Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Wang, Ting
IBM
Yorktown Heights, New York
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 3 of 3 reviews

   
  Certification authorities under attack: a plea for certificate legitimation
Oppliger R. IEEE Internet Computing 18(1): 40-47, 2014.  Type: Article

The legitimacy of certification in public-key infrastructure (PKI) is crucial for Internet security. This article discusses recent attacks against certification authorities (CA), revealing two main issues: certificate revocation and ce...

May 5 2015  
  Generalization-based privacy preservation and discrimination prevention in data publishing and mining
Hajian S., Domingo-Ferrer J., Farràs O. Data Mining and Knowledge Discovery 28(5-6): 1158-1188, 2014.  Type: Article

Publishing data for secondary analysis benefits applications ranging from medical research to policy making; however, it also incurs the risks of invasion of individual privacy and creation of discrimination. This paper develops a data...

Jan 20 2015  
  Trust prediction via belief propagation
Zhang R., Mao Y. ACM Transactions on Information Systems 32(3): 1-27, 2014.  Type: Article

Assessing trust relationships in social networks is vital for a lot of applications. However, the problem is challenging as trust relationships are often not directly observable. The goal of this paper is to predict trust relationships...

Nov 11 2014  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy