This paper describes an application, based onPersonal Digital Assistant (PDA), to support the techniciansof the Computer and Communications Center of theUniversity of Aveiro (CICUA) in the maintenance of thecomputers and other type of hardware in the UniversityCampus. The application we developed allows the technicianto receive a Request for Technical Assistance (PAT) in anyplace of the University Campus that i...
This paper studies the suitability of brain activity, namely electroencephalogram signals, as raw material for conducting biometric authentication of individuals. Brain responses were extracted in particular scenarios, namely with visual stimulation leading to biological brain responses known as visual evoked potentials. In our study, we evaluated a novel method, using only 8 occipital electrodes and the energy...
As arquiteturas de interoperabilidade permitem a criação de workflows transversais na administração pública e a integração de serviços na perspetiva dos cidadãos e empresas. Neste artigo apresentamos um modelo de segurança que visa as questões levantadas por arquiteturas de interoperabilidade baseadas em agentes autónomos que suportam a composição dinâmica de workflows. O modelo baseia-se numa infraestrutura de...
As arquiteturas de interoperabilidade permitem a criação de workflows transversais na administração pública e a integração de serviços na perspetiva dos cidadãos e empresas. Neste artigo apresentamos um modelo de segurança que visa as questões levantadas por arquiteturas de interoperabilidade baseadas em agentes autónomos que suportam a composição dinâmica de workflows. O modelo baseia-se numa infraestrutura de...
This article describes StackFences, a run-time technique for detecting overflows in local variables in C programs.This technique is different from all others developed so far because it tries to detect expiicit overflow occurrences, instead of detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow.Thus, StackFences is useful not only for det...
This paper presents an overview of ontologies in Information Systems Security. Information Systems Security is a broad and dynamic area that clearly benefits from the formalizations of concepts provided by ontologies. After a very short presentation of ontologies and Semantic Web, several works in Security Ontologies targeting different aspects of security engineering are presented together with another stu...
Financiadores do RCAAP | |||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |