Frank Siqueira

Frank Siqueira
Federal University of Santa Catarina | UFSC · Departamento de Informática e Estatística

Professor

About

98
Publications
19,405
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
471
Citations

Publications

Publications (98)
Conference Paper
Full-text available
Semantic descriptions are able to provide more accurate information on the characteristics of Web services, allowing these to be dynamically discovered without human intervention. Semantic web services can also be automatically composed through the use of discovery mechanisms able to identify inter-related services that can be combined together. Th...
Article
Full-text available
Discovering biomarkers is a fundamental step to understand and deal with genetic diseases. Methods using classic Computer Science algorithms have been adapted in order to support processing large biological data sets, aiming to find useful information to understand causing conditions of diseases such as cancer. This paper describes some promising b...
Conference Paper
Full-text available
Identity management is a central point to the security of large applications such cloud services. The identity providers (IdPs) offer services that handle critical information of users. Usually, this kind of information is stored with special care in these providers and intrusions do not necessarily result in security violations. But intrusions may...
Conference Paper
Full-text available
Web APIs provide interfaces for interaction among systems based on the existing infrastructure for hosting Web sites and applications. The REST architectural style is the most employed approach for building Web APIs. However, the flexibility provided by REST may result in implementations with low quality design, limited reuse and poor documentation...
Conference Paper
Full-text available
This paper presents a middleware infrastructure for integration of heterogeneous embedded devices in ubiquitous computing environments. The proposed infrastructure employs the Devices Profile for Web Services (DPWS) as the underlying integration technology, allowing devices that adopt different networking standards to interact with each other, thro...
Preprint
Offering support for real-time communications on top of a wireless network infrastructure is both a hot topic and still an open challenge. Wireless networks are not on the same level of safety, dependability, and timeliness observed in the wired realm, but they are evolving towards it. Instead of focusing on the results that need to be delivered, t...
Article
This paper describes the architectural model of an intrusion-tolerant identity provider (IdP-IT) for large distributed systems such as clouds, computational grids or collaborative networks. Like any service available on the Internet, Identity Providers are subject to attacks that can result in intrusions that would be catastrophic for the security...
Article
The large volume of data that has been produced every day has encouraged the development of new data storage technologies, including graph databases, which have experienced a growing adoption rate in recent years. On the other hand, the graph database management systems that are commercially available nowadays still lack means to ensure the consist...
Chapter
The enormous volume and high variety of information that is constantly produced by computing systems requires storage technologies able to provide high processing velocity and data quality. The suitability for modeling complex data and for delivering performance are characteristics that are making graph databases become very popular. However, exist...
Conference Paper
Nowadays, data is seen as one of the most valuable assets of organizations. Representing and exposing data in a suitable manner is mandatory for allowing consumers – either human beings or software systems – to properly retrieve and interpret such data. Web Services along with semantic Web techniques may be adopted to address this issue. This paper...
Article
Initial developments in Service-Oriented Computing (SOC) led to the development of Web Services using the SOAP protocol and an extensive set of tools and methods for composing new services from those existing. Subsequently, other types of services also emerged, such as event-oriented services and RESTful services. Nevertheless, all mentioned servic...
Conference Paper
One of the main challenges concerning information systems that deal with heterogeneous services and data consists in achieving semantic interoperability. Several approaches have been proposed to assist in the semantic enrichment of services, by using domain ontologies. Nevertheless, most of the proposals found in the literature focus on the enrichm...
Article
Full-text available
PURPOSE: This paper describes a software architecture that automatically adds semantic capabilities to data services. The proposed architecture, called OntoGenesis, is able to semantically enrich data services, so that they can dynamically provide both semantic descriptions and data representations. DESIGN/METHODOLOGY/APPROACH: The enrichment ap...
Conference Paper
In recent years, many approaches and tools have emerged to assist in the semantic enrichment of Web services. Many researchers have been directing efforts in providing semantic annotations and enriching service descriptions. However, the provisioning of semantically enriched representations through data services has been little considered in the li...
Conference Paper
Full-text available
The integration of heterogeneous data sources can be done by using data-driven microservices along with Semantic Web technologies. However, it becomes a challenge in cross-domain scenarios, in which data is described by heterogeneous ontologies. This work discusses data integration problems in the context of microservices and proposes an ontology a...
Article
Full-text available
Purpose – This paper aims to propose a method based on Linked Data and Semantic Web principles for composing microservices through data integration. Two frameworks that provide support for the proposed composition method are also described in this paper: Linkedator, which is responsible for connecting entities managed by microservices, and Alignato...
Conference Paper
Full-text available
Due to the requirements imposed by data-intensive applications, NoSQL and NewSQL databases are becoming more present in the IT Market. These products provide alternative data models to the relational databases, and most of them are intrinsically distributed. These database management systems (DBMSs) relax consistency to favor availability and perfo...
Conference Paper
The use of cloud computing and cloud federations has been the focus of studies in the last years. Many of these infrastructures delegate user authentication to Identity Providers. Once these services are available through the Internet, concerns about the confidentiality of user credentials and attributes are high. The main focus of this work is the...
Article
Full-text available
Purpose: This paper aims to propose a method based on Linked Data and Semantic Web principles for composing microservices through data integration. Two frameworks that provide support for the proposed composition method are also described in this paper: Linkedator, which is responsible for connecting entities managed by microservices, and Alignator...
Conference Paper
Full-text available
Microservices are replacing monolithic applications by splitting them out into small and independent artifacts that collaborate with one another. Focused on managing highly cohesive information, microservices may be composed to provide richer and linked information. This paper presents a composition method, aimed at composing semantic microservices...
Conference Paper
Full-text available
The microservices architecture provides a new approach to develop applications. As opposed to monolithic applications, in which the application comprises a single software artifact, an application based on the microservices architecture is composed by a set of services, each one designed to perform a single and well-defined task. These services all...
Conference Paper
Full-text available
O uso de provedores de cloud e formações de federações tem sido foco de estudos há alguns anos. Muitas destas infraestruturas delegam as autenticações de seus usuários a Provedores de Identidades. Por se tratarem de serviços disponíveis através da Internet, a preocupação com o sigilo das credenciais e atributos de usuários é constante. O foco princ...
Conference Paper
Full-text available
Motivated by transparency policies, government agencies have been publishing more valuable data. In order to take advantage of this initiative, data must be published in accordance with Linked Open Data principles. This work proposes a platform capable of enriching police reports with data available on the Web. This work also presents an evaluation...
Conference Paper
Full-text available
The growing development of smart devices makes it possible to create new distributed applications targeted for smart spaces. The design of intelligent spaces assumes that there is an infrastructure to support the applications requirements. Many academic works have proposed middlewares that provide an abstraction for the use of network services. The...
Conference Paper
The early theoretical studies that presented conceptual definitions for the mapping of Quality of Experience (QoE) through Quality of Service (QoS), in an approach focused on Distributed Databases (DDBs), showed the directions to be threshed in a way to accomplish a hybrid DDBs’ QoE-QoS set of evaluation criteria. That evaluation set being classifi...
Conference Paper
Full-text available
Television broadcast production facilities capture, manage, edit, handle, and broadcast audiovisual content by using a wide array of specialized equipment and software. The complex workflow in this environment demands interoperability between devices, but vendor-neutral protocols do not provide access to a significant amount of functionality. This...
Conference Paper
The growing evolution in the development of embedded systems has raised a numerous amount of distributed applications. Such applications have a strong tendency to integrate various types of existing devices. This trend is aligned with the ideas of ubiquitous computing, which is expected to turn devices increasingly independent of people, making the...
Conference Paper
Full-text available
Web Service composition is a complex and error-prone process that requires the support of software tools in order to become feasible. Composition tools can help a developer to select compatible services from vast service repositories, taking into account characteristics such as port compatibility, availability, cost, and so on. This paper describes...
Conference Paper
Full-text available
The concept of cloud federations recently attracted the focus of attention of the research community. Cloud federations allow cloud providers to cooperate through the integration of their services. There are two important issues that must be dealt with in a federated environment. First, it must be defined how resources will be shared and made avail...
Conference Paper
Nowadays, the concept of Federations has drawn attention of the research community in the area of cloud computing. In a cloud federation, cloud providers build trust relationships and share resources, aiming to overcome momentary resource shortage or to offer a wider range of resources to their users. This paper introduces an infrastructure for bui...
Conference Paper
Resumo Os princípios arquiteturais REST estão sendo amplamente adotados nas implementações de sistemas distribuídos disponíveis na Web, cujo principal objetivo é o intercâmbio de dados entre aplicações. No entanto, devido à falta de padrões e diretrizes, cada implementação segue uma linha de desenvolvimento diferente. Outro desafio é a falta de sup...
Conference Paper
Full-text available
The creation of complex SOA applications requires multiple services to be combined. Building service compositions, though, requires analyzing if inputs and outputs of composed services are compatible, and this is a costly task to be done manually. The semantic description of Web Services using ontology concepts to describe the provided operations,...
Conference Paper
Full-text available
Support from development tools and infrastructure frameworks is crucial to increase the development of Web APIs that follow the REST architectural principle, leaving the software developer free to focus on the implementation of the business core of the application. This paper introduces a framework for semantic description of RESTful Web APIs, whic...
Conference Paper
Full-text available
Storage and processing of large data sets on distributed platforms allows parallel query execution and is capable of improving scalability. However, defining a distributed allocation schema is a complex task that has been based mostly on ad-hoc, trial-and-error strategies. This paper describes an algorithm for creating a distributed allocation sche...
Conference Paper
Full-text available
Identity management is a central point to the security of large applications and distributed systems. The identity providers are elements that concentrate critical information of users. These information are stored with special care in these providers and intrusions do not necessarily result in security violations. But intrusions may implant malici...
Article
The currently adopted specifications for Digital Television (DTV) middleware do not define the internal characteristics of their architecture. As a result, the existing middleware implementations are not as flexible, extensible and adaptable as they should be due to the adoption of a closely-coupled architecture. This paper proposes a modular archi...
Conference Paper
Full-text available
Several works proposed methods to make video streaming scalable over the number of clients, avoiding the linear growth of bandwidth requirements for the media source node. Some are based on overlay networks built on top of the IP protocol and distribute content between overlay partners. In this way the clients share their bandwidth, reducing the bu...
Article
With the widespread adoption of broadband Internet access, home users have started to consume several multimedia services, such as IP Telephony, radio and video on demand. Meanwhile, the main video services are on-demand and need buffering, while TV is live. They also require a server bandwidth that grows linearly with the number of clients. IP Mul...
Conference Paper
Full-text available
This paper describes an architecture for sharing data in XML format through a peer-to-peer (P2P) network, which interconnects devices ranging from high-end servers to mobile devices. The XOP architecture allows devices with low storage capacity and subject to disconnection to use other peers of the P2P network for storing data. Users are able to lo...
Conference Paper
Full-text available
This paper presents the QoS-MO ontology. This ontology enables the specification of QoS requirements for Semantic Web Services and can easily be combined with OWL-S in order to fully describe Web Services. The QoS specifications created using the QoS-MO ontology may be employed on the design and development of Web Services and on the publication an...
Conference Paper
Full-text available
Web services have been widely employed to allow intero- perability among applications and/or technologies. However, the standard technologies and protocols which provide the foundation for Web Services do not address issues such as fault tolerance and dependability of services. Aiming to solve this limitation, this paper proposes a software archi-...
Conference Paper
Full-text available
This paper presents a Semantic Web Services search engine that focus on the discovery of Web Services that fulfill a defined set of QoS constraints. Our approach relies on the use of the QoS-MO ontology, which provides means for specifying the QoS characteristics of Web Services, and the SPARQL language, which allows the specification of queries fo...
Conference Paper
Full-text available
Embedded applications, which were origionally built on standalone devices, nowadays require a growing integration with other systems through their interconnection with TCP/IP networks. Web Services, which provide a serviceoriented distributed architecture for the interconnection of systems through TCP/IP networks, have been widely adopted for the i...
Conference Paper
Full-text available
This paper proposes a semi-reliable multicast protocol that evaluates the necessity of retransmitting lost packets, taking into account the priority associated to each lost packet. The protocol relies on the neighboring receivers for retransmitting lost packets, resulting in much faster recovery. This paper also demonstrates how the proposed protoc...
Conference Paper
Full-text available
Integration of the currently available computing systems and platforms is one of the most important goals envisa- ged by computer scientists, which starts to become a re- ality nowadays. System integration technologies, such as Web Services, can provide a middleware for allowing sys- tems that were originally independent to work cooperati- vely. Th...
Conference Paper
Full-text available
This paper proposes a semi-reliable multicast protocol that aims to increase the quality of video streams transmitted in large-scale systems without overloading the video source and the communications network. This protocol, which is based on the IP multicast protocol and the MPEG standard, evaluates the necessity of retransmittin g lost packets ta...
Article
Full-text available
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the Internet. This problem occurs also when using a Public Key Infrastructure (PKI) with a hierarchical trust model. SDSI/SPKI is a PKI that adopts a more scalable trust paradi...
Article
Full-text available
The Low voltage circuits operate under a variety of factors, including electric, physical, and human. The design and management of those circuits is a challenge for power companies. This paper applies data mining with genetic algorithms to suites of low voltage circuit data. The data were prepared using statistical analysis. Relevant association ru...
Article
Full-text available
This work presents an authentication and authorization model that results from the integration of the SPKI/SDSI infrastructure with CORBAsec. The paper presents the main facilities provided by the proposed model, showing the advantages of using the SPKI/SDSI infrastructure. CORBA provides to the model the advantages of interoperable distributed obj...
Conference Paper
Full-text available
This paper presents a component model for building distributed applications with fault-tolerance requirements. The AFT-CCM model selects the configuration of replicated services during execution time based on QoS requirements specified by the user. The configuration is managed using a set of components that deal with the non-functional aspects of t...
Article
Full-text available
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such systems are not easily scalable and can become single points of failure or performance bottlenecks. Newer systems, with trust paradigm focused on the client and based on a...
Conference Paper
Full-text available
This work presents an authentication and authorization model that results from the integration of the SPKI/SDSI infrastructure with CORBAsec. The paper presents the main facilities provided by the proposed model, showing the advantages of using the SPKI/SDSl infrastructure. CORBA provides to the model the advantages of interoperable distributed obj...
Conference Paper
Full-text available
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the Internet. This problem occurs also when using a public key infrastructure (PKI) with a hierarchical thrust model. SDSI/SPKI is a PKI that adopts a more scalable trust parad...
Conference Paper
Full-text available
This paper presents SALE, a middleware platform for mission-critical applications built upon the CORBA architecture and its extensions for real-time (RT-CORBA), fault tolerance (FT-CORBA) and security (CORBASec). The SALE platform provides different reliability, security and real-time properties, which are specified by applications as quality of se...
Conference Paper
Full-text available
Component-based software development allows developers to compose applications using software parts, called components. This approach represents an important step towards reducing development cost and time, and allows the creation of automated tools for software development. However, current applications have quality of service (QoS) requirements,...
Conference Paper
Full-text available
Este trabalho apresenta um modelo de autorização e autenticação que visa minimizar, principalmente, as dificuldades de escalabilidade e flexibilidade dos sistemas clássicos, em ambiente de larga escala como a Internet. O modelo se baseia em redes de confiança construídas a partir da delegação de privilégios de acesso, codificados em certificados de...