Danilo Valeros Bernardo

Learn More
Network protocols do not solely rely on the lower layers of the stack for security. Many of these protocols rely on a combination of layers to develop a more secure channel for data transmission. UDT, like other new next generation high speed protocols, relies on Transport, on IP, and on Network layers for data delivery and protection. However, like other(More)
There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT(More)
Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and(More)
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is(More)
Requirements sometimes can turn out to be either incomplete or inconsistent. Factors contributing to this situation include the selection of the elicitation technique and other approaches used. Some approaches used for requirements gathering such as single elicitation approach, and their effects during requirements elicitation, can cause deficiency in many(More)
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of(More)