Gustavo Roecker Schmitt's research while affiliated with Federal University of Santa Catarina and other places

Publications (2)

Full-text available
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known...
Conference Paper
Full-text available
The increase of dynamic cloud computing environments introduces the need for new ways of access control in applications. One access control model which adapts flexibly to such systems on the Internet is the RAdAC (Risk-Adaptive Access Control). This model is based on the user confidence degree and the risk of releasing access to some information ta...


... The function ( _ ) depends on the return results from the monitoring system, which returns results based on abnormal factors for that user. The details about metrics will be presented later in Table 2, [23]. ...