Skip to main content
Robson de Oliveira Albuquerque
  • University of Brasília - FT/ENE - Latitude laboratory
  • ROBSON DE OLIVEIRA ALBUQUERQUE holds a Phd in information systems from University Complutense of Madrid in Spain (201... moreedit
  • Rafael Timóteo de Sousa Júnioredit
A Lei nº 13.709, de 14 de agosto de 2018, conhecida como Lei Geral de Proteção de Dados Pessoais (LGPD), veio para instituir princípios e regras para a proteção das pessoas naturais no que diz respeito ao tratamento de seus dados,... more
A Lei nº 13.709, de 14 de agosto de 2018, conhecida como Lei Geral de Proteção de Dados Pessoais (LGPD), veio para instituir princípios e regras para a proteção das pessoas naturais no que diz respeito ao tratamento de seus dados, principalmente no formato digital. Por essa razão, surge a necessidade de se estabelecer soluções tecnológicas capazes de atender às imposições da lei. Neste trabalho, apresentamos um levantamento de técnicas e ferramentas de anonimização e de criptografia que demonstram potencial para auxiliar no cumprimento da LGPD, no caso específico da proteção de bases de dados. Dentre as técnicas comparadas, percebe-se que não há nenhuma que atenda perfeitamente a todas as situações, seja por questões de desempenho ou por considerações de segurança. Ainda assim, conclui-se que, quando possível, essas soluções devem ser utilizadas, pois têm o potencial de aumentar significativamente a segurança dos sistemas e auxiliar no cumprimento da lei.
This paper describes the functionalities and the implementation of a load balancing structure with fault tolerance characteristics to guarantee the survivability of a web service using intelligent agents technology. The developed agents... more
This paper describes the functionalities and the implementation of a load balancing structure with fault tolerance characteristics to guarantee the survivability of a web service using intelligent agents technology. The developed agents are responsible for the automatic reconfiguration of a traffic load balancer for web servers by exchanging information related to availability and workload and using an ACL (agent communication
Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust... more
Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development of a trust model to ensure a reliable files exchange among nodes in a private cloud, as well as the calculation process of trust among them, according to the established metrics. The simulation result using CloudSim framework shows the effectiveness of the model in selecting more reliable node in private cloud.
... sala B1 CEP: 70910-900 - Brasília - DF – Brazil {robson, tamer, barenco}@redes.unb.br, {desousa,puttini}@unb.br 2 Universidad Complutense de Madrid (UCM) Facultad de Informática, Despacho 431 Departamento de Sistemas Informáticos y... more
... sala B1 CEP: 70910-900 - Brasília - DF – Brazil {robson, tamer, barenco}@redes.unb.br, {desousa,puttini}@unb.br 2 Universidad Complutense de Madrid (UCM) Facultad de Informática, Despacho 431 Departamento de Sistemas Informáticos y Programación Juan del Rosal, 8 ...
Best practices are the subject of constant study and evaluation in the areas of Information and Communications Technology (ICT). In government, technological solutions rely on the support of innumerable structural systems. It is important... more
Best practices are the subject of constant study and evaluation in the areas of Information and Communications Technology (ICT). In government, technological solutions rely on the support of innumerable structural systems. It is important to note that government structural systems are complex in nature, so the information in them should be organized, interoperable with other systems, highly available and still considered secure against attacks in computing environments. The application of best practices in the structuring of applications and their environments aims to meet such objectives. This study demonstrates the performance evolution of the SISDPU application of the Public Defender's Office, achieved through the application of best practices for optimization of the available computational infrastructure in their system.
Abstract—The recent advances in cloud computing have risen a number of unforeseen security related issues in different aspects of cloud environments. Among these, the problem of guaranteeing secure access to computing resources in the... more
Abstract—The recent advances in cloud computing have risen a number of unforeseen security related issues in different aspects of cloud environments. Among these, the problem of guaranteeing secure access to computing resources in the cloud is gathering special attention. In this paper, we address open issues related to trust in cloud environments proposing a new trust model for cloud computing which considers a higher level view cloud resources. A simulation of trust calculation between the nodes of the clouds is performed. The simulation was possible to verify that a node is reliable when it reaches the minimum index of trust.
1 Белорусский государственный университет Минск, Беларусь e-mail: tan2tan@gmail.com, krasnoproshin@bsu.by 2 Федеральный университет Рио-Гранде-ду-Сул, UFRGS INF CP: 15064, 91501-970, Порто-Алегре, Бразилия, e-mail: edisonpf@gmail.com 3... more
1 Белорусский государственный университет Минск, Беларусь e-mail: tan2tan@gmail.com, krasnoproshin@bsu.by 2 Федеральный университет Рио-Гранде-ду-Сул, UFRGS INF CP: 15064, 91501-970, Порто-Алегре, Бразилия, e-mail: edisonpf@gmail.com 3 Университет Бразилиа, UnB FT Эне CP: 4386, 70910-900, Бразилиа, Бразилия e-mail: robson.pesquisador@gmail.com, desousa1961@gmail.com 4 Byelex Multimedia Products BV Argon 1, 4751 XC Oud Gastel, Нидерланды e-mail: azalesky@by.byelex.com, h.vissia@byelex.com
Today orthodontists need not burden their work load with tasks such as figuring out how to send patient information to colleagues or how two share the same patient record across different software programs. As a long term attempt to... more
Today orthodontists need not burden their work load with tasks such as figuring out how to send patient information to colleagues or how two share the same patient record across different software programs. As a long term attempt to alleviate these tasks, we are working on developing a standard for the orthodontic electronic patient record to enable a seamless interchange of patient data between software programs. This article describes a practical proposal that integrates two existing standards, HL7 and DICOM, to create a standard for the orthodontic electronic patient record.
The recent advances in cloud computing have risen a number of unforeseen security related issues in d ifferent aspects of cloud environments. Among these, the problem of guaranteeing secure access to computing resources i n the cloud is... more
The recent advances in cloud computing have risen a number of unforeseen security related issues in d ifferent aspects of cloud environments. Among these, the problem of guaranteeing secure access to computing resources i n the cloud is gathering special attention. In this paper, we a ddress open issues related to trust in cloud environments propo sing a new trust model for cloud computing which considers a higher level view cloud resources. Keywords-Cloud Computing; Distributed Computing; Security; Integrity; Confidentiality; Trust and Ava ilability.
A programabilidade resultante da abordagem Software Defined Networking (SDN) facilita a integração das funcionalidades de firewalls, sistemas de prevenção de intrusão (IPS) e switches, permitindo a rápida reconfiguração da rede em caso de... more
A programabilidade resultante da abordagem Software Defined Networking (SDN) facilita a integração das funcionalidades de firewalls, sistemas de prevenção de intrusão (IPS) e switches, permitindo a rápida reconfiguração da rede em caso de detecção de anomalias. Neste artigo, a arquitetura proposta visa estruturar uma medida de segurança distribuída que integra firewall, IPS, switches e uma entidade controladora para suportar instâncias de Internet das Coisas (IoT), permitindo a identificação de comportamento anômalo de dispositivos IoT pelo IPS, levando então a SDN a bloquear os ataques o mais próximo possível das fontes, reduzindo o volume de tráfego malicioso e isolando o dispositivo infectado do resto da rede..
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user... more
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple sco...
Currently, social networks present information of great relevance to various government agencies and different types of companies, which need knowledge insights for their business strategies. From this point of view, an important... more
Currently, social networks present information of great relevance to various government agencies and different types of companies, which need knowledge insights for their business strategies. From this point of view, an important technique for data analysis is to create and maintain an environment for collecting data and transforming them into intelligence information to enable analysts to observe the evolution of a given topic, elaborate the analysis hypothesis, identify botnets, and generate data to aid in the decision-making process. Focusing on collecting, analyzing, and supporting decision-making, this paper proposes an architecture designed to monitor and perform anonymous real-time searches in tweets to generate information allowing sentiment analysis on a given subject. Therefore, a technological structure and its implementation are defined, followed by processes for data collection and analysis. The results obtained indicate that the proposed solution provides a high capaci...
This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System... more
This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorize...
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated... more
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools...
A non-interactive key exchange (NIKE) protocol allows N parties who know each other’s public key to agree on a symmetric shared key without requiring any interaction. A classic example of such protocol for N = 2 is the Diffie-Hellman key... more
A non-interactive key exchange (NIKE) protocol allows N parties who know each other’s public key to agree on a symmetric shared key without requiring any interaction. A classic example of such protocol for N = 2 is the Diffie-Hellman key exchange. Recently, some techniques were proposed to obtain a NIKE protocol for N parties, however, it is still considered an open problem since the security of these protocols must be confirmed. In a recent work, Kowada and Machado [1] proposed a protocol that solves the NIKE problem for N parties. However, this work found security problems in the proposed solution and implemented an efficient attack to their protocol demonstrating that their key-exchange scheme is insecure.
Due to the drastic increase of electricity prosumers, i.e., energy consumers that are also producers, smart grids have become a key solution for electricity infrastructure. In smart grids, one of the most crucial requirements is the... more
Due to the drastic increase of electricity prosumers, i.e., energy consumers that are also producers, smart grids have become a key solution for electricity infrastructure. In smart grids, one of the most crucial requirements is the privacy of the final users. The vast majority of the literature addresses the privacy issue by providing ways of hiding user’s electricity consumption. However, open issues in the literature related to the privacy of the electricity producers still remain. In this paper, we propose a framework that preserves the secrecy of prosumers’ identities and provides protection against the traffic analysis attack in a competitive market for energy trade in a Neighborhood Area Network (NAN). In addition, the amount of bidders and of successful bids are hidden from malicious attackers by our framework. Due to the need for small data throughput for the bidders, the communication links of our framework are based on a proprietary communication system. Still, in terms o...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent... more
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algor...
... Robson de Oliveira Albuquerque1,2, Luis Javier García Villalba1, Osmar Ribeiro Torres2, and Flavio Elias Gomes de Deus2 ... Software (2009), http://documents.bmc.com/products/documents/ 10/45/91045/9104 5.pdf (accessed on January 05,... more
... Robson de Oliveira Albuquerque1,2, Luis Javier García Villalba1, Osmar Ribeiro Torres2, and Flavio Elias Gomes de Deus2 ... Software (2009), http://documents.bmc.com/products/documents/ 10/45/91045/9104 5.pdf (accessed on January 05, 2010) 6. Stallings, W.: Operating ...
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client... more
Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information store...

And 22 more