Fernando Antônio Aires Lins

Orcid: 0000-0002-4007-3891

According to our database1, Fernando Antônio Aires Lins authored at least 44 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Avaliação de Usabilidade de Jogos Educacionais para pessoas com a Síndrome de Williams-Beuren.
Revista Brasileira de Informática na Educ., 2024

Selecting Blockchain Consensus Algorithms Integrations for IoT-based Enviroments.
Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, 2024

2023
Survey on Integration of Consensus Mechanisms in IoT-based Blockchains.
J. Univers. Comput. Sci., October, 2023

Security Evaluation of Authentication Requirements in IoT Gateways.
J. Netw. Syst. Manag., October, 2023

Evaluating Cryptographic Security Requirements in IoT Gateways.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Beholder - A CEP-based intrusion detection and prevention systems for IoT environments.
Comput. Secur., 2022

Do Platforms Care About Your Child's Data? A Proposal of Legal Requirements for Children's Privacy and Protection.
Proceedings of the Anais do WER22, 2022

Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways.
Proceedings of the 11th Latin-American Symposium on Dependable Computing, 2022

On the Compliance of Platforms with Children's Privacy and Protection Requirements - An Analysis of TikTok.
Proceedings of the Software Business - 13th International Conference, 2022

2021
Security Requirements and Solutions for IoT Gateways: A Comprehensive Study.
IEEE Internet Things J., 2021

An execution environment as a service for adaptive long-running workflows.
Int. J. Web Inf. Syst., 2021

A Methodology for Intelligent Offloading Decision in Mobile Cloud Computing Environments.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2021

2019
A Strategy for Performance Evaluation and Modeling of Cloud Computing Services.
RITA, 2019

Adaptive support to execution of long-running workflows.
Int. J. Bus. Process. Integr. Manag., 2019

2018
A survey on automation of security requirements in service-based business processes.
Int. J. Web Eng. Technol., 2018

2017
Cloud infrastructure planning considering different redundancy mechanisms.
Computing, 2017

Invasive technique for measuring the energy consumption of mobile devices applications in mobile cloud environments.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

An algorithm to optimise the load distribution of fog environments.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Evaluation of virtual learning environments for the teaching of students with down syndrome.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A multi-perspective methodology for evaluating the security maturity of data centers.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2016
Automation of service-based security-aware business processes in the Cloud.
Computing, 2016

2015
A Modeling Approach for Cloud Infrastructure Planning Considering Dependability and Cost Requirements.
IEEE Trans. Syst. Man Cybern. Syst., 2015

Performability Assessment of a Government Process in the Cloud.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

xLONGWisE: An environment to support the execution of Long Running Workflows.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Towards a model-driven approach for treating quality attributes of service-based business processes.
Int. J. Web Eng. Technol., 2014

Dependability evaluation of cloud infrastructures.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Performance and Cost Modeling Strategy for Cloud Infrastructure Planning.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

Realizing Quality Attributes of Service-Based Business Processes: A Model-Driven Approach.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Execution Support to Long Running Workflows.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Stochastic Model Generation for Cloud Infrastructure Planning.
Proceedings of the IEEE International Conference on Systems, 2013

Comparative Study of Service-Based Security-Aware Business Processes Automation Tools.
Proceedings of the IEEE International Conference on Systems, 2013

2012
Towards an approach to design and enforce security in web service composition.
Int. J. Web Eng. Technol., 2012

Capacity planning of EFT service hosted on elastic IaaS.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

The Limitations of Description Logic for Mathematical Ontologies: An Example on Neural Networks.
Proceedings of Joint V Seminar on Ontology Research in Brazil and VII International Workshop on Metamodels, 2012

2011
SSC4Cloud Tooling: An Integrated Environment for the Development of Business Processes with Security Requirements in the Cloud.
Proceedings of the World Congress on Services, 2011

Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud.
Proceedings of the IEEE International Conference on Web Services, 2011

2009
An Approach for Reducing the Gap between BPMN Models and Implementation Artifacts.
RITA, 2009

Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types.
RITA, 2009

Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

Incorporating Security Requirements into Service Composition: From Modelling to Execution.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

2007
Adaptive web service composition.
ACM SIGSOFT Softw. Eng. Notes, 2007

Improving Transparent Adaptability in Web Service Composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007


  Loading...