Ruggiero, Wilson Vicente
Results: Displaying 10 of 20 on page 2 of 2
Name
Title
Area
Document
Colleges
Year
Modeling and analysis of security policies for systems having business-related ...
Architecture of mobile applications with information flow control
Hardware design and performance analysis for cryptographic sponge BlaMka
A data center command and control infrastructure for a computing resource ensemb...
Validation of consumers in services oriented architecture (SOA): a framework to validate...
Technique for quantization coefficients adjustment for real-time MPEG compressio...
Policies analysis of role based access control with colored Petri net
MOS - Ontological Security Model for access control policy negotiation in multi-...
Design and implementation of an authentication device
Security in financial applications on the internet: the weakest link
Results: Displaying 10 of 20 on page 2 of 2