Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Fernandez, Eduardo
Florida Atlantic University
Boca Raton, Florida
   Featured Reviewer
   Reviewer Selected
Follow this Reviewer

Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University (Boca Raton, Florida). He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. In addition, he has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings, and has created and taught several graduate and undergraduate courses and industrial tutorials. Eduardo’s current interests include security patterns and Web services security and fault tolerance. He holds an MS degree in electrical engineering from Purdue University and a PhD in computer science from UCLA. He is a senior member of the IEEE and a member of ACM. Eduardo is also an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details about his work can be found at


Read our Q&A with Ed Fernandez here.

Date Reviewed  
- 10 of 66 reviews

  Principles of secure processor architecture design
Szefer J., Morgan&Claypool Publishers, San Rafael, CA, 2018. 173 pp.  Type: Book (978-1-681730-01-1)

The growing use of processors where multiple applications are executed concurrently, as in cloud computing, has increased the need for security features that can protect these applications from mutual interference. Additionally, a succ...

Jun 25 2021  
   Software engineering in the era of cloud computing
Ramachandran M., Mahmood Z., Springer International Publishing, New York, NY, 2020. 354 pp.  Type: Book (978-3-030336-23-3)

This book attempts to present a state-of-the-art view of “software engineering in the era of cloud computing.” The claimed audience includes researchers, practitioners, and students. The title is ambiguous; it could...

Dec 17 2020  
   Trustworthy cyber-physical systems: a systematic framework towards design and evaluation of trust and trustworthiness
Mohammadi N., Springer International Publishing, New York, NY, 2019. 344 pp.  Type: Book (978-3-658274-87-0)

Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and wat...

Jul 1 2020  
   Design and development of web information systems
Schewe K., Thalheim B., Springer International Publishing, New York, NY, 2019. 590 pp.  Type: Book (978-3-662588-22-2)

A distillation and systematic organization of the authors’ work on web information systems (WIS), this book indicates that WIS design must be considered in the context of a whole web database, including semantic aspects, and ...

Mar 16 2020  
   Hack for hire
Mirian A. Queue 17(4): 41-60, 2019.  Type: Article

Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...

Jan 29 2020  
   Engineering trustworthy systems: a principled approach to cybersecurity
Saydjari O. Communications of the ACM 62(6): 63-69, 2019.  Type: Article

In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...

Nov 4 2019  
   Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V. ACM Computing Surveys 52(2): 1-36, 2019.  Type: Article

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topo...

Jul 26 2019  
   Blockchains from a distributed computing perspective
Herlihy M. Communications of the ACM 62(2): 78-85, 2019.  Type: Article, Reviews: (2 of 2)

Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent tutorial on blockchains from the po...

Mar 18 2019  
   Federal cloud computing: the definitive guide for cloud service providers (2nd ed.)
Metheny M., Syngress Publishing, Cambridge, MA, 2017. 536 pp.  Type: Book (978-0-128097-10-6)

The title indicates that this is a guide for cloud service providers (CSPs) who deal with the US government; however, many of the sections will not be of interest to this audience. All of the many references are to government documents...

Jul 23 2018  
  Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp.  Type: Book (978-1-630811-34-1), Reviews: (1 of 2)

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important s...

Jul 20 2018  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy