Search
for Author
All Reviews
Toch, Eran
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
3
of
3
reviews
The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018. Type: Article
This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...
...
Jun 15 2018
Anonymizing mobility data using semantic cloaking
Barak O., Cohen G., Toch E. Pervasive and Mobile Computing 28(C): 102-112, 2016. Type: Article
Outside of a sci-fi reference, semantic cloaking is an approach for obscuring a user’s location and ensuring identity anonymity while still supporting many online location services. With increased and harmful data breaches, t...
...
Jul 20 2016
Simplifying data disclosure configurations in a cloud computing environment
Hirschprung R., Toch E., Maimon O. ACM Transactions on Intelligent Systems and Technology 6(3): 1-26, 2015. Type: Article
The complexity involved in migrating data between systems in a cloud computing environment is much higher than that in local networks. This complexity creates unprecedented research opportunities for people working in this area. This p...
...
Jul 20 2015
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy