Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Bertino, Elisa Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 16 reviews    
  Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S.  ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in the coming y...
...
Mar 31 2017  
  Practical approximate k-nearest neighbor queries with location and query privacy
Yi X., Paulet R., Bertino E., Varadharajan V.  IEEE Transactions on Knowledge and Data Engineering 28(6): 1546-1559, 2016. Type: Article

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can share real-time and historical location information online....
...
Sep 20 2016  
  Homomorphic encryption and applications
Yi X., Paulet R., Bertino E.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1), Reviews: (2 of 2)

Nowadays most information is exchanged in electronic form. This warrants several cryptographic functions such as confidentiality, integrity, authentication, and availability. In order to perform these functions, various cryptographic operations...
...
May 27 2015  
  Homomorphic encryption and applications
Yi X., Paulet R., Bertino E.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1), Reviews: (1 of 2)

Fully homomorphic encryption is one of the most exciting results in cryptography of the last few years. It allows for arbitrary computations to be carried out on ciphertext to produce an encrypted result that, when decrypted, matches the result of...
...
Apr 8 2015  
  A formal proximity model for RBAC systems
Gupta A., Kirkpatrick M., Bertino E.  Computers and Security 4152-67, 2014. Type: Article

Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance, a manager ...
...
Aug 22 2014  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy