Massimiliano Rak

ORCID: 0000-0001-6708-4032
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Cloud Data Security Solutions
  • Distributed and Parallel Computing Systems
  • Software System Performance and Reliability
  • Network Security and Intrusion Detection
  • Service-Oriented Architecture and Web Services
  • IoT and Edge/Fog Computing
  • Information and Cyber Security
  • Access Control and Trust
  • Advanced Data Storage Technologies
  • Advanced Malware Detection Techniques
  • Parallel Computing and Optimization Techniques
  • Advanced Software Engineering Methodologies
  • Security and Verification in Computing
  • Blockchain Technology Applications and Security
  • Scientific Computing and Data Management
  • Distributed systems and fault tolerance
  • Mobile Agent-Based Network Management
  • Internet Traffic Analysis and Secure E-voting
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy-Preserving Technologies in Data
  • Business Process Modeling and Analysis
  • Simulation Techniques and Applications
  • Advanced Authentication Protocols Security
  • Peer-to-Peer Network Technologies

University of Campania "Luigi Vanvitelli"
2015-2024

Azienda Ospedaliera Universitaria Università degli Studi della Campania Luigi Vanvitelli
2020-2022

University of British Columbia
2021

University of Sannio
2010-2021

Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2021

University of Lisbon
2021

University of Iowa
2021

University of Naples Federico II
2005-2016

Istituto Nazionale di Fisica Nucleare, Sezione di Napoli
2001-2016

Ingegneria dei Trasporti (Italy)
2005

The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According this paradigm, effects Denial Service (DoS) attacks involve not only quality delivered service, but also service maintenance costs in terms resource consumption. Specifically, longer detection delay is, higher be incurred. Therefore, a particular attention has paid for stealthy DoS attacks. They aim at minimizing their visibility, same time, they can as harmful brute-force are...

10.1109/tcc.2014.2325045 article EN IEEE Transactions on Cloud Computing 2014-07-02

The diversity of Cloud computing services is challenging the application developers as various and non-standard interfaces are provided for these services. Few middleware solutions were developed until now to support design, deployment execution service-independent applications well management resources from multiple Clouds. This paper focuses on one advanced solutions, called mOSAIC. Written after completion its development, this presents an integrated overview mOSAIC approach use software...

10.1186/2192-113x-2-12 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2013-01-01

The cloud paradigm appeared on the computing scene in 2005 with Amazon Elastic Compute Cloud (EC2). After this date, a large set of related technologies has been developed. In academic world, and especially HPC area, is some way competition GRID model, which offers middleware based approach. One solutions proposed integration two paradigms, order to use enormous potential existent computational GRIDs new ways. most diffused problems systems choice correct programming paradigm: many different...

10.1109/cisis.2010.143 article EN ˜... œInternational Conference on Complex, Intelligent and Software Intensive Systems 2010-02-01

Cloud computing delegates the management of any kind resources, such as environment or storage systems for example, to network. The wide-spread permeation cloud paradigm implies need new programming models that are able utilize features. Once problem enabling developers manage resources in a clear and flexible way is solved, emerges: monitoring quality acquired services offered final users. As first step, mOSAIC API framework aim at offering solution development interoperable, portable...

10.1109/cloudcom.2011.117 article EN 2011-11-01

The cloud offers attractive options to migrate corporate applications, without any implication for the security manager manage or secure physical resources. While this ease of migration is appealing, several issues arise: can validity legal compliance regulations still be ensured remote data storage? How it possible assess Cloud Service Provider (CSP) ability meet requirements? Can one monitor and enforce agreed levels? Unfortunately, no comprehensive solutions exist these issues. In...

10.1109/cloudcom.2013.165 article EN 2013-12-01

Abstract Companies face increasing pressure to protect themselves and their customers from security threats. Security by design is a proactive approach that builds into all aspects of system the ground up, rather than adding it on as an afterthought. By taking account at every stage development, organizations can create systems are more resistant attacks better able recover them if they do occur. One most relevant practices threat modelling, i.e. process identifying analysing information...

10.1007/s11219-023-09634-4 article EN cc-by Software Quality Journal 2023-05-25

Cross platform APIs for cloud computing are emerging due to the need of application developer combine features exposed by different providers and port codes from one provider environment another. Such allowing nowadays federation clouds an infrastructure level, requiring a certain knowledge programming infrastructure. We describe new approach cross API that encompass all service levels. expect implementation this will offer higher degree portability vendor independence Cloud based applications.

10.5220/0003388101660169 article EN cc-by-nc-nd 2011-01-01

The federation of Cloud resources can be treated at different levels abstractions. In this paper we focus on application programming interfaces for building based applications using services from multiple providers. A full stack APIs is proposed to decouple the development a Cloud-based its deployment and execution. particular attention paid design interoperability API aiming provide language protocol syntax or semantic enforcements.

10.1109/hpcsim.2011.5999853 article EN 2011-07-01

Dealing with the provisioning of cloud services granted by Security SLAs is a very challenging research topic. At state art, main related issues involve: (i) representing security features so that they are understandable both customers and providers measurable (by means verifiable security-related Service Level Objectives (SLOs)), (ii) automating mechanisms able to grant desired security-driven resource allocation process), (iii) continuously monitoring in order verify fulfillment specified...

10.1109/tsc.2016.2540630 article EN IEEE Transactions on Services Computing 2016-03-10

Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679, GDPR) and security assurance are currently two major challenges of Cloud-based systems. GDPR compliance implies both privacy mechanisms definition, enforcement control, including evidence collection. This study presents a novel DevOps framework aimed at supporting Cloud consumers in designing, deploying operating (multi)Cloud systems that include necessary controls for ensuring transparency to...

10.1049/iet-sen.2018.5293 article EN IET Software 2019-02-02
Coming Soon ...