Hardware-software integrated approaches to defend against software cache-based side channel attacks

J Kong, O Aciiçmez, JP Seifert… - 2009 IEEE 15th …, 2009 - ieeexplore.ieee.org
Software cache-based side channel attacks present serious threats to modern computer
systems. Using caches as a side channel, these attacks are able to derive secret keys used …

Data usage and access control in industrial data spaces: Implementation using FIWARE

A Munoz-Arcentales, S López-Pernas, A Pozo… - Sustainability, 2020 - mdpi.com
In recent years, a new business paradigm has emerged which revolves around effectively
extracting value from data. In this scope, providing a secure ecosystem for data sharing that …

Boosting a low-cost smart home environment with usage and access control rules

P Barsocchi, A Calabrò, E Ferro, C Gennaro… - Sensors, 2018 - mdpi.com
Smart Home has gained widespread attention due to its flexible integration into everyday
life. Pervasive sensing technologies are used to recognize and track the activities that …

Monitoring of business process execution based on performance indicators

A Calabro, F Lonetti, E Marchetti - 2015 41st Euromicro …, 2015 - ieeexplore.ieee.org
Nowadays, more and more industrial organizations are using Business Process Model and
Notation (BPMN) for process modeling. Key performance Indicators (KPIs) are seton such …

[HTML][HTML] An avatar cloud service based method for supervising and interacting with containerized applications

JA Barron-Lugo, I Lopez-Arevalo… - Expert Systems with …, 2025 - Elsevier
This paper presents Davatar, an information processing and management method for
building digital avatars for existing cloud services. A digital avatar is an abstract and intuitive …

An ontology-based solution for monitoring iot cybersecurity

S Daoudagh, E Marchetti, A Calabrò, F Ferrada… - … International Internet of …, 2022 - Springer
Abstract Context: Systems of Systems (SoSs) are becoming an emerging architecture, and
they are used in several daily life contexts. Objective: The aim is to define a reference …

[PDF][PDF] Towards Monitoring Cloud Services using Models@ run. time.

P Cedillo, J Gonzalez-Huerta, SM Abrahão… - Models@ run …, 2014 - st.inf.tu-dresden.de
Cloud computing represents a new trend to provide software services. In order to deliver
these services there are certain quality levels that should be considered. The provided …

Delay-fault testing and defects in deep sub-micron ICs-does critical resistance really mean anything?

W Moore, G Gronthoud, K Baker… - … Test Conference 2000 …, 2000 - ieeexplore.ieee.org
This paper reflects on some recent results that show the value of delay-fault tests on a deep
sub-micron process. However, the results also suggest that untargetted test patterns perform …

[PDF][PDF] MENTORS: Monitoring Environment for System of Systems.

A Calabro, S Daoudagh, E Marchetti, FJD Mayo… - WEBIST, 2021 - scitepress.org
Context: Systems Of Systems (SoSs) are becoming a widespread emerging architecture,
and they are used in several daily life contexts. Therefore, when a new device is integrated …

A middleware for reflective web service choreographies on the cloud

T Furtado, E Francesquini, N Lago, F Kon - Proceedings of the 13th …, 2014 - dl.acm.org
Web service composition is a commonly used solution to build distributed systems on the
cloud. Choreographies are one specific kind of service composition in which the …