Carlos Maziero

According to our database1, Carlos Maziero authored at least 43 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model.
ACM Comput. Surv., 2019

An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Reducing the number of response time service level objective violations by a cloud-HPC convergence scheduler.
Concurrency and Computation: Practice and Experience, 2018

A distributed online certificate status protocol for named data networks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
A model for context-sensitive usage control in healthcare information systems.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Cryptographic API for Embedded Applications.
Proceedings of the VI Brazilian Symposium on Computing Systems Engineering, 2016

Improving Network I/O Performance in Virtual Machines through Workload Profile Clustering.
Proceedings of the VI Brazilian Symposium on Computing Systems Engineering, 2016

Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Optimized access control enforcement over encrypted content in information-centric networks.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2013
Evaluation of desktop operating systems under thrashing conditions.
J. Braz. Comp. Soc., 2013

Routing Protocol Based on the Position, Velocity, and Direction of the Nodes.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A Context Manager for General-Purpose Operating Systems.
Proceedings of the 2012 Brazilian Symposium on Computing System Engineering, 2012

2011
Applying a usage control model in an operating system kernel.
J. Netw. Comput. Appl., 2011

Automatic Classification of Processes in a General-Purpose Operating System.
Proceedings of the Brazilian Symposium on Computing System Engineering, 2011

2009
Using transparent files in a fault tolerant distributed file system.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Applying quorum role in network management.
Proceedings of the Integrated Network Management, 2009

BackupIT: An Intrusion-Tolerant Cooperative Backup System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A Three-Ballot-Based Secure Electronic Voting System.
IEEE Security & Privacy, 2008

A Trust Model for a Group of E-mail Servers.
CLEI Electron. J., 2008

A Fuzzy Model for the Composition of Intrusion Detectors.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A pull-based e-mail architecture.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Trust Model Applied to E-mail Servers.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

An Experimental Peer-to-Peer E-mail System.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

2007
Protecting host-based intrusion detectors through virtual machines.
Comput. Networks, 2007

A Grammar for Specifying Usage Control Policies.
Proceedings of IEEE International Conference on Communications, 2007

2006
Some Experiences in Using Virtual Machines for Teaching Computer Networks.
Proceedings of the Education for the 21st Century, 2006

2004
RSVP Policy Control using XACML.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A framework for protecting Web services with IPsec.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A XML Policy-Based Approach for RSVP.
Proceedings of the Telecommunications and Networking, 2004

Intrusion Detection in Virtual Machine Environments.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

A Framework for Protecting Web Sevices with IPsec.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Global Mobile IPv6 Addressing using Transition Mechanisms.
J. Braz. Comp. Soc., 2003

RBPIM: A PCIM-Based Framework for RBAC.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

An Architecture for On-the-Fly File Integrity Checking.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

A Policy Based Framework for Access Control.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Policy-based Framework for RBAC.
Proceedings of the Self-Managing Distributed Systems, 2003

Extending the SDSI / SPKI Model through Federation Webs.
Proceedings of the Communications and Multimedia Security, 2003

2000
A Generic Rollback Manager for Optimistic HLA Simulations.
Proceedings of the 4th International Workshop on Distributed Simulation and Real-Time Applications (DS-RT 2000), 2000

1999
Using Computational Reflection in Optimistic Distributed Simulations.
Proceedings of the 19th International Conference of the Chilean Computer Science Society (SCCC '99), 1999

MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA.
Proceedings of the 19th International Conference of the Chilean Computer Science Society (SCCC '99), 1999

1997
Implementing replicated services in open systems using a reflective approach.
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997

1992
A Distributed Kernel for Virtual Time Driven Applications.
Proceedings of the Computing and Information, 1992


  Loading...