Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Yao, Danfeng Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Anomaly detection as a service: challenges, advances, and opportunities
Yao D., Shu X., Cheng L., Stolfo S., Morgan & Claypool Publishers, San Rafael, CA, 2017. 173 pp.  Type: Book (978-1-681731-09-4)

Written by a team of well-known academic researchers and authors of landmark papers in the area of system and network security, this book is a distilled and concise overview of academic and industrial approaches for anomaly detection i...
...
Apr 25 2018  
   Compact and anonymous role-based authorization chain
Yao D., Tamassia R. ACM Transactions on Information and System Security 12(3): 1-27, 2009.  Type: Article

Yao and Tamassia argue that role-based delegation raises privacy concerns because the identity of users may be sensitive information, especially in e-commerce, e-medicine, and peer-to-peer (P2P) file sharing. They propose an anonymous-...
...
Jul 27 2009  
  Private information: to reveal or not to reveal
Yao D., Frikken K., Atallah M., Tamassia R. ACM Transactions on Information and System Security 12(1): 1-27, 2008.  Type: Article

In this paper, readers will find protocols for computing the degrees of reluctance for software systems to reveal credentials that will allow users to gain access to resources. The authors’ insights include: a point-based tru...
...
Mar 31 2009  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy