Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Database Management (H.2) > General (H.2.0) > Security, Integrity, And Protection (H.2.0...)  
 
Options:
 
  1-10 of 32 Reviews about "Security, Integrity, And Protection (H.2.0...)": Date Reviewed
  Internet of Things: information security challenges and solutions
Miloslavskaya N., Tolstoy A. Cluster Computing 22(1): 103-119, 2019.  Type: Article

The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for developing services and applications, it h...

Jan 9 2020
  2018: a big year for privacy
Landwehr C. Communications of the ACM 62(2): 20-22, 2019.  Type: Article

Privacy and security issues reached high visibility in 2018, with many major publicized incidents. Carl Landwehr starts with the Facebook–Cambridge Analytica scandal, and then describes regulatory efforts such as the European Union (EU...

Nov 7 2019
  Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A. Personal and Ubiquitous Computing 20(6): 875-884, 2016.  Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “pr...

Nov 7 2017
  The psychology of information security
Zinatullin L., It Governance Ltd, Ely, UK, 2016. 128 pp.  Type: Book (978-1-849287-89-0)

With the increase of ever-advancing technology, the field of information security has seemingly overlooked a crucial factor: humans. This book aims to address this lacuna by describing the role of human psychology with respect to secur...

Aug 15 2017
  Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
Halevi T., Saxena N. International Journal of Information Security 14(5): 443-456, 2015.  Type: Article

Side channel attacks are commonly associated with the observation of physical parameters of electronic systems to obtain useful information to breach system security. Typical parameters that can yield interesting results include timing...

Feb 17 2016
  Protecting privacy in data release
Livraga G., Springer Publishing Company, Incorporated, New York, NY, 2015. 192 pp.  Type: Book (978-3-319161-08-2)

With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies...

Oct 13 2015
  Advanced linear cryptanalysis of block and stream ciphers
Junod P., Canteaut A., IOS PRESS, Amsterdam, the Netherlands, 2011. 144 pp.  Type: Book (978-1-607508-43-4)

Linear cryptanalysis started to attract broad interest from the worldwide cryptologic community in 1994, when Mitsuru Matsui presented a method to break the data encryption standard (DES) cipher through what can be substantively define...

Aug 1 2012
  Dependencies revisited for improving data quality
Fan W.  PODS 2008 (Proceedings of the 27th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Vancouver, Canada, Jun 9-12, 2008) 159-170, 2008.  Type: Proceedings

Poor data quality, especially in relational databases--such as incorrectly priced products in retail databases--has proven to be very expensive. Helping to improve the quality of data through semi-automated software p...

Dec 10 2008
  Digital multi-signature scheme based on the elliptic curve cryptosystem
Chen T., Huang K., Chung Y. Journal of Computer Science and Technology 19(4): 570-573, 2004.  Type: Article

Chen, Huang, and Chung develop a multi-signature algorithm, based on an older paper by Popescu [1]....

Feb 1 2005
  Computational Issues in Secure Interoperation
Gong L., Qian X. IEEE Transactions on Software Engineering 22(1): 43-52, 1996.  Type: Article

We tend to design, build, and test automated systems one at a time. However, we tend to field them in interoperational clusters. This produces significant problems of adequate super-systems testing and, therefore, of adequate super-sys...

Jan 1 1997
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy