Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy control management for Web Services., , , , and . Integrated Network Management, page 49-56. IEEE, (2009)A Lightweight Intrusion-Tolerant Overlay Network., and . ISORC, page 496-503. IEEE Computer Society, (2006)Role-Based Access Control for CORBA Distributed Object Systems., and . WORDS, page 53-60. IEEE Computer Society, (2002)Diagnosing Memory Provisioning in IaaS Clouds., , and . SBESC, page 1-6. IEEE Computer Society, (2013)Brazilian Symposium on Computing System Engineering., , and . ACM SIGOPS Oper. Syst. Rev., 49 (2): 1-2 (2015)Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks., , , and . ICISSP, page 21-29. SCITEPRESS, (2024)Investigating Performance and Cost in Function-as-a-Service Platforms., and . 3PGCIC, volume 96 of Lecture Notes in Networks and Systems, page 174-185. Springer, (2019)Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust., , , , and . SELMAS, volume 2940 of Lecture Notes in Computer Science, page 207-224. Springer, (2003)DReAM - a distributed result-aware monitor for Network Functions Virtualization., , , , , , and . ISCC, page 663-668. IEEE Computer Society, (2016)A Security Scheme for Mobile Agent Platforms in Large-Scale Systems., , and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 104-116. Springer, (2003)