Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Fernandez, Eduardo
Florida Atlantic University
Boca Raton, Florida
 
   Featured Reviewer
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University (Boca Raton, Florida). He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. In addition, he has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings, and has created and taught several graduate and undergraduate courses and industrial tutorials. Eduardo’s current interests include security patterns and Web services security and fault tolerance. He holds an MS degree in electrical engineering from Purdue University and a PhD in computer science from UCLA. He is a senior member of the IEEE and a member of ACM. Eduardo is also an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details about his work can be found at http://www.cse.fau.edu/~ed.

--

Read our Q&A with Ed Fernandez here.

 
 
Options:
Date Reviewed  
 
1
- 7 of 7 reviews

   
   Trustworthy cyber-physical systems: a systematic framework towards design and evaluation of trust and trustworthiness
Mohammadi N., Springer International Publishing, New York, NY, 2019. 344 pp.  Type: Book (978-3-658274-87-0)

Users expect a trustworthy system to behave according to its requirements. Trustworthiness is a fundamental design objective for any system that provides critical functions, for example, transportation systems, medical systems, and wat...

Jul 1 2020  
   Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V. ACM Computing Surveys 52(2): 1-36, 2019.  Type: Article

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topo...

Jul 26 2019  
  Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp.  Type: Book (978-1-630811-34-1), Reviews: (1 of 2)

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important s...

Jul 20 2018  
   Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A. ACM Computing Surveys 50(3): 1-43, 2017.  Type: Article

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large c...

Oct 5 2017  
   In-cloud malware analysis and detection: state of the art
Alam S., Sogukpinar I., Traore I., Coady Y.  SIN 2014 (Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK, Sep 9-11, 2014) 473-478, 2014.  Type: Proceedings

Among the many “as a service” functions of the cloud, one of the least explored is the use of the cloud’s computational power to detect malware. This paper discusses the state of the art of this service. T...

Jan 27 2015  
   Targeted cyberattacks: a superset of advanced persistent threats
Sood A., Enbody R. IEEE Security and Privacy 11(1): 54-61, 2013.  Type: Article

Insight into the many threats that lurk in our software is presented in this paper. It also provides a useful introduction to the state of the art of malware. It will be especially useful for those doing research on malware or for prac...

May 16 2014  
   MyCloud: supporting user-configured privacy protection in cloud computing
Li M., Zang W., Bai K., Yu M., Liu P.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 59-68, 2013.  Type: Proceedings

The authors of this paper propose MyCloud, an architecture for improving the confidentiality of the data in virtual machines (VMs) in cloud systems. The main idea is to remove the privileges of the control VM (which normally gives the ...

Feb 18 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy