Domenico Rotondi

Learn More
Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Selfhealing is either rudimentary or non-existent. In this study(More)
Increasing requirements for the resilience, security, adaptation, intelligence and scalability of complex business critical systems have set new challenges for system developers and application designers. Messaging infrastructures are often used to implement systems of this type. We provide an overview of the main advances in the adaptive security, security(More)
Resource and information protection plays a relevant role in distributed systems. Most of the currently proposed authorization frameworks do not provide scalable, manageable, effective, and efficient mechanisms to support distributed systems with many interacting services. The advent of IoT will further increase the need for scalable and manageable(More)
This paper describes the potential impact of the Internet of Things (IoT) technologies and architecture on factory automation. Whereas, IoT use cases range from intelligent infrastructure and smart cities to health care and shopping assistants, it is important to note that factory automation could benefit as well from an IoT approach. In this paper, we(More)
Banking applications require a high standard of security, resilience and adaptation. The results presented here were obtained from a case study of the deployment of the security metrics-driven adaptive security solutions of a distributed middleware in the context of monetary transfers. The focus of this study is on the analysis of the applicability of(More)
The industrial sector is being impacted by the Internet of Things due to the increasing availability of computing and communication capabilities in a wide range of devices and equipment deployed in the shop floor. This requires substantial architectural and functional improvements in order to actually manage and exploit the potential of such smart(More)
Traditional and widely used access control mechanisms have been proved to be not able to effectively support the dynamicity and scaling needs of IoT contexts. Furthermore, as more end-users start using smart devices (e.g. smart phones, smart home appliances, etc.) the need to have more understandable and easy to use access control mechanisms increases. In(More)