|
|
|
|
| Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University (Boca Raton, Florida). He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. In addition, he has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings, and has created and taught several graduate and undergraduate courses and industrial tutorials. Eduardo’s current interests include security patterns and Web services security and fault tolerance. He holds an MS degree in electrical engineering from Purdue University and a PhD in computer science from UCLA. He is a senior member of the IEEE and a member of ACM. Eduardo is also an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details about his work can be found at http://www.cse.fau.edu/~ed. -- Read our Q&A with Ed Fernandez here. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 66
reviews
|
|
|
 |
 |
 |
 |
|
Principles of secure processor architecture design Szefer J., Morgan&Claypool Publishers, San Rafael, CA, 2018. 173 pp. Type: Book (978-1-681730-01-1)
The growing use of processors where multiple applications are executed concurrently, as in cloud computing, has increased the need for security features that can protect these applications from mutual interference. Additionally, a succ...
|
Jun 25 2021 |
|
 |
 |
 |
 |
|
Software engineering in the era of cloud computing Ramachandran M., Mahmood Z., Springer International Publishing, New York, NY, 2020. 354 pp. Type: Book (978-3-030336-23-3)
This book attempts to present a state-of-the-art view of “software engineering in the era of cloud computing.” The claimed audience includes researchers, practitioners, and students. The title is ambiguous; it could...
|
Dec 17 2020 |
|
 |
 |
 |
 |
|
Trustworthy cyber-physical systems: a systematic framework towards design and evaluation of trust and trustworthiness Mohammadi N., Springer International Publishing, New York, NY, 2019. 344 pp. Type: Book (978-3-658274-87-0)
Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and wat...
|
Jul 1 2020 |
|
 |
 |
 |
 |
|
Design and development of web information systems Schewe K., Thalheim B., Springer International Publishing, New York, NY, 2019. 590 pp. Type: Book (978-3-662588-22-2)
A distillation and systematic organization of the authors’ work on web information systems (WIS), this book indicates that WIS design must be considered in the context of a whole web database, including semantic aspects, and ...
|
Mar 16 2020 |
|
 |
 |
 |
 |
|
Hack for hire Mirian A. Queue 17(4): 41-60, 2019. Type: Article
Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...
|
Jan 29 2020 |
|
 |
 |
 |
 |
|
Engineering trustworthy systems: a principled approach to cybersecurity Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...
|
Nov 4 2019 |
|
 |
 |
 |
 |
|
Software-defined networking-based DDoS defense mechanisms Swami R., Dave M., Ranga V. ACM Computing Surveys 52(2): 1-36, 2019. Type: Article
This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topo...
|
Jul 26 2019 |
|
 |
 |
 |
 |
|
Blockchains from a distributed computing perspective Herlihy M. Communications of the ACM 62(2): 78-85, 2019. Type: Article, Reviews: (2 of 2)
Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent tutorial on blockchains from the po...
|
Mar 18 2019 |
|
 |
 |
 |
 |
|
Federal cloud computing: the definitive guide for cloud service providers (2nd ed.) Metheny M., Syngress Publishing, Cambridge, MA, 2017. 536 pp. Type: Book (978-0-128097-10-6)
The title indicates that this is a guide for cloud service providers (CSPs) who deal with the US government; however, many of the sections will not be of interest to this audience. All of the many references are to government documents...
|
Jul 23 2018 |
|
 |
 |
 |
 |
|
Attribute-based access control Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (1 of 2)
Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important s...
|
Jul 20 2018 |
|
 |
 |
 |
 |
|
|
|
|
|
|