Eder John Scheid

Eder John Scheid
Universidade Federal do Rio Grande do Sul | UFRGS · Institute of Informatics

Doctor of Philosophy

About

79
Publications
13,312
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
921
Citations
Additional affiliations
December 2017 - December 2022
University of Zurich
Position
  • Research Assistant and PhD Candidate
Education
January 2018 - June 2022
University of Zurich
Field of study
  • Computer Science
January 2015 - July 2017
Universidade Federal do Rio Grande do Sul
Field of study
  • Computer Science
January 2010 - December 2014
Universidade Federal de Santa Maria
Field of study
  • Computer Science

Publications

Publications (79)
Conference Paper
Many aspects of the management of computer networks, such as quality of service and security, must be taken into consideration to ensure that the network meets the users and clients demands. Fortunately, management solutions were developed to address these aspects, such as Intent-Based Networking (IBN). IBN is a novel networking paradigm that abstr...
Conference Paper
Full-text available
Service Level Agreements (SLA) are documents that specify what Service Providers (SP) are delivering to customers. They contain information about the service, such as target performance level or monthly availability, and penalties for the violations of the SLA. The information about the penalties is essential because if the SP does not deliver what...
Conference Paper
Full-text available
The blockchain (BC) world is rapidly becoming a universe of several ledgers designed for a specific purpose, holding data previously stored (i.e., siloed) in centralized databases. The use of different BCs for the same purpose could hamper the frictionless exchange of data or value. On one hand, it is natural that there are competing implementation...
Chapter
Full-text available
Although the first Blockchain (BC) was proposed about a decade ago, BC achievements from a technical and functional perspective are measurable, but still face open issues. Since IFIP’s Working Group 6.6 on the “Management of Networks and Distributed System” investigated BCs in various aspects, this contribution here summarizes and clarifies key cha...
Article
Full-text available
As the number of blockchain (BC) platforms providing specific features increases, selecting a platform that fits all requirements needed for a specific case becomes a cumbersome task. For example, not only are BCs' technical details relevant, but also their intrinsic characteristics (e.g., cryptocurrency price) must be considered in selecting a BC...
Article
Centralization of Internet‐based services in a few key players has been a topic of study in recent years. One of such services, the domain name system (DNS), is one of the pillars of the Internet, which allows users to access websites on the Internet through easy‐to‐remember domain names rather than complex numeric IP addresses. In this DNS context...
Conference Paper
Full-text available
Cybersecurity planning is challenging for digitized companies that want adequate protection without overspending money. Currently, the lack of investments and perverse economic incentives may increase the number of cyberattacks, which result in several economic impacts on companies worldwide. Therefore, cybersecurity planning has to consider techni...
Conference Paper
Full-text available
A evolução das tecnologias e a crescente dependência em dispositivos digitais aumentam os riscos cibernéticos e os ciberataques, tornando essencial para a compreensão dos riscos e de seus potenciais impactos a partir de uma perspectiva técnica e econômica. Neste contexto, este artigo propõe o SIM-Ciber, uma solução para simulação de riscos e impact...
Conference Paper
Full-text available
The Domain Name System (DNS) service is one of the pillars of the Internet. This service allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. However, the concentration of DNS service providers on the Internet affects user security, privacy, and network accessibility as the...
Conference Paper
The Domain Name System (DNS) represents one of the cornerstones of the World Wide Web and plays an indispensable role in its operation. DNS is an extensive distributed database structured to resolve readable domain names for people, companies, and institutions into corresponding and reliable IP addresses. This paper presents PerfResolv, an approach...
Conference Paper
Since the proposal of Bitcoin in 2009 and with the inclusion of the first transaction in its genesis block, Blockchains (BC) have been used to store arbitrary data, including texts, images, and documents. However, such data is often not easily discoverable in BCs and is embedded within their binary data structures. Thus, this paper presents the des...
Conference Paper
Full-text available
Behavioral Fingerprinting is a technique used to understand the behavior of devices, enabling a better understanding of their functionality and improved anomaly detection. This paper proposes a methodology for generating the behavioral fingerprint of programmable switches. The methodology outlines the process of selecting metrics for analysis, extr...
Conference Paper
Full-text available
O Sistema de Nomes de Domínio (DNS) representa um dos sistemas centrais para a operação da Internet. Neste artigo, apresentamos uma análise da pesquisa sobre a medição do desempenho de resolvedores públicos de DNS nos últimos cinco anos. Assim, este trabalho fornece uma visão geral do estado da arte sobre os métodos utilizados para análise do desem...
Conference Paper
Full-text available
Network automation is essential for efficiently managing complex networks, enhancing reliability, and reducing human errors. This work proposes a novel approach to automate security planning and management using the Planning Domain Definition Language (PDDL). PDDL is used to generate an action plan to mitigate imminent threats to companies’ network...
Conference Paper
Full-text available
The performance of Domain Name System (DNS) resolvers is crucial, as the majority of the communication in the Internet starts with a DNS lookup to resolve a domain an IP address to reach the desired content. In this sense, the academia has been devoted to measure and analyze the performance of DNS resolvers using different tools. However, such tool...
Conference Paper
Full-text available
Besides the main blockchain use-case of exchanging cryptocurrencies, Distributed Applications (DApps) can also be developed on top of such a technology. However, due to the size of popular blockchains and price, testing these DApps in a real-world environment becomes challenging. Thus, blockchain emulators were proposed to address such as issue. Th...
Chapter
Elections generally involve the simple tasks of counting votes and publishing the final tally to voters. Depending on the election’s scope, these processes require sophisticated methods embedded in the electorate’s various technological and societal factors (e.g., the voting culture). An election’s integrity is the pinnacle of the trust placed in t...
Preprint
Full-text available
The Domain Name System (DNS) service is one of the pillars of the Internet. This service allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. DNS acts as a directory that translates the domain names into a corresponding IP address, allowing communication between computers on...
Preprint
Full-text available
Cybersecurity planning is challenging for digitized companies that want adequate protection without overspending money. Currently, the lack of investments and perverse economic incentives are the root cause of cyberattacks, which results in several economic impacts on companies worldwide. Therefore, cybersecurity planning has to consider technical...
Preprint
Full-text available
Hospital infrastructures are always in evidence in periods of crisis, such as natural disasters or pandemic events, under stress. The recent COVID-19 pandemic exposed several inefficiencies in hospital systems over a relatively long period. Among these inefficiencies are human factors, such as how to manage staff during periods of high demand, and...
Article
Given the growing increase in the number of blockchain (BC) platforms, cryptocurrencies, and tokens, non-technical individuals face a complex question when selecting a BC that meets their requirements (e.g. performance or security). In addition, current approaches that aid such a selection process present drawbacks (e.g. require specific BC knowled...
Article
Full-text available
The field of generating movement profiles of individuals is valuable in many real-world applications (e.g., controlling disease spread or evaluating marketing engagement). Existing solutions often rely on global positioning systems (GPS) or similar systems, primarily targeted at outdoor use cases. However, the indoor tracking capabilities of curren...
Article
Full-text available
Blockchains (BC) and Distributed Ledgers (DL) offer favorable properties, especially immutability and decentralization, which are suitable for voting systems’ Bulletin Boards (BB). In recent years, an influx of BC-based voting systems have been observed. Distributing trust among multiple trustees is a crucial reason to adopt BCs and DLs in voting s...
Conference Paper
Full-text available
Threat Modeling is a structured process to identify critical assets in an organization and the threats posed by adversarial agents. The goal of applying such a process is to achieve a shared understanding of the inherent risks and potential counter-measures that can be put in place. In practice, threat modeling is a collaborative process combining...
Conference Paper
Full-text available
Traditionally, data centers have been the preferred target for ransomware attacks. However, the increasing number of IoT (Internet-of-Things) devices managing valuable data is attracting the attention of cybercriminals and ransomware towards resource-constrained devices. So far, literature has demonstrated the suitability of monitoring the behavior...
Article
Intents brought significant improvements in network management by the use of intent-level languages. Despite these improvements, intents are not yet fully integrated and deployed in most large-scale networks. As a result, network operators may still experience problems when deploying new intents, for instance, learning a vendor-specific language to...
Conference Paper
Full-text available
Cyberattacks have increased in number and severity, negatively impacting businesses and their services. As such, cybersecurity can no longer be seen just as a technological issue, but it must also be recognized as critical to the economy and society. Current solutions struggle to find indicators of unpredictable risks, limiting their ability to per...
Conference Paper
The recent COVID pandemic challenged healthcare systems worldwide and highlighted not only a lack of sufficient resources in some cases, but also an overall inefficiency in managing available PMDs (Portable Medical Devices). Hospitals typically provide their staff with smartphones to facilitate internal communication and access to hospital services...
Chapter
Full-text available
Trust management in distributed systems has always been a topic of active interest in the research community to understand how to foster and manage aspects. In this sense, Distributed Ledger Technologies (DLT) and, among them, Blockchains (BC), emerge as an alternative for shifting trust assumptions between users to the protocol that regulates the...
Chapter
Full-text available
The cyber insurance market is still in its infancy but growing fast. Novel models and standards for this particular insurance market are essential due to the use of modern IT (Information Technology) and since insurance providers need to create suitable models for customers.
Conference Paper
Full-text available
Over the past years, Blockchain (BC) interoperability became a crucial topic of research due to the fast development of new BC platforms for many use-cases, from supply-chain to voting. The need for interoperability can be attributed to the development of such platforms that did not follow any standard, leading to the creation of BC islands that do...
Article
Full-text available
For the protection of people and society against harm and health threats — especially in case of the COVID-19 pandemic — a variety of different disciplines needs to be involved. The data collection of basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Conference Paper
Full-text available
Remote Electronic Voting (REV) systems allow voters to cast their votes in an uncontrolled, distributed environment. At the same time, the REV system must provide ballot privacy and verifiability of the final tally. Research has proposed REV schemes offering ballot privacy based on computational intractability assumptions, but only a few provide Un...
Chapter
Full-text available
As the dependency of businesses on digital services increases, their vulnerability to cyberattacks increases, too. Besides providing innovative services, business owners must focus on investing in robust cybersecurity mechanisms to countermeasure cyberattacks. Distributed Denial-of-Service (DDoS) attacks remain one of the most dangerous cyberattack...
Conference Paper
Full-text available
While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB...
Conference Paper
Full-text available
Businesses were moving during the past decades to-ward full digital models, which made companies face new threatsand cyberattacks affecting their services and, consequently, theirprofits. To avoid negative impacts, companies’ investments incybersecurity are increasing considerably. However, Small andMedium-sized Enterprises (SMEs) operate on small...
Article
Full-text available
Distributed Denial-of-Service (DDoS) attacks are one of the major causes of concerns for communication service providers. When an attack is highly sophisticated and no countermeasures are available directly, sharing hardware and defense capabilities become a compelling alternative. Future network and service management can base its operations on eq...
Preprint
Full-text available
Trust in electoral processes is fundamental for democracies. Further, the identity management of citizen data is crucial, because final tallies cannot be guaranteed without the assurance that every final vote was cast by an eligible voter. In order to establish a basis for a hybrid public verifiability of voting, this work (1) introduces Proverum,...
Conference Paper
In the last years, cryptocurrencies have becomeincreasingly popular along with their underlying distributedledger technology, referred to as a Blockchain (BC). Nowadays,a wide variety of BC implementations are available. However,the selection of a suitable implementation for a particularapplication or use case is complex because it requires technic...
Preprint
Full-text available
For the protection of people and society against harm and health threats -- especially for the COVID-19 pandemic -- a variety of different disciplines needs to be involved. The data collection of very basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Conference Paper
Due to the growing interest in the blockchain (BC), several applications are being developed, taking advantage of the benefits that such technology promises to deliver, such as removal of Trust Third Parties (TTP) to verify transactions and data immutability. However, these applications require certain aspects, such as high transaction throughput o...
Conference Paper
Full-text available
Digitization of electoral processes depends on confident systems that produce verifiable evidence. The design and implementation of voting systems has been widely studied in prior research, bringing together expertise in many fields. Switzerland is organized in a federal, decentralized structure of independent governmental entities. Thus, its decen...
Chapter
Full-text available
Academic certificates have a significant influence on the job market, proving a particular competence or skill of a recipient. However, the ability to verify the authenticity of certificates does not follow its relevance in the labor market, causing several companies to exploit this inefficiency to falsify information or even to make fake certifica...
Chapter
Current projects applying blockchain technology to enhance the trust of NFV environments do not consider the VNF repository. However, the blockchain’s properties can enhance trust by allowing to verify a VNF package’s integrity without relying (a) on a Trusted Third Party (TTP) for remote attestation or (b) a secure database. This paper presents BU...
Chapter
Network Functions Virtualization (NFV) decouples the network package performed by network functions from dedicated hardware appliance by running Virtual Network Functions (VNF) on commercial off-the-shelf hardware. Network operators can create customized network services by chaining multiple VNFs, defining a so-called Service Function Chaining (SFC...
Article
In Network Functions Virtualization (NFV), service providers create customized network services by chaining Virtual Network Functions (VNFs) in forwarding graphs, according to individual client demands. Despite the flexibility promoted by the NFV paradigm, specific VNFs used in network services may become bottlenecks due to a number of factors, e.g...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) is transforming the way in which network operators acquire and manage network services. By using virtualization technologies to move packet processing from dedicated hardware to software, NFV has introduced a new market focused on the offer and distribution of Virtual Network Functions (VNF). Infrastructure Pr...
Chapter
Diplomas have high importance in society since they serve as official proofs for education. Therefore, it is not surprising that forgeries of such documents have become commonplace. Thus, employers ordinarily have the diplomas manually verified by the issuer. Blockchain creates opportunities to overcome these obstacles, as it has revolutionized the...
Article
The emergence of NFV has drawn the attention of academia, standardization bodies, and industry, because of the possibility of reducing capital and operational costs while introducing innovation in computer networks. To enable developers to independently publish and distribute VNFs, marketplaces akin to online application stores are essential. Resea...
Conference Paper
Network Functions Virtualization (NFV) is driving a paradigm shift in telecommunications networks, fostering new business models and creating innovation opportunities. In NFV-enabled networks, Service Providers (SPs) have the opportunity to build a business model where tenants can purchase Virtual Network Functions (VNFs) that provide distinct netw...