Daniel Ricardo dos Santos

According to our database1, Daniel Ricardo dos Santos authored at least 23 papers between 2014 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Leveraging operational technology and the Internet of things to attack smart buildings.
J. Comput. Virol. Hacking Tech., 2021

2020
A Matter of Life and Death: Analyzing the Security of Healthcare Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
TestREx: a framework for repeatable exploits.
Int. J. Softw. Tools Technol. Transf., 2019

Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems.
Proceedings of the Critical Information Infrastructures Security, 2018

2017
Automatic Techniques for the Synthesis and Assisted Deployment of Security Policies in Workflow-based Applications.
PhD thesis, 2017

Automatically finding execution scenarios to deploy security-sensitive workflows.
J. Comput. Secur., 2017

A Survey on Workflow Satisfiability, Resiliency, and Related Problems.
CoRR, 2017

On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

From System Specification to Anomaly Detection (and back).
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
A framework and risk assessment approaches for risk-based access control in the cloud.
J. Netw. Comput. Appl., 2016

Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2016

Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

2015
Modularity for Security-Sensitive Workflows.
CoRR, 2015

Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A cyclical evaluation model of information security maturity.
Inf. Manag. Comput. Secur., 2014

Privacy-preserving identity federations in the cloud: a proof of concept.
Int. J. Secur. Networks, 2014

TESTREX: a Testbed for Repeatable Exploits.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

A dynamic risk-based access control architecture for cloud computing.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014


  Loading...