Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Liu, Peng Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Take it or leave it: a survey study on operating system upgrade practices
Farhang S., Weidman J., Kamani M., Grossklags J., Liu P.  ACSAC 2018 (Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, Puerto Rico, Dec 3-7, 2018) 490-504, 2018.  Type: Proceedings

Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors, often finding them rather agg...
...
Aug 19 2019  
   MyCloud: supporting user-configured privacy protection in cloud computing
Li M., Zang W., Bai K., Yu M., Liu P.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 59-68, 2013.  Type: Proceedings

The authors of this paper propose MyCloud, an architecture for improving the confidentiality of the data in virtual machines (VMs) in cloud systems. The main idea is to remove the privileges of the control VM (which normally gives the ...
...
Feb 18 2014  
  Cyber situational awareness: issues and research
Jajodia S., Liu P., Swarup V., Wang C., Springer Publishing Company, Incorporated, New York, NY, 2009. 252 pp.  Type: Book (978-1-441901-39-2)

This edited book brings into focus some important current technical issues in academic research related to the security of systems in cyberspace. The editors identify this area of research as cyber situational awareness (CSA). The coll...
...
Jun 3 2010  
  Avoiding loss of fairness owing to failures in fair data exchange systems
Liu P., Ning P. (ed), Jajodia S. Decision Support Systems 31(3): 337-350, 2001.  Type: Article

Fairness is an essential quality in e-commerce systems. The extensive literature on various approaches can be roughly divided into those that require a trusted third party (TTP), and those that gradually increase the amount of informat...
...
Jan 1 2002  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy