Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Mencl, Vladimir
REANNZ
Wellington, New Zealand
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 8 of 8 reviews

   
   Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L.  ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article

Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-remember passwords and...

Jun 27 2017  
  Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality
Kurek T., Niemiec M., Lason A.  International Journal of Information Security 15(3): 235-250, 2016. Type: Article

Would you intentionally make your firewall leak packets that are supposed to be blocked? This paper presents an interesting argument for when this might be desired....

Sep 12 2016  
  Detection and analysis of eavesdropping in anonymous communication networks
Chakravarty S., Portokalidis G., Polychronakis M., Keromytis A.  International Journal of Information Security 14(3): 205-220, 2015. Type: Article

Have you ever used an anonymizing overlay network? And even if you haven’t, how much trust would you put in one? The Tor network is getting a large number of users (500,000+), but what are the associated privacy risks?...

Oct 6 2015  
   Privacy preserved attribute aggregation to avoid correlation of user activities across Shibboleth SPs
Nakamura M., Nishimura T., Yamaji K., Sato H., Okabe Y.  COMPSACW 2013 (Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, Kyoto, Japan,  Jul 22-26, 2013) 367-372, 2013. Type: Proceedings

Have you ever encountered a problem where you thought you had to dig a tunnel through the hard way, but then saw you can instead fly around it?...

Jun 11 2014  
  Security in grid computing: a review and synthesis
Cody E., Sharman R., Rao R., Upadhyaya S.  Decision Support Systems 44(4): 749-764, 2008. Type: Article

A grid connects loosely connected resources in separate administrative domains and organizations. As the whole concept of a computational grid is still evolving, quite a few competing and complementary solutions exist. Some of them add security at...

Oct 15 2009  
  Metamodel-based model conformance and multiview consistency checking
Paige R., Brooke P., Ostroff J.  ACM Transactions on Software Engineering and Methodology 16(3): 11-es, 2007. Type: Article

Checking the consistency of models is vitally important for the success of model-driven development. For the correct operation of tools, it is essential to be able to check that a given model conforms to the rules imposed by its metamodel. Checkin...

Dec 28 2007  
   Tool support for detecting defects in object-oriented models
Górski J., Jarzebowicz A., Leszczyna R., Miler J., Olszewski M.  In Enhanced methods in computer security, biometric and artificial intelligence systems. London: Springer-Verlag, 2005. Type: Book Chapter

Defects in object-oriented designs are more costly to repair if they are detected later in the software development process. Early detection of defects should significantly reduce development costs. Apart from detecting obvious syntactic defects o...

Nov 6 2006  
  Temporal skeletons for verifying time
Naeser G., Lundqvist K., Asplund L.  Ada (Proceedings of the 2005 Annual ACM SIGAda International Conference on Ada, Atlanta, GA, USA,  Nov 13-17, 2005) 49-56, 2005. Type: Proceedings

In spite of recent developments, formal methods are still not widely used in practice, mostly because of their complexity and need for special training. This situation may be remedied by a formal method that hides the complexity from its user, the...

Feb 9 2006  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy