Search Results - "Oliveira, Anderson Santana de"
-
1
A risk assessment model for selecting cloud service providers
Published in Journal of cloud computing : advances, systems and applications (13-09-2016)“…The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service…”
Get full text
Journal Article -
2
Modelling trust and risk for cloud services
Published in Journal of cloud computing : advances, systems and applications (02-08-2018)“…A joint trust and risk model is introduced for federated cloud services. The model is based on cloud service providers’ performance history. It addresses…”
Get full text
Journal Article -
3
Track Report of Future Internet Services and Applications (FISA'2019)
Published in 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (01-06-2019)“…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
Get full text
Conference Proceeding -
4
Track Report of Privacy and Accountability for Software and Cloud Services (PASCS 2014)
Published in 2014 IEEE 23rd International WETICE Conference (01-06-2014)“…The goal of the PASCS track is to offer academic and industrial researchers and practitioners a platform for discussions related to privacy and accountability…”
Get full text
Conference Proceeding -
5
A Cloud Adoption Risk Assessment Model
Published in 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (01-12-2014)“…Cloud Adoption Risk Assessment Model is designed for cloud customers to assess the risks that they face by selecting a specific cloud service provider. It is…”
Get full text
Conference Proceeding -
6
Track Report of Future Internet Services and Applications (FISA'2016)
Published in 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (01-06-2016)“…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
Get full text
Conference Proceeding -
7
Platform-level Support for Authorization in Cloud Services with OAuth 2
Published in 2014 IEEE International Conference on Cloud Engineering (01-03-2014)“…The OAuth 2 web authorization framework allows services to act on behalf of users when interacting with other services. It avoids sharing username and…”
Get full text
Conference Proceeding -
8
Analysis of Rewrite-Based Access Control Policies
Published in Electronic notes in theoretical computer science (28-03-2009)“…The rewrite-based approach provides executable specifications for security policies, which can be independently designed, verified, and then anchored on…”
Get full text
Journal Article -
9
Privacy-Preserving Techniques and System for Streaming Databases
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01-09-2012)“…Streaming databases and other distributed, event-based systems are very useful tools for business and security applications. When event sources and event…”
Get full text
Conference Proceeding -
10
FISA 2015 Track Report: Future Internet Services and Applications
Published in 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (01-06-2015)“…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
Get full text
Conference Proceeding -
11
An Empirical Analysis of Fairness Notions under Differential Privacy
Published 06-02-2023“…Recent works have shown that selecting an optimal model architecture suited to the differential privacy setting is necessary to achieve the best possible…”
Get full text
Journal Article -
12
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses
Published 18-10-2023“…Within the realm of privacy-preserving machine learning, empirical privacy defenses have been proposed as a solution to achieve satisfactory levels of training…”
Get full text
Journal Article -
13
Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data
Published 08-01-2019“…Open data plays a fundamental role in the 21th century by stimulating economic growth and by enabling more transparent and inclusive societies. However, it is…”
Get full text
Journal Article -
14
Rewriting-Based Access Control Policies
Published in Electronic notes in theoretical computer science (10-07-2007)“…In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is…”
Get full text
Journal Article -
15
VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud
Published in 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (01-12-2014)“…The geolocation of data stored and being processed in cloud is an important issue for many organisations due to obligations that require sensitive data to…”
Get full text
Conference Proceeding -
16
ROCK Algorithm Parallelization with TOREADOR Primitives
Published in 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (01-05-2018)“…We present the benefits of applying the code once deploy everywhere approach to clustering of categorical data over large datasets. The paper brings two main…”
Get full text
Conference Proceeding -
17
Monitoring Personal Data Transfers in the Cloud
Published in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (01-12-2013)“…Cloud computing brings a number of compliance risks to organisations because physical perimeters are not clearly delimited. Many regulations relate to the…”
Get full text
Conference Proceeding -
18
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems
Published in Information security technical report (01-02-2013)“…Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly…”
Get full text
Journal Article -
19
Enabling Message Security for RESTful Services
Published in 2012 IEEE 19th International Conference on Web Services (01-06-2012)“…The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream…”
Get full text
Conference Proceeding -
20
Rewrite Based Specification of Access Control Policies
Published in Electronic notes in theoretical computer science (28-03-2009)“…Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to…”
Get full text
Journal Article