A cyber-resilient architecture for critical security services

D Kreutz, O Malichevskyy, E Feitosa, H Cunha… - Journal of Network and …, 2016 - Elsevier
Authentication and authorization are two of the most important services for any IT
infrastructure. Taking into account the current state of affairs of cyber warfare, the security …

Towards secure and dependable authentication and authorization infrastructures

D Kreutz, A Bessani, E Feitosa… - 2014 IEEE 20th Pacific …, 2014 - ieeexplore.ieee.org
We propose a resilience architecture for improving the security and dependability of
authentication and authorization infrastructures, in particular the ones based on RADIUS …

Increasing the resilience and trustworthiness of openid identity providers for future networks and services

D Kreutz, E Feitosa, H Cunha… - 2014 Ninth …, 2014 - ieeexplore.ieee.org
We introduce a set of tools and techniques for increasing the resilience and trustworthiness
of identity providers (IdPs) based on OpenID. To this purpose we propose an architecture of …

Federated MapReduce to transparently run applications on multicluster environment

CY Wang, TL Tai, JS Shu, JB Chang… - … Congress on Big Data, 2014 - ieeexplore.ieee.org
In the Cloud era, data is generated everywhere, how to efficiently analyze those" Big Data"
that have properties such as large volume, fast generation, and variety, are most critical …

[PDF][PDF] Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities.

D Kreutz, E Feitosa - FedCSIS (Position Papers), 2014 - annals-csis.org
In our previous work we designed and evaluated the feasibility of highly secure and
dependable identity providers (IdPs) for the increasing requirements of future IT …

Mitigating dos attacks in identity management systems through reorganizations

R Macedo, Y Ghamri-Doudane… - 2015 Latin American …, 2015 - ieeexplore.ieee.org
Ensuring identity management (IdM) systems availability plays a key role to support
networked systems. Denial-of-Service (DoS) attacks can make IdM operations unavailable …

Freelib: peer-to-peer-based digital libraries

A Amrou, K Maly, M Zubair - 20th International Conference on …, 2006 - ieeexplore.ieee.org
In this paper, we propose a P2P digital library that takes advantage of P2P networks and
digital libraries. The key problem with P2P network searches is the low recall value, time to …

A scheme for DDoS attacks mitigation in IdM systems through reorganizations

R Macedo, A Santos… - NOMS 2016-2016 …, 2016 - ieeexplore.ieee.org
Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users'
critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs …

Provedores de identidade resilientes e confiáveis

D Kreutz, E Feitosa, H Cunha - Workshop de Testes e Tolerância a …, 2014 - sol.sbc.org.br
Este artigo apresenta o desenvolvimento de uma arquitetura para provedores OpenID
resilientes e seguros, cujo objetivo é garantir propriedades essenciais como integridade …

An architecture to resilient and highly available identity providers based on OpenID standard

HA Cunha - 2014 - tede.ufam.edu.br
Secure authentication services and systems typically are based on two main approaches:
the first one seeks to defend itself of all kind of attack. Actually, the major current services …