Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fernando F. Redigolo is active.

Publication


Featured researches published by Fernando F. Redigolo.


ieee international conference on cloud computing technology and science | 2011

A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing

Nelson Mimura Gonzalez; Charles Christian Miers; Fernando F. Redigolo; Tereza Cristina M. B. Carvalho; Marcos A. Simplício; Mats Näslund; Makan Pourzandi

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.


trust security and privacy in computing and communications | 2013

A Framework for Authentication and Authorization Credentials in Cloud Computing

Nelson Mimura Gonzalez; Marco Antonio Torrez Rojas; Marcos Silva; Fernando F. Redigolo; Tereza Cristina M. B. Carvalho; Charles Christian Miers; Mats Näslund; Abu Shohel Ahmed

Security is a key concern when adopting cloud technology. Cloud solutions include not only issues inherited from related technologies, such as virtualization and distributed computing, but also new concerns associated to complexity of the cloud ecosystem, composed by the cloud entities and their interactions. One of the concerns is related to authentication and authorization in the cloud in order to provide robust mechanisms to identify entities and establish their permissions and roles in the cloud, controlling resource usage and promoting accounting and isolation. This paper identifies the state of the art in terms of credential management focusing on the cloud ecosystem. It proposes a credential classification and a framework for studying and developing solutions in this context, unifying concepts related to cloud deployment models, service types, entities and lifecycle controls.


2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) | 2015

Inclusion of security requirements in SLA lifecycle management for cloud computing

Marco Antonio Torrez Rojas; Nelson Mimura Gonzalez; Fernando Vilgino Sbampato; Fernando F. Redigolo; Tereza Cristina M. B. Carvalho; Kim Khoa Nguyen; Mohamed Cheriet

Service Level Agreement (SLA) is an essential tool for managing cloud computing services. The support of the security requirements through SLA is fundamental to achieve the full potential of the cloud computing paradigm. In this paper we present how security requirements are addressed in a cloud computing SLA. Furthermore, a unified SLA lifecycle for cloud computing services is proposed. The relationship between security requirements and the lifecycle proposed is analyzed. Through the analysis, the current cloud computing security requirements scenario for the SLA context is identified in addition to its research opportunities.


Future Generation Computer Systems | 2011

Tri-continental premiere of 4K feature movie via network streaming at FILE 2009

Todd Margolis; Sheldon Brown; Tracy Cornish; Hector Bracho; Michael Stanton; Tereza Cristina M. B. Carvalho; Fernando F. Redigolo; Fábio Carneiro de Castro; Kunitake Kaneko; Jane de Almeida; Cicero Inacio da Silva; Eunézio Antônio de Souza

The aesthetic potentials of 4K digital cinema are an impetus for creative practitioners of cinematic arts to undertake full investigations of the methods and expressive possibilities of this end-to-end digital medium. This includes new approaches to production, distribution and the forum of theatrical experience. A group of artists, film-makers and computer scientists have been developing a series of 4K digital cinema projects that have diffused and grown the manner in which 4K cinema is experienced between Brazil, the US and Japan. The recent culmination of this was an event in July 2009 in which a 4K feature length movie had its world premiere on three continents, streamed from Brazil to the US and Japan. This was accompanied by an HD video teleconference (VTC) between the three sites. To the knowledge of the participants, this was both the first uncompressed HD VTC between the northern and southern hemispheres as well as the first feature length 4K film to be streamed across three continents. Through this work, the new creative affordances of 4K cinema were highlighted, along with the new capabilities of cinematic distribution, production and experience.


iberian conference on information systems and technologies | 2016

A framework to orchestrate security SLA lifecycle in cloud computing

Marco Antonio Torrez Rojas; Nelson Mimura Gonzalez; Fernando Vilgino Sbampato; Fernando F. Redigolo; Tereza Cristina M. B. Carvalho; Kazi Wali Ullah; Mats Näslund; Abu Shohel Ahmed

Security issues of cloud computing environments are considered a major challenge for its full adoption. A Service Level Agreement (SLA) corroborates the shared management vision provided by the cloud computing paradigm, which can assist with related security issues. The necessity to address security requirements in cloud computing SLAs is considered important for both providers and consumers, along with the tools and mechanisms necessary to deal with these requirements. These issues are current research challenges; therefore, this paper aims at proposing a framework to orchestrate the management of cloud services based on security requirements defined by the SLA in an automated manner during its entire lifecycle. In addition, mechanisms to support the phases of the SLA lifecycle are proposed as a part of the framework. also the preliminary validation of the proposed framework. Finally, it is presented the integration of the framework with a cloud solution and in what manner the SLA lifecycle is supported by the framework.


international conference on e science | 2014

Science DMZ: Support for e-Science in Brazil

Dino Rafael Cristofoleti Magri; Tereza Cristina M. B. Carvalho; Fernando F. Redigolo; Marco Antonio Torrez Rojas; Marcos Antonio Simplicio Junior; Leandro Ciuffo; Gustavo Neves Dias; Alex S. Moura; Fausto Vetter

The advent of e-Science and Big Data applications brought the need of working with increasingly larger datasets as well as the demand of collaboration and resource distribution among research institutions. This work presents the experience of six Brazilian institutions in implementing the Science DMZ for supporting e-Science networking, including the proposed architecture, equipment specification and security mechanisms implemented. In addition, we present preliminary results of the architecture validation and also the problems faced in the implementation.


Archive | 2010

Key Issues on Future Internet

Tereza Cristina M. B. Carvalho; Charles Christian Miers; Cristina K. Dominicini; Fernando F. Redigolo

The Internet has changed the way people live and interact with others. Everyday, an ever-increasing number of activities can be conducted through a myriad of Internet-connected devices. It is possible to foresee a Future Internet environment centered on users, where a variety of devices benefit from ubiquitous connectivity to augment every aspect of people’s life. An incredible amount of applications will be created in a user-driven approach to provide data and services in a user centric way. These applications and services could be sold and used by other users to create their own new applications producing new information and services in an amazing speed. This scenario has far-reaching technological, economical, social and political implications. This chapter presents the main trends and challenges to be faced towards a more ubiquitous, interactive and user-centered Future Internet.


Archive | 2018

Managing the Lifecycle of Security SLA Requirements in Cloud Computing

Marco Antonio Torrez Rojas; Fernando F. Redigolo; Nelson Mimura Gonzalez; Fernando Vilgino Sbampato; Tereza Cristina M. B. Carvalho; Kazi Walli Ullah; Mats Näslund; Abu Shohel Ahmed

One of the major barriers for full adoption of cloud computing is the security issue. As the cloud computing paradigm presents a shared management vision, it is important that security requirements are addressed inside the Service Level Agreements (SLAs) established between cloud providers and consumers, along with the tools and mechanisms necessary to deal with these requirements. This work aims at proposing a framework to orchestrate the management of cloud services and security mechanisms based on the security requirements defined by a SLA, in an automated manner, throughout their lifecycles. In addition, the integration of the framework with a cloud computing solution is presented, in order to demonstrate and validate the framework support throughout SLAs lifecycle phases.


international conference on cloud computing and services science | 2017

Towards Bandwidth Optimization in Fog Computing using FACE Framework.

Rosangela de Fátima Pereira Marquesone; Érico Augusto da Silva; Nelson Mimura Gonzalez; Karen Langona; Walter Akio Goya; Fernando F. Redigolo; Tereza Cristina M. B. Carvalho; Jan-Erik Mångs; Azimeh Sefidcon

The continuous growth of data created by Internet-connected devices has been posing a challenge for mobile operators. The increase in the network traffic has exceeded the network capacity to efficiently provide services, specially for applications that require low latency. Edge computing is a concept that allows lowering the network traffic by using cloud-computing resources closer to the devices that either consume or generate data. Based on this concept, we designed an architecture that offers a mechanism to reduce bandwidth consumption. The proposed solution is capable of intercepting the data, redirecting it to a processing node that is allocated between the end device and the server, in order to apply features that reduce the amount of data on the network. The architecture has been validated through a prototype using video surveillance. This area of application was selected due to the high bandwidth requirement to transfer video data. Results show that in the best scenario is possible to obtain about 97% of bandwidth gain, which can improve the quality of services by offering better


testbeds and research infrastructures for the development of networks and communities | 2007

Evaluating Overlays for Gigabit Channels Data Communication

Fernando F. Redigolo; Joelle Quaini-Sousa; Márcio Augusto Silva; Tereza Cristina M. B. Carvalho; Wilson Vicente Ruggiero; Börje Ohlman

The widespread use of the Internet and the rise of new technologies pose a set of challenges to its current architecture and shows shortcomings in routing, naming, addressing and security. To overcome these shortcomings structural changes to current Internet architecture might be needed, a difficult task in face of the constitutive force that comes from the huge installed base of the current Internet. In order to address this situation, several forms of incremental introduction in the form of new technologies, protocols and applications present itself as more viable alternatives, overlay networks being one of the most prominent ones. This work intends to investigate performance issues that can impact the viability of adopting overlays as data transport over high-speed Gigabit networks, focusing on three different overlay proposals: HIP (host identification protocol), i3 (Internet indirection infrastructure), and H13 (host identity indirection infrastructure).

Collaboration


Dive into the Fernando F. Redigolo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Charles Christian Miers

Universidade do Estado de Santa Catarina

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cicero Inacio da Silva

Universidade Federal de Juiz de Fora

View shared research outputs
Researchain Logo
Decentralizing Knowledge