Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic risk-based access control architecture for cloud computing., , and . NOMS, page 1-9. IEEE, (2014)Um esquema de autorização para a segurança em sistemas distribuídos de larga escala.. Federal University of Santa Catarina, Florianópolis, Brazil, (2000)ndltd.org (oai:agregador.ibict.br.RI_UFSC:oai:repositorio.ufsc.br:123456789/106492).Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities., , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 319-338. Springer, (2023)Composition of a DIDS by integrating heterogeneous IDSs on grids., , , and . MGC@Middleware, page 12. ACM, (2006)Authorization schemes for large-scale systems based on Java, CORBA and Web security models., and . ICON, page 327-334. IEEE, (1999)Integrating SSL to the JaCoWeb Security Framework: Project and Implementation., , , and . Integrated Network Management, page 779-792. IEEE, (2001)A Design Towards Personally Identifiable Information Control and Awareness in OpenID Connect Identity Providers., and . CIT, page 37-46. IEEE Computer Society, (2017)Mutual Authentication for IoT in the Context of Fog Computing., , , and . COMSNETS, page 367-374. IEEE, (2019)Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security., , , , and . SEC, volume 214 of IFIP Conference Proceedings, page 263-274. Kluwer, (2002)Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network., , , and . NOMS, page 603-606. IEEE, (2012)