Zobrazeno 1 - 9
of 9
pro vyhledávání: '"David R. Matos"'
Publikováno v:
IEEE Access, Vol 11, Pp 78457-78470 (2023)
Microservice architectures allow complex applications to be developed as a collection of loosely coupled components. The heterogeneous architecture of these applications makes the process of recovering from intrusions especially complex, error-prone,
Externí odkaz:
https://doaj.org/article/ab60fb64ab9d4b43b017f85255ebc595
Publikováno v:
IEEE Access, Vol 11, Pp 62394-62408 (2023)
Fault-tolerant algorithms, such as Reliable Broadcast, assure the correct operation of modern distributed systems, even when some of the system nodes fail. However, the development of distributed algorithms is a manual and complex process, where slig
Externí odkaz:
https://doaj.org/article/24b002d3d3a04e52988e0a825421174e
Web applications are exposed to many threats and, despite the best defensive efforts, are often successfully attacked. Reverting the effects of an attack on the state of such an application requires a profound knowledge about the application, to unde
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7fd7acec1d84bcafc421939876f6a34c
https://doi.org/10.36227/techrxiv.13725991.v1
https://doi.org/10.36227/techrxiv.13725991.v1
Publikováno v:
MobiQuitous
Many popular mobile applications rely on the Backend-as-a-Service (BaaS) cloud computing model to simplify the development and management of services like data storage, user authentication and notifications. However, vulnerabilities and other issues
Publikováno v:
NCA
Although there is continuous research to improve web security, web applications are constantly being attacked due to vulnerable source code. A common way used to find vulnerabilities in code is with source code static analysis tools. However, these t
Publikováno v:
IFIP Advances in Information and Communication Technology
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.64-77, ⟨10.1007/978-3-030-58201-2_5⟩
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.64-77, ⟨10.1007/978-3-030-58201-2_5⟩
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
Part 2: Connection Security; International audience; TLS ensures confidentiality, integrity, and authenticity of communications. However, design, implementation, and cryptographic vulnerabilities can make TLS communication channels insecure. We need
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12010d74cec7ee8772487fa774fc4a97
https://hal.inria.fr/hal-03440809/document
https://hal.inria.fr/hal-03440809/document
Publikováno v:
Middleware
Cloud-backed file systems provide on-demand, high-availability, scalable storage. Their security may be improved with techniques such as erasure codes and secret sharing to fragment files and encryption keys in several clouds. Attacking the server-si
Publikováno v:
P2DS@EuroSys
Health care institutions gather and store sensitive information from patients with the goal of providing the best care. The medical history of a patient is essential to guarantee that the right diagnosis is achieved and help the clinical staff act in
Autor:
David R. Matos, Miguel Correia
Publikováno v:
NCA
NoSQL databases offer high throughput, support for huge data structures, and capacity to scale horizontally at the expense of not supporting relational data, ACID consistency and a standard SQL syntax. Due to their simplicity and flexibility, NoSQL d