Giorgia Lodi

Learn More
In this paper, we discuss the design, implementation, and experimental evaluation of a middleware architecture for enabling service level agreement (SLA)-driven clustering of QoS-aware application servers. Our middleware architecture supports application server technologies with dynamic resource management: application servers can dynamically change the(More)
Organizations must protect their information systems from a variety of threats. Usually they employ isolated defenses such as firewalls, intrusion detection and fraud monitoring systems, without cooperating with the external world. Organizations belonging to the same markets (e.g., financial organizations, telco providers) typically suffer from the same(More)
Large enterprises are nowadays complex interconnected software systems spanning over several domains. This new dimension makes difficult for enterprises the task of enabling efficient security defenses. This paper addresses the problem of detecting inter-domain stealthy port scans and proposes an architecture of an Intrusion Detection System which uses, for(More)
This paper describes the Mobile E-Witness (MEW) surveillance system which we have extended to incorporate in it an advanced access point selection mechanism. The mechanism selects dynamically the best access point among those reachable in the metropolitan areas where MEW operates. The selection policy is based on both the strength of the access point's(More)
Data interoperability is well recognized as a basic step for developing integrated services supporting inter-organizations communication. The issue of ensuring data interoperability has been tackled by many different communities in order to address various problems. In particular, the (over-)national institutes of statistics deeply concern the issuing of(More)
Acne has a prevalence of over 90% among adolescents and persists into adulthood in approximately 12%-14% of cases with psychological and social implications. Possible outcomes of the inflammatory acne lesions are acne scars which, although they can be treated in a number of ways, may have a negative psychological impact on social life and relationships. The(More)
Recent evidence of successful Internet-based attacks and frauds involving financial institutions highlights the inadequacy of the existing protection mechanisms, in which each instutition implements its own isolated monitoring and reaction strategy. Analyzing on-line activity and detecting attacks on a large scale is an open issue due to the huge amounts of(More)
Mission critical distributed systems are typically constructed out of many different software components strictly interacting with each other. Due to the inherent complexity of those systems and to the asynchrony of the interactions, they can exhibit anomalies that can lead to failures and, in some cases, to an abrupt block of the system, even though the(More)
We describe an Internet-based collaborative environment that protects geographically dispersed organizations of a critical infrastructure (e.g., financial institutions, telco providers) from coordinated cyber attacks. A specific instance of a collaborative environment for detecting malicious inter-domain port scans is introduced. This instance uses the open(More)
This paper introduces an experimental evaluation of a set of middleware services we have developed in order to enable application server technology to meet such quality of service (QoS) application requirements as service availability, timeliness and throughput. These services, developed in the context of the EU funded project TAPAS, have been integrated in(More)