a heterogeneous network. On each machine, the agent interacts with stationary service agents and other resources to accomplish its task. In this chapter, we first make the case for mobile agents, discussing six strengths of mobile agents and the applications that benefit from these strengths. Although none of these strengths are unique to mobile agents, no competing technique shares all six. In other words, a mobile-agent system provides a single general framework in which a wide range of distributed applications can be implemented efficiently and easily. We then present a representative cross-section of current mobile-agent systems.}, } @InCollection{kotz:encyc1, author = {David Kotz and Ravi Jain}, title = {{I/O in Parallel and Distributed Systems}}, booktitle = {{Encyclopedia of Computer Science and Technology}}, editor = {Allen Kent and James G. Williams}, year = 1999, volume = 40, chapter = 0, pages = {141--154}, publisher = {Marcel Dekker, Inc.}, copyright = {Marcel Dekker, Inc.}, ISBN13 = 9780824722937, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-encyc1/index.html}, note = {Supplement 25}, abstract = {We sketch the reasons for the I/O bottleneck in parallel and distributed systems, pointing out that it can be viewed as a special case of a general bottleneck that arises at all levels of the memory hierarchy. We argue that because of its severity, the I/O bottleneck deserves systematic attention at all levels of system design. We then present a survey of the issues raised by the I/O bottleneck in six key areas of parallel and distributed systems: applications, algorithms, languages and compilers, run-time libraries, operating systems, and architecture.}, } @InProceedings{kotz:future, author = {David Kotz and Robert S. Gray}, title = {{Mobile Code: The Future of the Internet}}, booktitle = {{Proceedings of the Mobile Agents in the Context of Competition and Cooperation (MAC3) Workshop at Autonomous Agents'99}}, year = 1999, month = {May}, pages = {6--12}, publisher = {ACM}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-future/index.html}, abstract = {Use of the Internet has exploded in recent years with the appearance of the World-Wide Web. In this paper, we show how current technological trends necessarily lead to a system based substantially on mobile code, and in many cases, mobile agents. We discuss several technical and non-technical hurdles along the path to that eventuality. Finally, we predict that, within five years, nearly all major Internet sites will be capable of hosting and willing to host some form of mobile agents.}, } @Article{kotz:future2, author = {David Kotz and Robert S. Gray}, title = {{Mobile Agents and the Future of the Internet}}, journal = {ACM Operating Systems Review}, year = 1999, month = {August}, volume = 33, number = 3, pages = {7--13}, publisher = {ACM}, copyright = {the authors}, DOI = {10.1145/311124.311130}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-future2/index.html}, abstract = {Use of the Internet has exploded in recent years with the appearance of the World-Wide Web. In this paper, we show how current technological trends may lead to a system based substantially on mobile code, and in many cases, mobile agents. We discuss several technical and non-technical hurdles along the path to that eventuality. It seems likely that, within a few years, nearly all major Internet sites will be capable of hosting and willing to host some form of mobile code or mobile agents.}, } @TechReport{oldfield:app-pario, author = {Ron Oldfield and David Kotz}, title = {{Applications of Parallel I/O}}, institution = {Dartmouth Computer Science}, year = 1998, month = {August}, number = {PCS-TR98-337}, copyright = {the authors}, URL = {https://www.cs.dartmouth.edu/~kotz/research/oldfield-app-pario/index.html}, note = {Supplement to PCS-TR96-297}, abstract = {Scientific applications are increasingly being implemented on massively parallel supercomputers. Many of these applications have intense I/O demands, as well as massive computational requirements. This paper is essentially an annotated bibliography of papers and other sources of information about scientific applications using parallel I/O. It will be updated periodically.}, } @Article{choudhary:sdcr, author = {Alok Choudhary and David Kotz}, title = {{Large-Scale File Systems with the Flexibility of Databases}}, journal = {ACM Computing Surveys}, year = 1996, month = {December}, volume = {28A}, number = 4, publisher = {ACM}, copyright = {ACM}, DOI = {10.1145/242224.242488}, URL = {https://www.cs.dartmouth.edu/~kotz/research/choudhary-sdcr/index.html}, note = {Position paper for the Working Group on Storage I/O for Large-Scale Computing, ACM Workshop on Strategic Directions in Computing Research. Available on-line only.}, abstract = {We note that large-scale computing includes many applications with intensive I/O demands. A data-storage system for such applications must address two issues: locating the appropriate data set, and accessing the contents of the data set. Today, there are two extreme models of data location and management: 1) file systems, which can be fast but which require a user to manage the structure of the file-name space and, often, of the file contents; and 2) object-oriented-database systems, in which even the smallest granule of data is stored as an object with associated access methods, which is very flexible but often slow. We propose a solution that may provide the performance of file systems with the flexibility of object databases.}, } @TechReport{kotz:app-pario, author = {David Kotz}, title = {{Applications of Parallel I/O}}, institution = {Dartmouth Computer Science}, year = 1996, month = {October}, number = {PCS-TR96-297}, copyright = {David Kotz}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-app-pario/index.html}, note = {Release 1}, abstract = {Scientific applications are increasingly being implemented on massively parallel supercomputers. Many of these applications have intense I/O demands, as well as massive computational requirements. This paper is essentially an annotated bibliography of papers and other sources of information about scientific applications using parallel I/O. It will be updated periodically.}, } @InCollection{kotz:pioarch, author = {David Kotz}, title = {{Introduction to Multiprocessor I/O Architecture}}, booktitle = {{Input/Output in Parallel and Distributed Computer Systems}}, editor = {Ravi Jain and John Werth and James C. Browne}, series = {The Kluwer International Series in Engineering and Computer Science}, year = 1996, volume = 362, chapter = 4, pages = {97--123}, publisher = {Kluwer Academic Publishers}, copyright = {Kluwer Academic Publishers}, ISBN13 = {978-1-4613-1401-1}, URL = {https://www.cs.dartmouth.edu/~kotz/research/kotz-pioarch/index.html}, abstract = {The computational performance of multiprocessors continues to improve by leaps and bounds, fueled in part by rapid improvements in processor and interconnection technology. I/O performance thus becomes ever more critical, to avoid becoming the bottleneck of system performance. In this paper we provide an introduction to I/O architectural issues in multiprocessors, with a focus on disk subsystems. While we discuss examples from actual architectures and provide pointers to interesting research in the literature, we do not attempt to provide a comprehensive survey. We concentrate on a study of the architectural design issues, and the effects of different design alternatives.}, } @Article{reed:panel, author = {Daniel A. Reed and Charles Catlett and Alok Choudhary and David Kotz and Marc Snir}, title = {{Parallel I/O: Getting Ready for Prime Time}}, journal = {IEEE Parallel and Distributed Technology}, year = 1995, month = {Summer}, volume = 3, number = 2, pages = {64--71}, publisher = {IEEE}, copyright = {IEEE}, DOI = {10.1109/MPDT.1995.9283668}, URL = {https://www.cs.dartmouth.edu/~kotz/research/reed-panel/index.html}, note = {Edited transcript of panel discussion at the 1994 International Conference on Parallel Processing}, abstract = {During the \emph{International Conference on Parallel Processing}, held August 15-19, 1994, we convened a panel to discuss the state of the art in parallel I/O, tools and techniques to address current problems, and challenges for the future. The following is an edited transcript of that panel.}, }