Muriel Figueredo Franco

Muriel Figueredo Franco
University of Zurich | UZH · Department of Informatics - IFI

Ph.D. Candidate

About

46
Publications
5,759
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
191
Citations
Additional affiliations
September 2018 - present
University of Zurich
Position
  • Research and Teaching Assistant
Description
  • Research and teaching activities at the Communication Systems Group under the supervision of Prof. Dr. Burkhard Stiller. The research topics include Cybersecurity, Internet Economics, Blockchain, Smart Contracts, and Network Functions Virtualization.
March 2018 - August 2018
Instituto Federal de Educação, Ciência e Tecnologia Sul-Rio-Grandense (IFSUL)
Position
  • Professor
Description
  • Teaching activities at the Internet Systems degree on disciplines related to computer networks and web development.
May 2017 - January 2020
Brazilian National Education and Research Network
Position
  • Research and Development Assistant (GT-FENDE)
Description
  • Research and development activities to project and implant an ecosystem for offering, distribution, and execution of Virtual Network Functions (VNFs).
Education
September 2018 - September 2022
University of Zurich
Field of study
  • Informatics
March 2015 - March 2017
Universidade Federal do Rio Grande do Sul
Field of study
  • Computer Networks
March 2010 - March 2015
Universidade Federal de Pelotas
Field of study
  • Computer Science

Publications

Publications (46)
Chapter
Full-text available
The cyber insurance market is still in its infancy but growing fast. Novel models and standards for this particular insurance market are essential due to the use of modern IT (Information Technology) and since insurance providers need to create suitable models for customers.
Article
Full-text available
For the protection of people and society against harm and health threats — especially in case of the COVID-19 pandemic — a variety of different disciplines needs to be involved. The data collection of basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Chapter
Although the first Blockchain (BC) was proposed about a decade ago, BC achievements from a technical and functional perspective are measurable, but still face open issues. Since IFIP’s Working Group 6.6 on the “Management of Networks and Distributed System” investigated BCs in various aspects, this contribution here summarizes and clarifies key cha...
Conference Paper
Full-text available
Remote Electronic Voting (REV) systems allow voters to cast their votes in an uncontrolled, distributed environment. At the same time, the REV system must provide ballot privacy and verifiability of the final tally. Research has proposed REV schemes offering ballot privacy based on computational intractability assumptions, but only a few provide Un...
Chapter
Full-text available
As the dependency of businesses on digital services increases, their vulnerability to cyberattacks increases, too. Besides providing innovative services, business owners must focus on investing in robust cybersecurity mechanisms to countermeasure cyberattacks. Distributed Denial-of-Service (DDoS) attacks remain one of the most dangerous cyberattack...
Conference Paper
Full-text available
While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB...
Conference Paper
Full-text available
Businesses were moving during the past decades to-ward full digital models, which made companies face new threatsand cyberattacks affecting their services and, consequently, theirprofits. To avoid negative impacts, companies’ investments incybersecurity are increasing considerably. However, Small andMedium-sized Enterprises (SMEs) operate on small...
Article
Full-text available
Distributed Denial-of-Service (DDoS) attacks are one of the major causes of concerns for communication service providers. When an attack is highly sophisticated and no countermeasures are available directly, sharing hardware and defense capabilities become a compelling alternative. Future network and service management can base its operations on eq...
Preprint
Full-text available
Trust in electoral processes is fundamental for democracies. Further, the identity management of citizen data is crucial, because final tallies cannot be guaranteed without the assurance that every final vote was cast by an eligible voter. In order to establish a basis for a hybrid public verifiability of voting, this work (1) introduces Proverum,...
Conference Paper
In the last years, cryptocurrencies have becomeincreasingly popular along with their underlying distributedledger technology, referred to as a Blockchain (BC). Nowadays,a wide variety of BC implementations are available. However,the selection of a suitable implementation for a particularapplication or use case is complex because it requires technic...
Preprint
Full-text available
For the protection of people and society against harm and health threats -- especially for the COVID-19 pandemic -- a variety of different disciplines needs to be involved. The data collection of very basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities...
Article
Network Functions Virtualization (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialized hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commod...
Chapter
Academic certificates have a significant influence on the job market, proving a particular competence or skill of a recipient. However, the ability to verify the authenticity of certificates does not follow its relevance in the labor market, causing several companies to exploit this inefficiency to falsify information or even to make fake certifica...
Article
Network Functions Virtualisation (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialised hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commod...
Chapter
Current projects applying blockchain technology to enhance the trust of NFV environments do not consider the VNF repository. However, the blockchain’s properties can enhance trust by allowing to verify a VNF package’s integrity without relying (a) on a Trusted Third Party (TTP) for remote attestation or (b) a secure database. This paper presents BU...
Chapter
Full-text available
Cybersecurity concerns are one of the significant side effects of an increasingly interconnected world, which inevitably put economic factors into perspective, either directly or indirectly. In this context, it is imperative to understand the significant dependencies between complex and distributed systems (e.g., supply-chain), as well as security...
Chapter
Network Functions Virtualization (NFV) decouples the network package performed by network functions from dedicated hardware appliance by running Virtual Network Functions (VNF) on commercial off-the-shelf hardware. Network operators can create customized network services by chaining multiple VNFs, defining a so-called Service Function Chaining (SFC...
Conference Paper
Full-text available
Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to...
Article
In Network Functions Virtualization (NFV), service providers create customized network services by chaining Virtual Network Functions (VNFs) in forwarding graphs, according to individual client demands. Despite the flexibility promoted by the NFV paradigm, specific VNFs used in network services may become bottlenecks due to a number of factors, e.g...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) is transforming the way in which network operators acquire and manage network services. By using virtualization technologies to move packet processing from dedicated hardware to software, NFV has introduced a new market focused on the offer and distribution of Virtual Network Functions (VNF). Infrastructure Pr...
Article
The emergence of NFV has drawn the attention of academia, standardization bodies, and industry, because of the possibility of reducing capital and operational costs while introducing innovation in computer networks. To enable developers to independently publish and distribute VNFs, marketplaces akin to online application stores are essential. Resea...
Conference Paper
Full-text available
In this demo, we present FENDE: Marketplace and Federated Ecosystem for the Distribution and Execution of Virtualized Network Functions (VNFs) and for the creation of Service Function Chains (SFCs). The FENDE ecosystem enables the distribution of both network functions and services in a manner that is akin to marketplaces found in mobile platforms...
Conference Paper
Um dos principais desafios da Virtualização de Funções de Rede (NFV) é o gerenciamento do ciclo de vida de funções de rede. Atualmente, as soluções para o gerenciamento de Funções Virtualizadas de Rede (VNFs) são complexas e necessitam de um entendimento profundo de detalhes da infraestrutura subjacente. Este trabalho propõe uma arquitetura para a...
Conference Paper
Network Functions Virtualization (NFV) is driving a paradigm shift in telecommunications networks, fostering new business models and creating innovation opportunities. In NFV-enabled networks, Service Providers (SPs) have the opportunity to build a business model where tenants can purchase Virtual Network Functions (VNFs) that provide distinct netw...
Conference Paper
Many aspects of the management of computer networks, such as quality of service and security, must be taken into consideration to ensure that the network meets the users and clients demands. Fortunately, management solutions were developed to address these aspects, such as Intent-Based Networking (IBN). IBN is a novel networking paradigm that abstr...

Network

Cited By

Projects

Projects (2)
Project
Work on Blockchains covers a range of different aspects. Work at the CSG includes the exploitation of various technical, optimization, and application facets, which typically results always in an operational prototype.