|
|
|
|
| Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University (Boca Raton, Florida). He has published numerous papers on authorization models, object-oriented analysis and design, and security patterns. In addition, he has written four books on these subjects, the most recent being a book on security patterns. He has lectured all over the world at both academic and industrial meetings, and has created and taught several graduate and undergraduate courses and industrial tutorials. Eduardo’s current interests include security patterns and Web services security and fault tolerance. He holds an MS degree in electrical engineering from Purdue University and a PhD in computer science from UCLA. He is a senior member of the IEEE and a member of ACM. Eduardo is also an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Lucent, and others. More details about his work can be found at http://www.cse.fau.edu/~ed. -- Read our Q&A with Ed Fernandez here. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 23
reviews
|
|
|
|
|
|
|
|
Software engineering in the era of cloud computing Ramachandran M., Mahmood Z., Springer International Publishing, New York, NY, 2020. 354 pp. Type: Book (978-3-030336-23-3)
This book attempts to present a state-of-the-art view of “software engineering in the era of cloud computing.” The claimed audience includes researchers, practitioners, and students. The title is ambiguous; it could...
|
Dec 17 2020 |
|
|
|
|
|
|
Design and development of web information systems Schewe K., Thalheim B., Springer International Publishing, New York, NY, 2019. 590 pp. Type: Book (978-3-662588-22-2)
A distillation and systematic organization of the authors’ work on web information systems (WIS), this book indicates that WIS design must be considered in the context of a whole web database, including semantic aspects, and ...
|
Mar 16 2020 |
|
|
|
|
|
|
Hack for hire Mirian A. Queue 17(4): 41-60, 2019. Type: Article
Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...
|
Jan 29 2020 |
|
|
|
|
|
|
Engineering trustworthy systems: a principled approach to cybersecurity Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...
|
Nov 4 2019 |
|
|
|
|
|
|
Engineering trustworthy systems: a principled approach to cybersecurity Saydjari O. Communications of the ACM 62(6): 63-69, 2019. Type: Article
In this article--an extract of his book on 223 security principles [1]--Saydjari discusses the ten “most fundamental” principles. Both the book and article are addressed to software engineers who w...
|
Nov 4 2019 |
|
|
|
|
|
|
Blockchains from a distributed computing perspective Herlihy M. Communications of the ACM 62(2): 78-85, 2019. Type: Article, Reviews: (2 of 2)
Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent tutorial on blockchains from the po...
|
Mar 18 2019 |
|
|
|
|
|
|
Blockchains from a distributed computing perspective Herlihy M. Communications of the ACM 62(2): 78-85, 2019. Type: Article, Reviews: (2 of 2)
Maurice Herlihy has published a book and numerous papers on distributed systems, and in particular concurrency, so he is in a very good position to judge blockchains. He has written here an excellent tutorial on blockchains from the po...
|
Mar 18 2019 |
|
|
|
|
|
|
Federal cloud computing: the definitive guide for cloud service providers (2nd ed.) Metheny M., Syngress Publishing, Cambridge, MA, 2017. 536 pp. Type: Book (978-0-128097-10-6)
The title indicates that this is a guide for cloud service providers (CSPs) who deal with the US government; however, many of the sections will not be of interest to this audience. All of the many references are to government documents...
|
Jul 23 2018 |
|
|
|
|
|
|
Security for the robot operating system Dieber B., Breiling B., Taurer S., Kacianka S., Rass S., Schartner P. Robotics and Autonomous Systems 98 192-203, 2017. Type: Article
This paper is one of the few reported studies on the security of robotic operating systems. As such, it has clear value to make robotic system designers and users aware of the need for security in these systems....
|
Jan 8 2018 |
|
|
|
|
|
|
Security for the robot operating system Dieber B., Breiling B., Taurer S., Kacianka S., Rass S., Schartner P. Robotics and Autonomous Systems 98 192-203, 2017. Type: Article
This paper is one of the few reported studies on the security of robotic operating systems. As such, it has clear value to make robotic system designers and users aware of the need for security in these systems....
|
Jan 8 2018 |
|
|
|
|
|
|
|
|
|
|
|