Anderson Santana de Oliveira

Orcid: 0000-0003-0364-6328

According to our database1, Anderson Santana de Oliveira authored at least 48 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses.
Proc. Priv. Enhancing Technol., January, 2024

2023
An Empirical Analysis of Fairness Notions under Differential Privacy.
CoRR, 2023

Simulating Deception for Web Applications Using Reinforcement Learning.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2021
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2019
Track Report of Future Internet Services and Applications (FISA'2019).
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open Data.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Modelling trust and risk for cloud services.
J. Cloud Comput., 2018

ROCK Algorithm Parallelization with TOREADOR Primitives.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.
Proc. Priv. Enhancing Technol., 2017

Towards the Specification of Natural Language Accountability Policies with AccLab: The Laptop Policy Use Case.
Proceedings of the First Workshop on Computational Accountability and Responsibility in Multiagent Systems co-located with 20th International Conference on Principles and Practice of Multi-Agent Systems, 2017

DLoc: Distributed Auditing for Data Location Compliance in Cloud.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
A risk assessment model for selecting cloud service providers.
J. Cloud Comput., 2016

Track Report of Future Internet Services and Applications (FISA'2016).
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

AAL and Static Conflict Detection in Policy.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
FISA 2015 Track Report: Future Internet Services and Applications.
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015

A4Cloud Workshop: Accountability in the Cloud.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

A Data Protection Impact Assessment Methodology for Cloud.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Track Report of Privacy and Accountability for Software and Cloud Services (PASCS 2014).
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

A Cloud Adoption Risk Assessment Model.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Abstract Accountability Language.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Platform-level Support for Authorization in Cloud Services with OAuth 2.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A-PPL: An Accountability Policy Language.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

A Cloud Accountability Policy Representation Framework.
Proceedings of the CLOSER 2014, 2014

From Regulatory Obligations to Enforceable Accountability Policies in the Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

A Model-Driven Approach for Accountability in Business Processes.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

2013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems.
Inf. Secur. Tech. Rep., 2013

Control as a Means towards Accountable Services in the Cloud.
Comput. Syst. Sci. Eng., 2013

Enforcing Input Validation through Aspect Oriented Programming.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Reference Monitors for Security and Interoperability in OAuth 2.0.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Monitoring Personal Data Transfers in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
HiPoLDS: A Security Policy Language for Distributed Systems.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Privacy-Preserving Techniques and System for Streaming Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Towards Accountable Services in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Enabling Message Security for RESTful Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Comparative Analysis of Clustering Algorithms Applied to the Classification of Bugs.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Automating Privacy Enforcement in Cloud Platforms.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
BluEx: uma experiência com o uso de tecnologias de integração entre telefone celular e computador.
Proceedings of the IHC+CLIHC '11: 10th Brazilian Symposium on Human Factors in Computing Systems and the 5th Latin American Conference on Human Computer Interaction, Porto de Galinhas, Pernambuco, Brazil, October 25, 2011

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2008
Réécriture et Modularité pour les Politiques de Sécurité. (Term Rewriting and Modularity for Security Policies).
PhD thesis, 2008

Analysis of Rewrite-Based Access Control Policies.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

Rewrite Based Specification of Access Control Policies.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

2007
Modular Access Control Via Strategic Rewriting.
Proceedings of the Computer Security, 2007

Weaving rewrite-based access control policies.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Rewriting-Based Access Control Policies.
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006

2005
Anchoring Modularity in HTML.
Proceedings of the International Workshop on Automated Specification and Verification of Web Sites, 2005

2003
Simulating Algebraic Specification Genericity on Languages with Initial Semantics.
Proceedings of the 6th Brazilian Workshop on Formal Methods, 2003

A Tool Support for Reusing ELAN Rule-Based Components.
Proceedings of the 4th International Workshop on Rule-Based Programming, 2003


  Loading...