Carlos Maziero

Orcid: 0000-0003-2592-3664

According to our database1, Carlos Maziero authored at least 60 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Enclave Management Models for Safe Execution of Software Components.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

A Categorical Data Approach for Anomaly Detection in WebAssembly Applications.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Anywhere on Earth: A Look at Regional Characteristics of DRDoS Attacks.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Intel Software Guard Extensions Applications: A Survey.
ACM Comput. Surv., 2023

Inspecting Binder Transactions to Detect Anomalies in Android.
Proceedings of the IEEE International Systems Conference, 2023

2022
Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication.
Proceedings of the IEEE International Systems Conference, 2022

Behavior Modeling of a Distributed Application for Anomaly Detection.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

How DRDoS attacks vary across the globe?
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Enhancing service maintainability by monitoring and auditing SLA in cloud computing.
Clust. Comput., 2021

Trusted Inter-Process Communication Using Hardware Enclaves.
Proceedings of the IEEE International Systems Conference, 2021

New Kids on the DRDoS Block: Characterizing Multiprotocol and Carpet Bombing Attacks.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Taking a Peek: An Evaluation of Anomaly Detection Using System calls for Containers.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
Using a Shared SGX Enclave in the UNIX PAM Authentication Service.
Proceedings of the IEEE International Systems Conference, 2020

2019
Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model.
ACM Comput. Surv., 2019

An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

2018
Reducing the number of response time service level objective violations by a cloud-HPC convergence scheduler.
Concurr. Comput. Pract. Exp., 2018

A distributed online certificate status protocol for named data networks.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
A model for context-sensitive usage control in healthcare information systems.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Cryptographic API for Embedded Applications.
Proceedings of the VI Brazilian Symposium on Computing Systems Engineering, 2016

Improving Network I/O Performance in Virtual Machines through Workload Profile Clustering.
Proceedings of the VI Brazilian Symposium on Computing Systems Engineering, 2016

Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
Optimized access control enforcement over encrypted content in information-centric networks.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2013
Evaluation of desktop operating systems under thrashing conditions.
J. Braz. Comput. Soc., 2013

Routing Protocol Based on the Position, Velocity, and Direction of the Nodes.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A Context Manager for General-Purpose Operating Systems.
Proceedings of the 2012 Brazilian Symposium on Computing System Engineering, 2012

2011
Applying a usage control model in an operating system kernel.
J. Netw. Comput. Appl., 2011

Automatic Classification of Processes in a General-Purpose Operating System.
Proceedings of the Brazilian Symposium on Computing System Engineering, 2011

2009
Using transparent files in a fault tolerant distributed file system.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Applying quorum role in network management.
Proceedings of the Integrated Network Management, 2009

BackupIT: An Intrusion-Tolerant Cooperative Backup System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A Three-Ballot-Based Secure Electronic Voting System.
IEEE Secur. Priv., 2008

A Trust Model for a Group of E-mail Servers.
CLEI Electron. J., 2008

A Fuzzy Model for the Composition of Intrusion Detectors.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A pull-based e-mail architecture.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Trust Model Applied to E-mail Servers.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

An Experimental Peer-to-Peer E-mail System.
Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, 2008

2007
Protecting host-based intrusion detectors through virtual machines.
Comput. Networks, 2007

A Grammar for Specifying Usage Control Policies.
Proceedings of IEEE International Conference on Communications, 2007

A Three-Pass Protocol for Cryptography Based on Padding for Wireless Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Some Experiences in Using Virtual Machines for Teaching Computer Networks.
Proceedings of the Education for the 21st Century, 2006

2004
RSVP Policy Control using XACML.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A framework for protecting Web services with IPsec.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A XML Policy-Based Approach for RSVP.
Proceedings of the Telecommunications and Networking, 2004

Intrusion Detection in Virtual Machine Environments.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

A Framework for Protecting Web Sevices with IPsec.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Global Mobile IPv6 Addressing using Transition Mechanisms.
J. Braz. Comput. Soc., 2003

RBPIM: A PCIM-Based Framework for RBAC.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

An Architecture for On-the-Fly File Integrity Checking.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

A Policy Based Framework for Access Control.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

A Policy-based Framework for RBAC.
Proceedings of the Self-Managing Distributed Systems, 2003

Extending the SDSI / SPKI Model through Federation Webs.
Proceedings of the Communications and Multimedia Security, 2003

2001
Intercessão em Tempo de Implantação - uma Abordagem Reflexiva para a Plataforma J2EE™ -.
Proceedings of the 15th Brazilian Symposium on Software Engineering, 2001

2000
A Generic Rollback Manager for Optimistic HLA Simulations.
Proceedings of the 4th International Workshop on Distributed Simulation and Real-Time Applications (DS-RT 2000), 2000

1999
Using Computational Reflection in Optimistic Distributed Simulations.
Proceedings of the 19th International Conference of the Chilean Computer Science Society (SCCC '99), 1999

MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA.
Proceedings of the 19th International Conference of the Chilean Computer Science Society (SCCC '99), 1999

1997
Implementing replicated services in open systems using a reflective approach.
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997

1992
A Distributed Kernel for Virtual Time Driven Applications.
Proceedings of the Computing and Information, 1992

1988
Ambiente de Concepção de Software para Sistemas Distribuídos, Baseado em Rede de Petri.
Proceedings of the 2nd Brazilian Symposium on Software Engineering, 1988


  Loading...