Carlos B Westphall | Universidade Federal de Santa Catarina - UFSC (Federal University of Santa Catarina) (original) (raw)
Papers by Carlos B Westphall
Anais do II Workshop em Segurança de Sistemas Computacionais (WSeg 2002)
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pel... more O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir informações entre cliente e servidor. Neste trabalho apresentamos uma situação real de um projeto de cartão convênio onde esta necessidade se faz presente. Estudamos o FTP e o Telnet e descrevemos implementação do Fast-TP (Fast Transmission Protocol). A seguir efetuamos testes comparativos entre o Fast-TP e o FTP tradicional. Finalmente apresentamos aspectos de segurança da implementação do Fast-TP.
Sistemas de Informação, 2016
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibili... more Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. The proposed model establishes the responsibilities of three actors: Consumer, Provider and Security Labs. The inclusion of actor Security Labs provides more credibility to risk analysis making the results more consistent for the consumer.
This article provides a real-time intrusion response system in order to reduce the consequences o... more This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
In policy-based management, service providers want to enforce fine-grained policies for their res... more In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could represent a privacy breach. This paper proposes an architecture that allows an individual to obtain services without the need of releasing all personal attributes. The architecture achieves that outcome evaluating the targeted policy in the domain of the identity provider, that is, policies are sent from service providers to identity providers to be evaluated, without the need of releasing some PIIs to the service provider side. We also present an implementation of a prototype using XACML 3.0 for fine-grained authorization and OpenID Connect for identity management. The prototype was evaluated through an use case representing an hypothetical sc...
The copyright release is a transfer of publication rights, which allows IARIA and its partners to... more The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material. This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes. I, the undersigned, declare that the article is original, and that I represent the authors of this article in the copyright release matters. If this work has been done as work-for-hire, I have obtained all necessary clearances to execute a copyright release. I hereby irrevocably transfer exclusive copyright for this material to IARIA. I give IARIA permission or reproduce the work in any media format such as, but not limited to, print, digital, or electronic. I give IARIA permission to distribute the materials without restriction to any institutions or individuals. I give IARIA permission to submit the work for inclusion in article repositories as IARIA sees fit. I, the undersigned, declare that to the best of my knowledge, the article is does not contain libelous or otherwise unlawful contents or invading the right of privacy or infringing on a proprietary right.
Clinics and hospitals are acquiring more technological resources to help providing a faster and m... more Clinics and hospitals are acquiring more technological resources to help providing a faster and more precise diagnostic, with the goal of making it more dynamic and effective. This is pushing health institutions to search for more modern equipment, with greater technological features. Besides last generation equipment, another problem faced by these institutions is enabling the connection of physicians to a Picture Archive and Communication Systems (PACS) from anywhere. With the use of communication resources increasingly present in everyday life, like Wireless-Fidelity (Wi-Fi), third generation of mobile telecommunications technology (3G), fourth generation of mobile telecommunications technology (4G), Worldwide Interoperability for Microwave Access (WiMax) and other wireless networks that allow the connection of mobile devices, it becomes easier and cheaper to provide quality medical services at a distance. Diagnoses that needed a doctor to be present, for instance, can now be per...
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques fo... more Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted Directed Acyclic Multigraphs (DAM) through the different abstraction levels of components. With this formalism, it is possible to analyse load propagation and its effects on the cloud elements from an Anything as a Service (xAAS) perspective. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g., energy-efficiency), which does not provide support to the dynamic nature of clouds and to the different need...
Diffie and Hellman invented in 1976 a protocol bearing their names (Diffie-Hellman) that was at t... more Diffie and Hellman invented in 1976 a protocol bearing their names (Diffie-Hellman) that was at the origin of the cryptography. The most important characteristic of this protocol is that it enables two connected parties to generate a shared secret without having any preliminary information about one other. However, The point of vulnerability of this protocol is the active attack and more precisely the interception of the security information exchanges. In this paper, we present a dynamic Public Key Infrastructure (PKI) to circumvent the Diffie-Hellman vulnerability. The main objective of this PKI environment is to discharge the connected parties from all management tasks. Our PKI environment is composed of a PKI Server (PKIServ) to manage the security inter the connected parties and a Monitoring Service (MS) to automate the PKI environment functioning. A prototype has been implemented with CORBA environment and same experimental results are presented.
This work presents the use of artificial intelligence (AI) techniques for aiding in the improveme... more This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare these information with a database that contains parameters for each information type in order to detect facts which identify proactively the possible existence of a problem. Such detection is conducted by means of AI techniques making possible proactive actions and, as such, may prevent the occurrence of problems.
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC ... more Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Autonomic Cloud Computing management requires a model to represent the elements into the managed ... more Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements... more This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented by Rules, Qualifiers, and Costs, which can be extended and prioritised. Based on Evolutionary Searches, the framework theoretically guarantees the adoption of a better set of Place- ments. More specifically, it seeks the non-dominated solutions (Pareto’s Dominance concept) and compares then considering the implementation cost of the scenario and its benefits. In contrast to existing solutions that address specific objectives, our framework was devised to support many types of objectives and to be easily extensible, which enables the implementation of new and generic prioritised elements. Moreover, we conducted experiments using data from a real Cloud environment and show the flexibility of our approach and its scalability.
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held... more The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriame... more Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - R... more Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
2017 IEEE World Congress on Services (SERVICES), 2017
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balanc... more Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques, however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In addition, most proposals do not consider the size, dynamism, and heterogeneity of the cloud when developing a management technique. We present a cloud computing VMs balancing algorithm that uses the similarity between VMs and physical hosts to create the map of migrations. Furthermore, the proposal takes into account the size, dynamism, and heterogeneity of the cloud when mapping VMs migrations, thus the proposal is developed in a distributed fashion, enabling the processing of each cluster at a time. To evaluate the proposal, we used the Google cluster data set. Experiments demonstrate that the proposed technique can improve the balance of alloc...
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on... more Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
This work provides the basis to understand and select Cloud Computing models applied for the deve... more This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) and related workloads brings new challenges to this scenario demanding malleable configurations where the resources are distributed closer to data sources. We introduce an analysis of existing solution architectures, along with an illustrative case from where we derive the lessons, challenges, and opportunities of combining these technologies for a new generation of Cloudnative solutions.
Anais do II Workshop em Segurança de Sistemas Computacionais (WSeg 2002)
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pel... more O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir informações entre cliente e servidor. Neste trabalho apresentamos uma situação real de um projeto de cartão convênio onde esta necessidade se faz presente. Estudamos o FTP e o Telnet e descrevemos implementação do Fast-TP (Fast Transmission Protocol). A seguir efetuamos testes comparativos entre o Fast-TP e o FTP tradicional. Finalmente apresentamos aspectos de segurança da implementação do Fast-TP.
Sistemas de Informação, 2016
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibili... more Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. The proposed model establishes the responsibilities of three actors: Consumer, Provider and Security Labs. The inclusion of actor Security Labs provides more credibility to risk analysis making the results more consistent for the consumer.
This article provides a real-time intrusion response system in order to reduce the consequences o... more This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
In policy-based management, service providers want to enforce fine-grained policies for their res... more In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could represent a privacy breach. This paper proposes an architecture that allows an individual to obtain services without the need of releasing all personal attributes. The architecture achieves that outcome evaluating the targeted policy in the domain of the identity provider, that is, policies are sent from service providers to identity providers to be evaluated, without the need of releasing some PIIs to the service provider side. We also present an implementation of a prototype using XACML 3.0 for fine-grained authorization and OpenID Connect for identity management. The prototype was evaluated through an use case representing an hypothetical sc...
The copyright release is a transfer of publication rights, which allows IARIA and its partners to... more The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material. This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes. I, the undersigned, declare that the article is original, and that I represent the authors of this article in the copyright release matters. If this work has been done as work-for-hire, I have obtained all necessary clearances to execute a copyright release. I hereby irrevocably transfer exclusive copyright for this material to IARIA. I give IARIA permission or reproduce the work in any media format such as, but not limited to, print, digital, or electronic. I give IARIA permission to distribute the materials without restriction to any institutions or individuals. I give IARIA permission to submit the work for inclusion in article repositories as IARIA sees fit. I, the undersigned, declare that to the best of my knowledge, the article is does not contain libelous or otherwise unlawful contents or invading the right of privacy or infringing on a proprietary right.
Clinics and hospitals are acquiring more technological resources to help providing a faster and m... more Clinics and hospitals are acquiring more technological resources to help providing a faster and more precise diagnostic, with the goal of making it more dynamic and effective. This is pushing health institutions to search for more modern equipment, with greater technological features. Besides last generation equipment, another problem faced by these institutions is enabling the connection of physicians to a Picture Archive and Communication Systems (PACS) from anywhere. With the use of communication resources increasingly present in everyday life, like Wireless-Fidelity (Wi-Fi), third generation of mobile telecommunications technology (3G), fourth generation of mobile telecommunications technology (4G), Worldwide Interoperability for Microwave Access (WiMax) and other wireless networks that allow the connection of mobile devices, it becomes easier and cheaper to provide quality medical services at a distance. Diagnoses that needed a doctor to be present, for instance, can now be per...
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques fo... more Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted Directed Acyclic Multigraphs (DAM) through the different abstraction levels of components. With this formalism, it is possible to analyse load propagation and its effects on the cloud elements from an Anything as a Service (xAAS) perspective. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g., energy-efficiency), which does not provide support to the dynamic nature of clouds and to the different need...
Diffie and Hellman invented in 1976 a protocol bearing their names (Diffie-Hellman) that was at t... more Diffie and Hellman invented in 1976 a protocol bearing their names (Diffie-Hellman) that was at the origin of the cryptography. The most important characteristic of this protocol is that it enables two connected parties to generate a shared secret without having any preliminary information about one other. However, The point of vulnerability of this protocol is the active attack and more precisely the interception of the security information exchanges. In this paper, we present a dynamic Public Key Infrastructure (PKI) to circumvent the Diffie-Hellman vulnerability. The main objective of this PKI environment is to discharge the connected parties from all management tasks. Our PKI environment is composed of a PKI Server (PKIServ) to manage the security inter the connected parties and a Monitoring Service (MS) to automate the PKI environment functioning. A prototype has been implemented with CORBA environment and same experimental results are presented.
This work presents the use of artificial intelligence (AI) techniques for aiding in the improveme... more This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare these information with a database that contains parameters for each information type in order to detect facts which identify proactively the possible existence of a problem. Such detection is conducted by means of AI techniques making possible proactive actions and, as such, may prevent the occurrence of problems.
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC ... more Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Autonomic Cloud Computing management requires a model to represent the elements into the managed ... more Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements... more This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented by Rules, Qualifiers, and Costs, which can be extended and prioritised. Based on Evolutionary Searches, the framework theoretically guarantees the adoption of a better set of Place- ments. More specifically, it seeks the non-dominated solutions (Pareto’s Dominance concept) and compares then considering the implementation cost of the scenario and its benefits. In contrast to existing solutions that address specific objectives, our framework was devised to support many types of objectives and to be easily extensible, which enables the implementation of new and generic prioritised elements. Moreover, we conducted experiments using data from a real Cloud environment and show the flexibility of our approach and its scalability.
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held... more The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriame... more Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - R... more Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
2017 IEEE World Congress on Services (SERVICES), 2017
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balanc... more Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques, however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In addition, most proposals do not consider the size, dynamism, and heterogeneity of the cloud when developing a management technique. We present a cloud computing VMs balancing algorithm that uses the similarity between VMs and physical hosts to create the map of migrations. Furthermore, the proposal takes into account the size, dynamism, and heterogeneity of the cloud when mapping VMs migrations, thus the proposal is developed in a distributed fashion, enabling the processing of each cluster at a time. To evaluate the proposal, we used the Google cluster data set. Experiments demonstrate that the proposed technique can improve the balance of alloc...
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on... more Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
This work provides the basis to understand and select Cloud Computing models applied for the deve... more This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) and related workloads brings new challenges to this scenario demanding malleable configurations where the resources are distributed closer to data sources. We introduce an analysis of existing solution architectures, along with an illustrative case from where we derive the lessons, challenges, and opportunities of combining these technologies for a new generation of Cloudnative solutions.
The Second International Conference on Green Communications, Computing and Technologies (GREEN 20... more The Second International Conference on Green Communications, Computing and Technologies (GREEN 2017), held between September 10-14, 2017 in Rome, continued the inaugural event focusing on current solutions, stringent requirements for further development, and evaluations of potential directions. The event targeted to bring together academia, research institutes, and industries working towards green solutions.
Expected economic, environmental and society wellbeing impact of green computing and communications technologies led to important research and solutions achievements in recent years. Environmental sustainability, high-energy efficiency, diversity of energy sources, renewable energy resources contributed to new paradigms and technologies for green computing and communication.
Economic metrics and social acceptability are still under scrutiny, despite the fact that many solutions, technologies and products are available. Deployment at large scale and a long term evaluation of benefits are under way in different areas where dedicated solutions are applied.
The conference had the following tracks:
Improving Green-ness
Smart Energy and Smart Grid
We take here the opportunity to warmly thank all the members of the GREEN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to GREEN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the GREEN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that GREEN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of green communications, computing and technology. We also hope that Rome, Italy provided a pleasant environment during the conference and everyone found some time to enjoy the historic charm of the city.
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held ... more The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2017 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2017 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope that Nice provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held ... more The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017), held between July 23 - 27, 2017 - Nice, France, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2017 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2017 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope that Nice provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held bet... more The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.
The main tracks referred to the general concepts of systems automation, and methodologies and techniques for designing, implementing and deploying autonomous systems. The next tracks developed around design and deployment of context-aware networks, services and applications, and the design and management of self-behavioral networks and services. We also considered monitoring, control, and management of autonomous self-aware and context-aware systems and topics dedicated to specific autonomous entities, namely, satellite systems, nomadic code systems, mobile networks, and robots. It has been recognized that modeling (in all forms this activity is known) is the fundamental for autonomous subsystems, as both managed and management entities must communicate and understand each other. Small-scale and large-scale virtualization and model-driven architecture, as well as management challenges in such architectures are considered. Autonomic features and autonomy requires a fundamental theory behind and solid control mechanisms. These topics gave credit to specific advanced practical and theoretical aspects that allow subsystem to expose complex behavior. We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems. Domain case studies (policy, mobility, survivability, privacy, etc.) and specific technology (wireless, wireline, optical, e-commerce, banking, etc.) case studies were targeted. A special track on mobile environments was indented to cover examples and aspects from mobile systems, networks, codes, and robotics.
Pervasive services and mobile computing are emerging as the next computing paradigm in which infrastructure and services are seamlessly available anywhere, anytime, and in any format. This move to a mobile and pervasive environment raises new opportunities and demands on the underlying systems. In particular, they need to be adaptive, self-adaptive, and context-aware.
Adaptive and self-management context-aware systems are difficult to create, they must be able to understand context information and dynamically change their behavior at runtime according to the context. Context information can include the user location, his preferences, his activities, the environmental conditions and the availability of computing and communication resources. Dynamic reconfiguration of the context-aware systems can generate inconsistencies as well as integrity problems, and combinatorial explosion of possible variants of these systems with a high degree of variability can introduce great complexity.
Traditionally, user interface design is a knowledge-intensive task complying with specific domains, yet being user friendly. Besides operational requirements, design recommendations refer to standards of the application domain or corporate guidelines.
Commonly, there is a set of general user interface guidelines; the challenge is due to a need for cross-team expertise. Required knowledge differs from one application domain to another, and the core knowledge is subject to constant changes and to individual perception and skills.
Passive approaches allow designers to initiate the search for information in a knowledge- database to make accessible the design information for designers during the design process. Active approaches, e.g., constraints and critics, have been also developed and tested. These mechanisms deliver information (critics) or restrict the design space (constraints) actively, according to the rules and
guidelines. Active and passive approaches are usually combined to capture a useful user interface
design.
We take here the opportunity to warmly thank all the members of the ICAS 2017 Technical
Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICAS 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICAS 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICAS 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the fields of autonomic and autonomous systems.
We are convinced that the participants found the event useful and communications very open. We also hope that Barcelona provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held be... more The Thirteenth International Conference on Autonomic and Autonomous Systems (ICAS 2017), held between May 21 - 25, 2017 - Barcelona, Spain, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.
The main tracks referred to the general concepts of systems automation, and methodologies and techniques for designing, implementing and deploying autonomous systems. The next tracks developed around design and deployment of context-aware networks, services and applications, and the design and management of self-behavioral networks and services. We also considered monitoring, control, and management of autonomous self-aware and context-aware systems and topics dedicated to specific autonomous entities, namely, satellite systems, nomadic code systems, mobile networks, and robots. It has been recognized that modeling (in all forms this activity is known) is the fundamental for autonomous subsystems, as both managed and management entities must communicate and understand each other. Small-scale and large-scale virtualization and model-driven architecture, as well as management challenges in such architectures are considered. Autonomic features and autonomy requires a fundamental theory behind and solid control mechanisms. These topics gave credit to specific advanced practical and theoretical aspects that allow subsystem to expose complex behavior. We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems. Domain case studies (policy, mobility, survivability, privacy, etc.) and specific technology (wireless, wireline, optical, e-commerce, banking, etc.) case studies were targeted. A special track on mobile environments was indented to cover examples and aspects from mobile systems, networks, codes, and robotics.
Pervasive services and mobile computing are emerging as the next computing paradigm in which infrastructure and services are seamlessly available anywhere, anytime, and in any format. This move to a mobile and pervasive environment raises new opportunities and demands on the underlying systems. In particular, they need to be adaptive, self-adaptive, and context-aware.
Adaptive and self-management context-aware systems are difficult to create, they must be able to understand context information and dynamically change their behavior at runtime according to the context. Context information can include the user location, his preferences, his activities, the environmental conditions and the availability of computing and communication resources. Dynamic reconfiguration of the context-aware systems can generate inconsistencies as well as integrity problems, and combinatorial explosion of possible variants of these systems with a high degree of variability can introduce great complexity.
Traditionally, user interface design is a knowledge-intensive task complying with specific domains, yet being user friendly. Besides operational requirements, design recommendations refer to standards of the application domain or corporate guidelines.
Commonly, there is a set of general user interface guidelines; the challenge is due to a need for cross-team expertise. Required knowledge differs from one application domain to another, and the core knowledge is subject to constant changes and to individual perception and skills.
Passive approaches allow designers to initiate the search for information in a knowledge- database to make accessible the design information for designers during the design process. Active approaches, e.g., constraints and critics, have been also developed and tested. These mechanisms deliver information (critics) or restrict the design space (constraints) actively, according to the rules and
guidelines. Active and passive approaches are usually combined to capture a useful user interface
design.
We take here the opportunity to warmly thank all the members of the ICAS 2017 Technical
Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICAS 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICAS 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICAS 2017 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the fields of autonomic and autonomous systems.
We are convinced that the participants found the event useful and communications very open. We also hope that Barcelona provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful city.
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in ... more The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research topics. Network control and management, multi-technology service deployment and assurance, next generation networks and ubiquitous services, emergency services and disaster recovery and emerging network communications and technologies were considered.
IPv6, the Next Generation of the Internet Protocol, has seen over the past three years tremendous activity related to its development, implementation and deployment. Its importance is unequivocally recognized by research organizations, businesses and governments worldwide. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. In the United States, government’s plans to migrate to IPv6 has stimulated significant interest in the technology and accelerated the adoption process. Business organizations are also increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems. At the same time IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.
IPv6 creates opportunities for new and more scalable IP based services while representing a fertile and growing area of research and technology innovation. The efforts of successful research projects, progressive service providers deploying IPv6 services and enterprises led to a significant body of knowledge and expertise. It is the goal of this workshop to facilitate the dissemination and exchange of technology and deployment related information, to provide a forum where academia and industry can share ideas and experiences in this field that could accelerate the adoption of IPv6. The workshop brings together IPv6 research and deployment experts that will share their work. The audience will hear the latest technological updates and will be provided with examples of successful IPv6 deployments; it will be offered an opportunity to learn what to expect from IPv6 and how to prepare for it.
Packet Dynamics refers broadly to measurements, theory and/or models that describe the time evolution and the associated attributes of packets, flows or streams of packets in a network. Factors impacting packet dynamics include cross traffic, architectures of intermediate nodes (e.g., routers, gateways, and firewalls), complex interaction of hardware resources and protocols at various levels, as well as implementations that often involve competing and conflicting requirements.
Parameters such as packet reordering, delay, jitter and loss that characterize the delivery of packet streams are at times highly correlated. Load-balancing at an intermediate node may, for example, result in out-of-order arrivals and excessive jitter, and network congestion may
manifest as packet losses or large jitter. Out-of-order arrivals, losses, and jitter in turn may lead to unnecessary retransmissions in TCP or loss of voice quality in VoIP.
With the growth of the Internet in size, speed and traffic volume, understanding the impact of underlying network resources and protocols on packet delivery and application performance has assumed a critical importance. Measurements and models explaining the variation and interdependence of delivery characteristics are crucial not only for efficient operation of networks and network diagnosis, but also for developing solutions for future networks.
Local and global scheduling and heavy resource sharing are main features carried by Grid networks. Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources. Most current operational Grids are dedicated to a limited set of computationally and/or data intensive scientific problems.
Optical burst switching enables these features while offering the necessary network flexibility demanded by future Grid applications. Currently ongoing research and achievements refers to high performance and computability in Grid networks. However, the communication and computation mechanisms for Grid applications require further development, deployment and validation.
The conference had the following tracks:
Networking
Computation and Networking
Communication
Next generation networks (NGN) and network management
Advances in Adaptive Filtering for Acoustic Applications
DMM: Distributed Mobility Management - Towards Efficient and Scalable Mobile
Networks
The conference also featured the following symposiun:
• SOFTNETWORKING 2017, The International Symposium on Advances in Software
Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the ICN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that ICN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of networks. We also hope that Venice, Italy provided a pleasant environment during the conference and everyone saved some time to enjoy the unique charm of the city.
The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in ... more The Sixteenth International Conference on Networks (ICN 2017), held between April 23-27, 2017 in Venice, Italy, continued a series of events targeting general networking and services aspects in multi-technologies environments. The conference covered fundamentals on networking and services, and highlighted new challenging industrial and research topics. Network control and management, multi-technology service deployment and assurance, next generation networks and ubiquitous services, emergency services and disaster recovery and emerging network communications and technologies were considered.
IPv6, the Next Generation of the Internet Protocol, has seen over the past three years tremendous activity related to its development, implementation and deployment. Its importance is unequivocally recognized by research organizations, businesses and governments worldwide. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. In the United States, government’s plans to migrate to IPv6 has stimulated significant interest in the technology and accelerated the adoption process. Business organizations are also increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems. At the same time IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.
IPv6 creates opportunities for new and more scalable IP based services while representing a fertile and growing area of research and technology innovation. The efforts of successful research projects, progressive service providers deploying IPv6 services and enterprises led to a significant body of knowledge and expertise. It is the goal of this workshop to facilitate the dissemination and exchange of technology and deployment related information, to provide a forum where academia and industry can share ideas and experiences in this field that could accelerate the adoption of IPv6. The workshop brings together IPv6 research and deployment experts that will share their work. The audience will hear the latest technological updates and will be provided with examples of successful IPv6 deployments; it will be offered an opportunity to learn what to expect from IPv6 and how to prepare for it.
Packet Dynamics refers broadly to measurements, theory and/or models that describe the time evolution and the associated attributes of packets, flows or streams of packets in a network. Factors impacting packet dynamics include cross traffic, architectures of intermediate nodes (e.g., routers, gateways, and firewalls), complex interaction of hardware resources and protocols at various levels, as well as implementations that often involve competing and conflicting requirements.
Parameters such as packet reordering, delay, jitter and loss that characterize the delivery of packet streams are at times highly correlated. Load-balancing at an intermediate node may, for example, result in out-of-order arrivals and excessive jitter, and network congestion may
manifest as packet losses or large jitter. Out-of-order arrivals, losses, and jitter in turn may lead to unnecessary retransmissions in TCP or loss of voice quality in VoIP.
With the growth of the Internet in size, speed and traffic volume, understanding the impact of underlying network resources and protocols on packet delivery and application performance has assumed a critical importance. Measurements and models explaining the variation and interdependence of delivery characteristics are crucial not only for efficient operation of networks and network diagnosis, but also for developing solutions for future networks.
Local and global scheduling and heavy resource sharing are main features carried by Grid networks. Grids offer a uniform interface to a distributed collection of heterogeneous computational, storage and network resources. Most current operational Grids are dedicated to a limited set of computationally and/or data intensive scientific problems.
Optical burst switching enables these features while offering the necessary network flexibility demanded by future Grid applications. Currently ongoing research and achievements refers to high performance and computability in Grid networks. However, the communication and computation mechanisms for Grid applications require further development, deployment and validation.
The conference had the following tracks:
Networking
Computation and Networking
Communication
Next generation networks (NGN) and network management
Advances in Adaptive Filtering for Acoustic Applications
DMM: Distributed Mobility Management - Towards Efficient and Scalable Mobile
Networks
The conference also featured the following symposiun:
• SOFTNETWORKING 2017, The International Symposium on Advances in Software
Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
We also gratefully thank the members of the ICN 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that ICN 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of networks. We also hope that Venice, Italy provided a pleasant environment during the conference and everyone saved some time to enjoy the unique charm of the city.
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTIN... more The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
Virtualization
Big Spatial Data Management
Cloud Cyber Security
Cloud Computing
Platforms, infrastructures and applications
Security and Privacy in Cloud Computing
Challenges
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of cloud computing, GRIDs and virtualization. We also hope that Athens, Greece provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTIN... more The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2017), held between February 19-23, 2017 in Athens, Greece, continued a series of events meant to prospect the applications supported by the cloud computing paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
Virtualization
Big Spatial Data Management
Cloud Cyber Security
Cloud Computing
Platforms, infrastructures and applications
Security and Privacy in Cloud Computing
Challenges
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2017 technical program committee, as well as all the reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2017. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2017 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2017 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of cloud computing, GRIDs and virtualization. We also hope that Athens, Greece provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held bet... more The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2016 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2016 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2016 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope the attendees enjoyed the charm of Barcelona, Spain.
The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held bet... more The Twelfth International Conference on Wireless and Mobile Communications (ICWMC 2016), held between November 13-17, 2016 - Barcelona, Spain, followed on the previous events on advanced wireless technologies, wireless networking, and wireless applications.
ICWMC 2016 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics.
We take here the opportunity to warmly thank all the members of the ICWMC 2016 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the ICWMC 2016 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.
We hope that ICWMC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications.
We are convinced that the participants found the event useful and communications very open. We also hope the attendees enjoyed the charm of Barcelona, Spain.
The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held ... more The Eleventh International Conference on Systems and Networks Communications (ICSNC 2016), held on August 21 - 25, 2016 in Rome, Italy, continued a series of events covering a broad spectrum of systems and networks related topics.
We welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard forums or in industry consortiums, survey papers addressing the key problems and solutions on any of the above topics, short papers on work in progress, and panel proposals.
We take here the opportunity to warmly thank all the members of the ICSNC 2016 technical program committee as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and efforts to contribute to the ICSNC 2016. We truly believe that thanks to all these efforts, the final conference program consists of top quality contributions.
This event could also not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the ICSNC 2016 organizing committee for their help in handling the logistics and for their work that is making this professional meeting a success. We gratefully appreciate to the technical program committee co-chairs that contributed to identify the appropriate groups to submit contributions.
We hope the ICSNC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in networking and systems communications research. We also hope Rome provided a pleasant environment during the conference and everyone saved some time for exploring this beautiful historic city.
The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTI... more The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2016), held between March 20-24, 2016 in Rome, Italy, continued a series of events targeted to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target was to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.
Cloud computing is a normal evolution of distributed computing combined with Service- oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.
The conference had the following tracks:
Cloud computing
Computing in virtualization-based environments
Platforms, infrastructures and applications
Challenging features
Similar to the previous edition, this event attracted excellent contributions and active participation from all over the world. We were very pleased to receive top quality contributions.
We take here the opportunity to warmly thank all the members of the CLOUD COMPUTING 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to CLOUD COMPUTING 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the CLOUD COMPUTING 2016 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope that CLOUD COMPUTING 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the area of cloud computing, GRIDs and virtualization. We also hope that Rome provided a pleasant
environment during the conference and everyone saved some time for exploring this beautiful city.
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC ... more Presentation · September 2017
DOI: 10.13140/RG.2.2.24990.64327/2
09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2
Description
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriame... more Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
Autonomic Cloud Computing management requires a model to represent the elements into the managed ... more Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
Autonomic Cloud Computing management requires a model to represent the elements into the managed ... more Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - ... more Summary:
1 - Cloud Computing Security Monitoring
2 - Federated Identity for Cloud Computing
3 - Risk Analysis for Cloud Computing
4 - Secure Internet of Things
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - ... more Summary:
1 - Cloud Computing Security Monitoring
2 - Federated Identity for Cloud Computing
3 - Risk Analysis for Cloud Computing
4 - Secure Internet of Things
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on... more Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
IEEE World Congress on Computational Intelligence , May 8, 1998
This work presents the use of artificial intelligence (AI) techniques for aiding in the improveme... more This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare these information with a database that contains parameters for each information type in order to detect facts which identify proactively the possible existence of a problem. Such detection is conducted by means of AI techniques making possible proactive actions and, as such, may prevent the occurrence of problems.