Altair Olivo Santin
According to our database1, Altair Olivo Santin authored at least 51 papers between 2003 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Using Blockchains to Implement Distributed Measuring Systems.
IEEE Trans. Instrumentation and Measurement, 2019
SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming.
J. Netw. Comput. Appl., 2019
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks.
Future Gener. Comput. Syst., 2019
A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT.
A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems.
Comput. Secur., 2018
Enabling Anomaly-based Intrusion Detection Through Model Generalization.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Are fintechs really a hype? A machine learning-based polarity analysis of Brazilian posts on social media.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018
How blockchains can improve measuring instruments regulation and control.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2018
A Machine Learning Auditing Model for Detection of Multi-Tenancy Issues Within Tenant Domain.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems.
IEEE Trans. Computers, 2017
Toward a reliable anomaly-based intrusion detection in real-world environments.
Comput. Networks, 2017
Stream learning and anomaly-based intrusion detection in the adversarial settings.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
A multi-domain role activation model.
Proceedings of the IEEE International Conference on Communications, 2017
A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Providing security and privacy in smart house through mobile cloud computing.
Proceedings of the 8th IEEE Latin-American Conference on Communications, 2016
Insights on the resilience and capacity of AMI wireless networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
On the dynamics of the RPL protocol in AMI networks under jamming attacks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Method for testing the fault tolerance of MapReduce frameworks.
Comput. Networks, 2015
A Usage Control Platform Based on Rule Templates and Authorization Credentials.
Proceedings of the XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, 2015
Managing distributed UCONabc policies with authorization assertions and policy templates.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
The energy cost of network security: A hardware vs. software comparison.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
An Approach to Deal with Processing Surges in Cloud Computing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
A (UCONABC) Resilient Authorization Evaluation for Cloud Computing.
IEEE Trans. Parallel Distrib. Syst., 2014
Algorithms for a distributed IDS in MANETs.
J. Comput. Syst. Sci., 2014
Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Evaluation of desktop operating systems under thrashing conditions.
J. Braz. Comp. Soc., 2013
Mitigating XML Injection 0-Day Attacks through Strategy-Based Detection Systems.
IEEE Security & Privacy, 2013
Obtaining the threat model for e-mail phishing.
Appl. Soft Comput., 2013
Integral Federated Identity Management for Cloud Computing.
Proceedings of the 5th International Conference on New Technologies, 2012
Distributed Algorithms for the Creation of a New Distributed IDS in MANETs.
Proceedings of the Internet and Distributed Computing Systems, 2012
A Distributed IDS for Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Applying a usage control model in an operating system kernel.
J. Netw. Comput. Appl., 2011
Octopus-IIDS: An anomaly based intelligent intrusion detection system.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
SP2MS: A MANet-Based P2P Service.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Policy management architecture based on provisioning model and authorization certificates.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Applying quorum role in network management.
Proceedings of the Integrated Network Management, 2009
Policy control management for Web Services.
Proceedings of the Integrated Network Management, 2009
Distributed Usage Control Architecture for Business Coalitions.
Proceedings of IEEE International Conference on Communications, 2009
A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
A Three-Ballot-Based Secure Electronic Voting System.
IEEE Security & Privacy, 2008
A pull-based e-mail architecture.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Protocol of Authenticity to Provide Legal Security in e-Contracts - A Prototype.
Proceedings of the ICE-B 2008, 2008
An Experimental Peer-to-Peer E-mail System.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008
Web2Peer: A Peer-to-Peer Infrastructure for Publishing/Locating/Replicating Web Pages on Internet.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2007), 2007
A Grammar for Specifying Usage Control Policies.
Proceedings of IEEE International Conference on Communications, 2007
Implementing a Peer-to-Peer Web Browser for Publishing and Searching Web Pages on Internet.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Teias de federações.
PhD thesis, 2004
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Building Trust Chains between CORBA Objects.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003
Extending the SDSI / SPKI Model through Federation Webs.
Proceedings of the Communications and Multimedia Security, 2003