References of "Correia, Miguel"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailJITeR: Just-in-time application-layer routing
Bessani, Alysson; Neves, Nuno F.; Verissimo, Paulo UL et al

in Computer Networks (2016), (104), 122-136

The paper addresses the problem of providing message latency and reliability assurances for control traf- fic in wide-area IP networks. This is an important problem for cloud services and other geo ... [more ▼]

The paper addresses the problem of providing message latency and reliability assurances for control traf- fic in wide-area IP networks. This is an important problem for cloud services and other geo-distributed information infrastructures that entail inter-datacenter real-time communication. We present the design and validation of JITeR ( Just-In-Time Routing ), an algorithm that timely routes messages at application- layer using overlay networking and multihoming, leveraging the natural redundancy of wide-area IP net- works. We implemented a prototype of JITeR that we evaluated experimentally by placing nodes in sev- eral regions of Amazon EC2. We also present a scenario-based (geo-distributed utility network) evalua- tion comparing JITeR with alternative overlay/multihoming routing algorithms that shows that it provides better timeliness and reliability guarantees. [less ▲]

Detailed reference viewed: 204 (15 UL)
See detailThe Next Frontier: Managing Confidentiality and Integrity of Data in the Cloud
Rocha, Francisco UL; Abreu, Salvador; Correia, Miguel

Book published by IEEE Computer Society Press (2013)

Detailed reference viewed: 31 (0 UL)
Peer Reviewed
See detailThe Final Frontier: Confidentiality and Privacy in the Cloud
Rocha, Francisco UL; Abreu, Salvador; Correia, Miguel

in Computer (2011), 44(9), 44-50

Detailed reference viewed: 67 (1 UL)
Peer Reviewed
See detailLucy in the Sky Without Diamonds: Stealing Confidential Data in the Cloud
Rocha, Francisco UL; Correia, Miguel

in Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (2011)

Detailed reference viewed: 84 (5 UL)