Search Results - "Santana de Oliveira, Anderson"

Refine Results
  1. 1

    A risk assessment model for selecting cloud service providers by Cayirci, Erdal, Garaga, Alexandr, Santana de Oliveira, Anderson, Roudier, Yves

    “…The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service…”
    Get full text
    Journal Article
  2. 2

    Modelling trust and risk for cloud services by Cayirci, Erdal, de Oliveira, Anderson Santana

    “…A joint trust and risk model is introduced for federated cloud services. The model is based on cloud service providers’ performance history. It addresses…”
    Get full text
    Journal Article
  3. 3

    Track Report of Future Internet Services and Applications (FISA'2019) by Sellami, Mohamed, Hadj Kacem, Hatem, Santana De Oliveira, Anderson

    “…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
    Get full text
    Conference Proceeding
  4. 4

    Track Report of Privacy and Accountability for Software and Cloud Services (PASCS 2014) by Sellami, Mohamed, Royer, Jean-Claude, Oliveira, Anderson Santana De

    “…The goal of the PASCS track is to offer academic and industrial researchers and practitioners a platform for discussions related to privacy and accountability…”
    Get full text
    Conference Proceeding
  5. 5

    A Cloud Adoption Risk Assessment Model by Cayirci, Erdal, Garaga, Alexandr, Santana de Oliveira, Anderson, Roudier, Yves

    “…Cloud Adoption Risk Assessment Model is designed for cloud customers to assess the risks that they face by selecting a specific cloud service provider. It is…”
    Get full text
    Conference Proceeding
  6. 6

    Track Report of Future Internet Services and Applications (FISA'2016) by ben Halima, Riadh, Oliveira, Anderson Santana de, Sellami, Mohamed

    “…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
    Get full text
    Conference Proceeding
  7. 7

    Platform-level Support for Authorization in Cloud Services with OAuth 2 by Sendor, Jakub, Lehmann, Yann, Serme, Gabriel, Santana de Oliveira, Anderson

    “…The OAuth 2 web authorization framework allows services to act on behalf of users when interacting with other services. It avoids sharing username and…”
    Get full text
    Conference Proceeding
  8. 8

    Analysis of Rewrite-Based Access Control Policies by Kirchner, Claude, Kirchner, Hélène, de Oliveira, Anderson Santana

    “…The rewrite-based approach provides executable specifications for security policies, which can be independently designed, verified, and then anchored on…”
    Get full text
    Journal Article
  9. 9

    Privacy-Preserving Techniques and System for Streaming Databases by Santana de Oliveira, Anderson, Kerschbaum, F., Hoon Wei Lim, Su-Yang Yu

    “…Streaming databases and other distributed, event-based systems are very useful tools for business and security applications. When event sources and event…”
    Get full text
    Conference Proceeding
  10. 10

    FISA 2015 Track Report: Future Internet Services and Applications by Kacem, Hatem Hadj, De Oliveira, Anderson Santana, Sellami, Mohamed, Lefebvre, Sylvain

    “…The "Future Internet Services and Applications" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet…”
    Get full text
    Conference Proceeding
  11. 11

    An Empirical Analysis of Fairness Notions under Differential Privacy by de Oliveira, Anderson Santana, Kaplan, Caelin, Mallat, Khawla, Chakraborty, Tanmay

    Published 06-02-2023
    “…Recent works have shown that selecting an optimal model architecture suited to the differential privacy setting is necessary to achieve the best possible…”
    Get full text
    Journal Article
  12. 12

    A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses by Kaplan, Caelin G, Xu, Chuan, Marfoq, Othmane, Neglia, Giovanni, de Oliveira, Anderson Santana

    Published 18-10-2023
    “…Within the realm of privacy-preserving machine learning, empirical privacy defenses have been proposed as a solution to achieve satisfactory levels of training…”
    Get full text
    Journal Article
  13. 13

    Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data by Frigerio, Lorenzo, de Oliveira, Anderson Santana, Gomez, Laurent, Duverger, Patrick

    Published 08-01-2019
    “…Open data plays a fundamental role in the 21th century by stimulating economic growth and by enabling more transparent and inclusive societies. However, it is…”
    Get full text
    Journal Article
  14. 14

    Rewriting-Based Access Control Policies by de Oliveira, Anderson Santana

    “…In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is…”
    Get full text
    Journal Article
  15. 15

    VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud by Eskandari, Mojtaba, De Oliveira, Anderson Santana, Crispo, Bruno

    “…The geolocation of data stored and being processed in cloud is an important issue for many organisations due to obligations that require sensitive data to…”
    Get full text
    Conference Proceeding
  16. 16

    ROCK Algorithm Parallelization with TOREADOR Primitives by Di Martino, Beniamino, DAngelo, Salvatore, Esposito, Antonio, Cappuzzo, Riccardo, de Oliveira, Anderson Santana

    “…We present the benefits of applying the code once deploy everywhere approach to clustering of categorical data over large datasets. The paper brings two main…”
    Get full text
    Conference Proceeding
  17. 17

    Monitoring Personal Data Transfers in the Cloud by De Oliveira, Anderson Santana, Sendor, Jakub, Garaga, Alexander, Jenatton, Kateline

    “…Cloud computing brings a number of compliance risks to organisations because physical perimeters are not clearly delimited. Many regulations relate to the…”
    Get full text
    Conference Proceeding
  18. 18

    HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems by Dell'Amico, Matteo, Serme, Gabriel, Idrees, Muhammad Sabir, Santana de Oliveira, Anderson, Roudier, Yves

    Published in Information security technical report (01-02-2013)
    “…Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly…”
    Get full text
    Journal Article
  19. 19

    Enabling Message Security for RESTful Services by Serme, G., de Oliveira, A. S., Massiera, J., Roudier, Y.

    “…The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream…”
    Get full text
    Conference Proceeding
  20. 20

    Rewrite Based Specification of Access Control Policies by Cirstea, Horatiu, Moreau, Pierre-Etienne, de Oliveira, Anderson Santana

    “…Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to…”
    Get full text
    Journal Article