Search Results - "Stihler, Maicon"
-
1
Enhancing service maintainability by monitoring and auditing SLA in cloud computing
Published in Cluster computing (01-09-2021)“…Enforcing Service Level Agreements (SLA) on service provisioning is a challenge in cloud computing environments. This paper proposes an architecture for…”
Get full text
Journal Article -
2
A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT
Published in Mobile networks and applications (01-08-2018)“…The literature does not present integral solutions to allow using the same credential to access the smart meter and smart house from an electric utility and…”
Get full text
Journal Article -
3
A multi-domain role activation model
Published in 2017 IEEE International Conference on Communications (ICC) (01-05-2017)“…Organizations establish partnerships in order to achieve a strategic goal. In many cases, resources in a given organization are accessed from external domains,…”
Get full text
Conference Proceeding -
4
A (\rm UCON) Resilient Authorization Evaluation for Cloud Computing
Published in IEEE transactions on parallel and distributed systems (01-02-2014)“…The business-driven access control used in cloud computing is not well suited for tracking fine-grained user service consumption. UCON ABC applies continuous…”
Get full text
Journal Article -
5
Managing distributed UCONabc policies with authorization assertions and policy templates
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01-07-2015)“…Managing UCONabc policies in modern distributed computing systems is a challenge for traditional approaches. The provisioning model has trouble to keep track…”
Get full text
Conference Proceeding -
6
Distributed Usage Control Architecture for Business Coalitions
Published in 2009 IEEE International Conference on Communications (01-06-2009)“…The dynamic environment of business coalition (BC) requires a flexible access control approach to deal with user management and policy writing. However, the…”
Get full text
Conference Proceeding -
7
A Usage Control Platform Based on Rule Templates and Authorization Credentials
Published in 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems (01-05-2015)“…The popularization of PaaS environments presents challenges to traditional authorization models for controlling resource usage. This article describes a hybrid…”
Get full text
Conference Proceeding -
8
Integral Federated Identity Management for Cloud Computing
Published in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS) (01-05-2012)“…Cloud computing environments may offer different levels of abstraction to its users. Federated identity management, though, does not leverage these…”
Get full text
Conference Proceeding -
9
Policy control management for Web Services
Published in 2009 IFIP/IEEE International Symposium on Integrated Network Management (01-06-2009)“…The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and…”
Get full text
Conference Proceeding