Author of the publication

Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities.

, , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 319-338. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policap-Proposal, Development and Evaluation of a Policy. Service and Capabilities for CORBA Security., , , , and . SEC, volume 214 of IFIP Conference Proceedings, page 263-274. Kluwer, (2002)Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network., , , and . NOMS, page 603-606. IEEE, (2012)Defending Grids Against Intrusions., , , and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 248-250. Springer, (2006)Modelo de Avaliação da Maturidade da Segurança da Informação., and . SBSI, page 93-104. (2011)A DRM Architecture to Distribute and Protect Digital Contents Using Digital Licenses., , and . AICT/SAPIR/ELETE, page 422-427. IEEE Computer Society, (2005)A dynamic risk-based access control architecture for cloud computing., , and . NOMS, page 1-9. IEEE, (2014)Um esquema de autorização para a segurança em sistemas distribuídos de larga escala.. Federal University of Santa Catarina, Florianópolis, Brazil, (2000)ndltd.org (oai:agregador.ibict.br.RI_UFSC:oai:repositorio.ufsc.br:123456789/106492).Composition of a DIDS by integrating heterogeneous IDSs on grids., , , and . MGC@Middleware, page 12. ACM, (2006)Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities., , and . ICISS, volume 14424 of Lecture Notes in Computer Science, page 319-338. Springer, (2023)Authorization schemes for large-scale systems based on Java, CORBA and Web security models., and . ICON, page 327-334. IEEE, (1999)