Bruno Rodrigues

Bruno Rodrigues
University of Zurich | UZH · Department of Informatics - IFI

Doctor of Philosophy

About

60
Publications
10,722
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
937
Citations

Publications

Publications (60)
Chapter
Full-text available
The cyber insurance market is still in its infancy but growing fast. Novel models and standards for this particular insurance market are essential due to the use of modern IT (Information Technology) and since insurance providers need to create suitable models for customers.
Article
As the number of blockchain (BC) platforms providing specific features increases, selecting a platform that fits all requirements needed for a specific case becomes a cumbersome task. For example, not only are BCs' technical details relevant, but also their intrinsic characteristics (e.g., cryptocurrency price) must be considered in selecting a BC...
Article
Full-text available
For the protection of people and society against harm and health threats — especially in case of the COVID-19 pandemic — a variety of different disciplines needs to be involved. The data collection of basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Chapter
Although the first Blockchain (BC) was proposed about a decade ago, BC achievements from a technical and functional perspective are measurable, but still face open issues. Since IFIP’s Working Group 6.6 on the “Management of Networks and Distributed System” investigated BCs in various aspects, this contribution here summarizes and clarifies key cha...
Conference Paper
Full-text available
Remote Electronic Voting (REV) systems allow voters to cast their votes in an uncontrolled, distributed environment. At the same time, the REV system must provide ballot privacy and verifiability of the final tally. Research has proposed REV schemes offering ballot privacy based on computational intractability assumptions, but only a few provide Un...
Chapter
Full-text available
As the dependency of businesses on digital services increases, their vulnerability to cyberattacks increases, too. Besides providing innovative services, business owners must focus on investing in robust cybersecurity mechanisms to countermeasure cyberattacks. Distributed Denial-of-Service (DDoS) attacks remain one of the most dangerous cyberattack...
Conference Paper
Full-text available
While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB...
Conference Paper
Full-text available
Businesses were moving during the past decades to-ward full digital models, which made companies face new threatsand cyberattacks affecting their services and, consequently, theirprofits. To avoid negative impacts, companies’ investments incybersecurity are increasing considerably. However, Small andMedium-sized Enterprises (SMEs) operate on small...
Article
Full-text available
Distributed Denial-of-Service (DDoS) attacks are one of the major causes of concerns for communication service providers. When an attack is highly sophisticated and no countermeasures are available directly, sharing hardware and defense capabilities become a compelling alternative. Future network and service management can base its operations on eq...
Preprint
Full-text available
Trust in electoral processes is fundamental for democracies. Further, the identity management of citizen data is crucial, because final tallies cannot be guaranteed without the assurance that every final vote was cast by an eligible voter. In order to establish a basis for a hybrid public verifiability of voting, this work (1) introduces Proverum,...
Conference Paper
In the last years, cryptocurrencies have becomeincreasingly popular along with their underlying distributedledger technology, referred to as a Blockchain (BC). Nowadays,a wide variety of BC implementations are available. However,the selection of a suitable implementation for a particularapplication or use case is complex because it requires technic...
Preprint
Full-text available
For the protection of people and society against harm and health threats -- especially for the COVID-19 pandemic -- a variety of different disciplines needs to be involved. The data collection of very basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Conference Paper
Due to the growing interest in the blockchain (BC), several applications are being developed, taking advantage of the benefits that such technology promises to deliver, such as removal of Trust Third Parties (TTP) to verify transactions and data immutability. However, these applications require certain aspects, such as high transaction throughput o...
Conference Paper
Full-text available
Digitization of electoral processes depends on confident systems that produce verifiable evidence. The design and implementation of voting systems has been widely studied in prior research, bringing together expertise in many fields. Switzerland is organized in a federal, decentralized structure of independent governmental entities. Thus, its decen...
Chapter
Academic certificates have a significant influence on the job market, proving a particular competence or skill of a recipient. However, the ability to verify the authenticity of certificates does not follow its relevance in the labor market, causing several companies to exploit this inefficiency to falsify information or even to make fake certifica...
Chapter
Full-text available
Cybersecurity concerns are one of the significant side effects of an increasingly interconnected world, which inevitably put economic factors into perspective, either directly or indirectly. In this context, it is imperative to understand the significant dependencies between complex and distributed systems (e.g., supply-chain), as well as security...
Conference Paper
Full-text available
Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to...
Conference Paper
The blockchain (BC) world is rapidly becoming a universe of several ledgers designed for a specific purpose, holding data previously stored (i.e., siloed) in centralized databases. The use of different BCs for the same purpose could hamper the frictionless exchange of data or value. On one hand, it is natural that there are competing implementation...
Conference Paper
Driven by the increasing number of stationary and portable devices, Distributed Denial-of-Service (DDoS) attacks pose a major threat to Internet availability. While advantages of cooperative defenses have been widely recognized over traditional on-premise defenses, there is not a widespread deployment of such cooperative defenses. This work demonst...
Conference Paper
Full-text available
Service Level Agreements (SLA) are documents that specify what Service Providers (SP) are delivering to customers. They contain information about the service, such as target performance level or monthly availability, and penalties for the violations of the SLA. The information about the penalties is essential because if the SP does not deliver what...
Chapter
Diplomas have high importance in society since they serve as official proofs for education. Therefore, it is not surprising that forgeries of such documents have become commonplace. Thus, employers ordinarily have the diplomas manually verified by the issuer. Blockchain creates opportunities to overcome these obstacles, as it has revolutionized the...
Chapter
Bitcoin paved the way for a highly successful FinTech (Financial Technology) application on the basis of a newer technology termed blockchain. As this technology has evolved very recently beyond the financial market, gaining more public attention, other promising blockchain applications areas and use cases are emerging. However, it is still not a s...
Article
Energy efficiency and emissions awareness are core capabilities for sustainable and lower cost distributed cloud networks. In this context, metrics are fundamental for comparison and management purposes, along with the methods and tools which support such metrics’ capture and analysis. However, prior works on green metrics and tools have presented...
Conference Paper
Full-text available
The rapid growth in the number of insecure portable and stationary devices and the exponential increase of traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to services provisioning. Existing defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies...
Conference Paper
Full-text available
The exponential increase of the traffic volume makes Distributed Denial-of-Service (DDoS) attacks a top security threat to service providers. Existing DDoS defense mechanisms lack resources and flexibility to cope with attacks by themselves, and by utilizing other’s companies resources, the burden of the mitigation can be shared. Technologies as bl...
Article
The need to manage the energy consumption of network infrastructure has been addressed by a significant body of work in recent years. In general, energy management capabilities were developed independently and optimized for particular network layers and node features. The interaction between multiple such green capabilities when deployed simultaneo...
Conference Paper
The growing energy consumption has become a major concern for network service providers not only to reduce operational expenses but also to minimize environmental problems related to the high energy expenditure. In this regard, the assessment of the energy consumed has become an important task to maximize the energy efficiency, and thus, offer diff...
Article
Green sustainability-oriented features have become common in network nodes and protocols. Running a network in an energy-efficient way is an important concern of network operators and datacenter networks. The implementation and coordination of the myriad of existing network features poses a challenging task. The energy efficiency capabilities must...
Article
The energy demand for operating Information and Communication Technology (ICT) systems has been growing, implying in high operational costs and consequent increase of carbon emissions. Both in datacenters and telecom infrastructures, the networks represent a significant amount of energy spending. Given that, there is an increased demand for energy...
Conference Paper
A significant number of green, energy-saving network protocols have been invented in recent years in response to demand for reducing the amount of energy consumed by network infrastructure. In this paper, we report on the difficulties we encountered when building an SDN environment that could emulate energy saving protocols operating at different l...
Conference Paper
The energy demand for operating Information and Communication Technologies is growing, implying in high operational costs and consequent carbon emissions. Both in datacenters and in telecom infrastructures, the networks represent a significant amount of energy spending. This implies in an increased demand for energy efficiency, and several function...
Chapter
Full-text available
Cloud computing solutions are increasingly adopted by companies and government from several sectors of the economy. In this scenario, the choice of cloud solutions can occur either by hiring an external service (public or community cloud) or by creating an own cloud to provide services only for this institution (private cloud). Even though the clou...

Network

Cited By

Projects

Projects (2)
Project
Work on Blockchains covers a range of different aspects. Work at the CSG includes the exploitation of various technical, optimization, and application facets, which typically results always in an operational prototype.