dos Santos, Daniel Ricardo
 Distribuzione geografica
Continente #
NA - Nord America 591
EU - Europa 257
AS - Asia 83
AF - Africa 2
Continente sconosciuto - Info sul continente non disponibili 1
SA - Sud America 1
Totale 935
Nazione #
US - Stati Uniti d'America 565
DE - Germania 61
UA - Ucraina 52
HK - Hong Kong 30
FI - Finlandia 28
CA - Canada 26
IT - Italia 24
SE - Svezia 20
RU - Federazione Russa 19
VN - Vietnam 17
CN - Cina 15
GB - Regno Unito 14
IE - Irlanda 14
BE - Belgio 13
IN - India 12
SG - Singapore 7
FR - Francia 4
ES - Italia 3
NL - Olanda 3
EG - Egitto 2
BR - Brasile 1
CH - Svizzera 1
EE - Estonia 1
EU - Europa 1
IL - Israele 1
JP - Giappone 1
Totale 935
Città #
Chandler 168
Jacksonville 120
Ann Arbor 38
Hong Kong 30
Wilmington 29
Ottawa 25
Dong Ket 17
Kronberg 17
Helsinki 15
Dublin 14
Trento 14
Brussels 13
Dearborn 13
Ashburn 12
Boardman 12
Beijing 9
Los Angeles 9
Houston 8
Singapore 6
Woodbridge 6
Campogalliano 5
Phoenix 5
Seattle 5
Pune 4
Brooklyn 3
Fremont 3
Mountain View 3
Redwood City 3
Saint Petersburg 3
Verona 3
Guangzhou 2
Madrid 2
New York 2
Portland 2
Auburn Hills 1
Birmensdorf 1
Chengdu 1
Fuzhou 1
Gunzenhausen 1
Kista 1
Nanjing 1
Neumarkt 1
North Bergen 1
Norwalk 1
Paterna 1
Rome 1
San Jose 1
Tartu 1
Wuhan 1
Totale 635
Nome #
Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation 75
A Review of PACS on Cloud for Archiving Secure Medical Images 72
Challenges of Operationalizing PACS on Cloud Over Wireless Networks 71
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 68
Automatically finding execution scenarios to deploy security-sensitive workflows 68
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 63
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 58
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 56
TESTREX: a Testbed for Repeatable Exploits 55
Modularity for Security-Sensitive Workflows 55
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 55
From System Specification to Anomaly Detection (and back) 55
A cyclical evaluation model of information security maturity 53
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios 49
A dynamic risk-based access control architecture for cloud computing 48
A Validation Model of Data Input for Web Services 46
An Architecture for Risk Analysis in Cloud 42
Totale 989
Categoria #
all - tutte 5.486
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 5.486


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020170 17 17 4 0 22 11 20 1 22 7 40 9
2020/2021177 21 1 20 5 24 7 43 0 4 23 3 26
2021/202272 1 0 3 6 0 2 2 15 5 2 10 26
2022/2023301 17 37 4 59 8 37 2 43 68 14 12 0
2023/2024124 10 6 14 8 6 6 4 17 2 41 2 8
2024/20251 1 0 0 0 0 0 0 0 0 0 0 0
Totale 989