Kellyton dos Santos Brito

Learn More
This paper aims at identifying some of the key factors in adopting an organization-wide software reuse program. The factors are derived from practical experience reported by industry professionals, through a survey involving 57 Brazilian small, medium and large software organizations. Some of them produce software with commonality between applications, and(More)
Nowadays software systems are essential to the environment of most organizations, and their maintenance is a key point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become a major concern in software industry. This article, based on a survey about reverse engineering tools, discusses a set of functional and(More)
Content sharing services have become immensel popular on the Web. More than 1 billion people use this kind o services to communicate with friends and exchange all sorts o information. In this new context, privacy guarantees are essential guarantees about the potential release of data to unintended recipients and the use of user data by the service provider(More)
Government concerns about transparency date from 1957, but current technological advances and real-time worldwide communications hold great promise to transform accountability, transparency, citizen participation and collaboration, in addition to offering better public services, by increasing efficiency and effectiveness and decreasing corruption in(More)
Technological advances and real-time worldwide communications hold great promise for transforming the efficiency and effectiveness of public services through the ease of publishing and access to government public information or through the offer of new kinds of services. In this paper, we describe two initiatives, <i>Rio Inteligente</i> (Smart Rio) and(More)
Software maintenance tasks are the most expensive activities on legacy systems life cycle, and system understanding is the most important factor of this cost. Thus, in order to aid legacy knowledge retrieval and reuse, this paper presents LIFT: a Legacy InFormation retrieval Tool, discussing since its initial requirements until its preliminary experience in(More)
The aim of this paper is to present a taxonomy for security threats on the Web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstraction and criteria for discrimination which consider propagation and similarity in vulnerabilities. We also propose to estimate the risk(More)
This article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) we reveal(More)
The term definition "Smart City" still allows various interpretations, and this causes some difficulty in establishing parameters to measure how smart the cities can be. This paper presents a Maturity Model that uses a set of minimum domains and indicators that aim to encourage cities of different sizes to identify their potential and improve processes and(More)