Eduardo Feitosa

Learn More
This research is of the view that only tightly coordinated work among security components as we know them today including firewalls, traffic analysis modules, intrusion detection systems, antivirus remediation systems, etc., is likely to take us closer to a more effective solution against some security threats. A structured Robust IP (RIP) access(More)
Identity management is a central point to the security of large applications such cloud services. The identity providers (IdPs) offer services that handle critical information of users. Usually, this kind of information is stored with special care in these providers and intrusions do not necessarily result in security violations. But intrusions may implant(More)
In our previous work we designed and evaluated the feasibility of highly secure and dependable identity providers (IdPs) for the increasing requirements of future IT infrastructures. In this position paper we extend our previous work by analyzing and discussing the benefits of deploying highly secure and dependable identity providers-as-a-service(More)
We propose a resilience architecture for improving the security and dependability of authentication and authorization infrastructures, in particular the ones based on RADIUS and OpenID. This architecture employs intrusion-tolerant replication, trusted components and entrusted gateways to provide survivable services ensuring compatibility with standard(More)
We introduce a set of tools and techniques for increasing the resilience and trustworthiness of identity providers (IdPs) based on OpenID. To this purpose we propose an architecture of specialized components capable of fulfilling the essential requirements for ensuring high availability, integrity and higher confidentiality guarantees for sensitive data and(More)
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.04.018 ⇑ Corresponding author. E-mail addresses: elf@cin.ufpe.br, efeitos (E. Feitosa), esouto@icom.ufam.edu.br (E. Souto (D.H. Sadok). 1 Backscatter is the traffic received from victims t denial of service attacks. A simple examination of Internet traffic shows a wide(More)
In emergency scenarios, groups of people from different organizations, such as hospitals and the police, must be able to communicate in order to coordinate their efforts in such scenarios. Nevertheless, in emergency scenarios a fixed, predefined infrastructure may not be available or reliable, and to interconnect, mobile devices rely on Mobile Ad hoc(More)