Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Toch, Eran Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys 51(2): 1-27, 2018.  Type: Article

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:...
...
Jun 15 2018  
  Anonymizing mobility data using semantic cloaking
Barak O., Cohen G., Toch E. Pervasive and Mobile Computing 28(C): 102-112, 2016.  Type: Article

Outside of a sci-fi reference, semantic cloaking is an approach for obscuring a user’s location and ensuring identity anonymity while still supporting many online location services. With increased and harmful data breaches, t...
...
Jul 20 2016  
  Simplifying data disclosure configurations in a cloud computing environment
Hirschprung R., Toch E., Maimon O. ACM Transactions on Intelligent Systems and Technology 6(3): 1-26, 2015.  Type: Article

The complexity involved in migrating data between systems in a cloud computing environment is much higher than that in local networks. This complexity creates unprecedented research opportunities for people working in this area. This p...
...
Jul 20 2015  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy