Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Fernandez, Eduardo
Florida Atlantic University
Boca Raton, Florida
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University (Boca Raton, Florida). He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. In addition, he has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings, and has created and taught several graduate and undergraduate courses and industrial tutorials. Eduardo’s current interests include security patterns and Web services security and fault tolerance. He holds an MS degree in electrical engineering from Purdue University and a PhD in computer science from UCLA. He is a senior member of the IEEE and a member of ACM. Eduardo is also an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details about his work can be found at http://www.cse.fau.edu/~ed.

--

Read our Q&A with Ed Fernandez here.

 
 
Options:
Date Reviewed  
 
1
- 10 of 56 reviews

   
   Security for the robot operating system
Dieber B., Breiling B., Taurer S., Kacianka S., Rass S., Schartner P.  Robotics and Autonomous Systems 98 192-203, 2017. Type: Article

This paper is one of the few reported studies on the security of robotic operating systems. As such, it has clear value to make robotic system designers and users aware of the need for security in these systems....

Jan 8 2018  
   Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A.  ACM Computing Surveys 50(3): 1-43, 2017. Type: Article

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of s...

Oct 5 2017  
   Vehicular cyber physical systems: adaptive connectivity and security
Rawat D., Bajracharya C.,  Springer International Publishing, New York, NY, 2016. 75 pp. Type: Book (978-3-319444-93-2)

The title of this slim book indicates that it is about the connectivity and security of vehicular cyber-physical systems. However, it only covers a very restricted range of these topics. Its five chapters are based on papers by the first author. T...

Mar 31 2017  
   Intercrossed access controls for secure financial services on multimedia big data in cloud systems
Li Y., Gai K., Ming Z., Zhao H., Qiu M.  ACM Transactions on Multimedia Computing, Communications, and Applications 12(4s): 1-18, 2016. Type: Article

Supposedly this paper is about financial and cloud security, but I could not find much about these aspects in the authors’ model. Their security architecture, presented in a figure, considers only authentication, and there is no mention of a...

Oct 26 2016  
  Guide to security assurance for cloud computing
Zhu S., Hill R., Trovati M.,  Springer International Publishing, New York, NY, 2016. 229 pp. Type: Book (978-3-319259-86-4)

The title of this book is misleading; it is not a guide, but rather a collection of loosely related papers about cloud computing security. Some of the chapters have redundancies, each author has a different style, and most papers are survey style,...

Oct 11 2016  
   Java design patterns
Sarcar V.,  Apress, New York, NY, 2015. 171 pp. Type: Book (978-1-484218-01-3)

Java examples of the 23 patterns of the classic Gang of Four book [1] are presented in this book. Several other books have done the same, and there are innumerable papers showing specific examples on the Internet. The author does not say what is n...

Mar 3 2016  
   A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Heartfield R., Loukas G.  ACM Computing Surveys 48(3): 1-39, 2015. Type: Article

Social engineering attacks include a large variety of ways to manipulate and deceive users. A specific type is semantic attacks that deceive rather than directly attack a user. We find here a taxonomy and description of semantic attacks indicating...

Feb 3 2016  
   Cyber-physical attacks: a growing invisible threat
Loukas G.,  Butterworth-Heinemann, Newton, MA, 2015. 270 pp. Type: Book (978-0-128012-90-1), Reviews: (1 of 2)

“Cyber-physical systems [CPSs] are physical, biological, and engineered systems whose operations are integrated, monitored, and/or controlled by a computational core. ... Computing is deeply embedded into every physical component, possibly e...

Oct 21 2015  
  An autonomic cloud management system for enforcing security and assurance properties
Bobelin L., Bousquet A., Briffaut J.  CLHS 2015 (Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, Portland, OR,  Jun 16, 2015) 1-8, 2015. Type: Proceedings

In the 1970s, there were many papers describing models for authorization in file systems and relational databases. Some of those models are now being rediscovered in the context of cloud systems. This paper presents the management and assurance of...

Jul 28 2015  
   In-cloud malware analysis and detection: state of the art
Alam S., Sogukpinar I., Traore I., Coady Y.  SIN 2014 (Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK,  Sep 9-11, 2014) 473-478, 2014. Type: Proceedings

Among the many “as a service” functions of the cloud, one of the least explored is the use of the cloud’s computational power to detect malware. This paper discusses the state of the art of this service. The survey analyzes only ...

Jan 27 2015  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy