Rafael Belchior

ORCID: 0000-0002-4630-0688
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Distributed systems and fault tolerance
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Security and Verification in Computing
  • FinTech, Crowdfunding, Digital Finance
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Mobile Crowdsensing and Crowdsourcing
  • Business Process Modeling and Analysis
  • Banking stability, regulation, efficiency
  • Spam and Phishing Detection
  • Elevator Systems and Control
  • Service-Oriented Architecture and Web Services
  • Infrastructure Maintenance and Monitoring
  • Access Control and Trust
  • Software System Performance and Reliability
  • Digital Transformation in Industry
  • Information and Cyber Security
  • Big Data and Business Intelligence
  • Advanced Data Storage Technologies
  • Smart Grid Security and Resilience

Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2020-2024

University of Lisbon
2019-2024

Massachusetts Institute of Technology
2022-2024

Instituto Superior Técnico
2022-2024

Film Independent
2024

Duke Kunshan University
2023

Block Engineering (United States)
2023

Instituto Politécnico de Lisboa
2019-2021

Ineffective data management practices pose serious issues to individuals and companies, e.g., risk of identity theft online exposure. Self-sovereign (SSI) is a new approach that ensures users have full control their personal data. In this work, we alleviate breach user privacy problems by showing how SSI can fit within the context established enterprise access technologies. light recent endeavors, explore use decentralized identifiers, verifiable credentials, blockchains support SSI. We...

10.1109/trustcom50675.2020.00264 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Entrepreneurs, enterprises, and governments are using distributed ledger technology (DLT) as a component of complex information systems, therefore interoperability capabilities required. Interoperating DLTs enable network effects synergies, similarly to the rise Internet, it unlocks full potential technology. However, due novelty area, mechanisms (IMs) still not well understood, is studied in silos. Consequently, choosing proper IM for use case challenging. Our article has three...

10.1145/3564532 article EN Deleted Journal 2022-11-07

A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how currently deployed and used, likely paths of future development.

10.1145/3648607 article EN Communications of the ACM 2024-09-24

It is time for the legacy financial infrastructure to seamlessly connect with modern, decentralized infrastructure. Although it increasingly evident that finance (namely distributed ledgers) will coexist and complement infrastructure, also clear such interoperability efforts carry new risks concerns. In particular, managing range of heterogeneous (and not well-established) brings security, privacy, regulatory issues. The first step overcome some these challenges recognize in many deployment...

10.48550/arxiv.2501.17732 preprint EN arXiv (Cornell University) 2025-01-29

<p>The last few years have seen a steep increase in blockchain interoperability research. Most solutions connect public blockchains; hence, the main cross-chain use case is token transfer. By-design platform transparency, tamper-resistance, and auditability make blockchains an infrastructure candidate for Central Bank Digital Currencies (CBDCs), but bridging CBDCs important missing piece general. In this paper, we leverage asset transfer protocol, ODAP/SATP, to define extendable...

10.36227/techrxiv.21809430.v2 preprint EN cc-by-nc-sa 2023-03-27

Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges. On one hand, hacks on bridges led to monetary losses of around 3.1 billion USD, highlighting flaws security models governing interoperability mechanisms and ineffectiveness incident response frameworks. other users bridge operators experience restricted privacy, which broadens potential attack surface. In this paper, we present most comprehensive study date...

10.36227/techrxiv.24595764.v4 preprint EN cc-by-nc-sa 2024-06-03

The maturing of blockchain technology leads to heterogeneity, where multiple solutions specialize in a particular use case. While the development different networks shows great potential for blockchains, isolated have led data and asset silos, limiting applications this technology. Blockchain interoperability are essential enable distributed ledgers reach their full potential. Such allow blockchains support transfer, resulting innovative applications. This paper proposes novel solution...

10.48550/arxiv.2101.12331 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Purpose The complexity of business environments often causes organizations to produce several inconsistent views the same process (BP), leading fragmentation. BP view integration attempts an integrated from different model, facilitating management models. Design/methodology/approach To study trends integration, authors conduct extensive and systematic literature review summarize findings since 1970s. With a starting corpus 918 documents, this survey draws up inventory solutions used in...

10.1108/bpmj-11-2020-0529 article EN Business Process Management Journal 2022-03-31

<p>Blockchain interoperability conflates the need for distributed systems to communicate with third- party without existence of a canonical chain or orchestration layer. As there is not “a rule them all” (due reasons such as performance, privacy, and market forces), these rely on exchanging data value across network boundaries. Interconnected achieve higher than sum their parts, similar how Internet emerged set isolated Local Area Networks (LANs) - and, by force surprising synergies,...

10.36227/techrxiv.23418677.v3 preprint EN cc-by-nc-sa 2023-09-14

Ecosystems of multiple blockchains are now a reality. Multichain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this article, present our contribution minimizing bridge attacks, by monitoring <italic...

10.1109/tr.2023.3336246 article EN IEEE Transactions on Reliability 2023-12-18

The field of blockchain interoperability plays a pivotal role in adoption. Despite these advances, notorious problem persists: the high number and success rate attacks on bridges. We propose Harmonia, framework for building robust, secure, efficient, decentralized cross-chain applications. A main component Harmonia is DendrETH, efficient zero-knowledge proof-based light client. DendrETH mitigates security problems by lowering attack surface relying properties proofs. instance this paper an...

10.36227/techrxiv.170327806.66007684/v1 preprint EN cc-by 2023-12-22

Enabling blockchain-based digital asset exchanges requires blockchain interoperability capabilities. Although some solutions have been proposed in recent years, and crypto-currency transfers across legal jurisdictions are still an unsolved problem. To realize this vision, we propose Hermes, a fault-tolerant middleware that connects networks, enabling the transfer of data value jurisdictions. Hermes is based on Open Digital Asset Protocol (ODAP), protocol. utilizes novel mechanism called...

10.1109/scc53864.2021.00062 article EN 2021-09-01

&lt;p&gt;Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging research area, we recently have witnessed many attacks that caused billions dollars in losses. Attacks against bridges connect chains at the top such terms monetary cost, no apparent solution seems emerge from ongoing chaos. &lt;/p&gt; &lt;p&gt;In this paper, present our contribution...

10.36227/techrxiv.20718058.v2 preprint EN cc-by-nc-sa 2023-01-24

&lt;p&gt;Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this paper, present our contribution minimizing bridge attacks, by monitoring &lt;em&gt;cross-chain model&lt;/em&gt;....

10.36227/techrxiv.20718058.v3 preprint EN cc-by-nc-sa 2023-11-29

&lt;p&gt;Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges when it comes to security and privacy. Hacks on bridges led monetary losses of around 3 billion USD, highlighting flaws models governing interoperability mechanisms (IMs) ineffectiveness incident response frameworks. Additionally, exploration privacy within scenarios remains relatively unexplored. Hackers benefit from extensive privacy, whereas users...

10.36227/techrxiv.24595764 preprint EN cc-by 2023-11-29

&lt;div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Decentralized ledger technology (DLT), in particular blockchain, is becoming ubiquitous today's society. Just the second quarter of 2021, centralized and decentralized exchanges had a volume around $600 billion. Enterprises are adopting this technology, following opportunity to expand new businesses. However, they need connect their existing systems processes blockchains securely reliably. Blockchain interoperability (BI) emerging as one...

10.36227/techrxiv.17093039.v2 preprint EN cc-by-nc-sa 2021-12-16

&lt;p&gt;Distributed ledger technology (DLT) provides decentralized and tamper-resistant data storage, replicated among mutually untrusting participants. With the advancement of this technology, different privacy-preserving blockchains have been proposed, such as Corda, Hyperledger Fabric, Digital Asset's Canton. These distributed ledgers only provide \emph{partial consistency}, which implies that participants can view same differently. &lt;/p&gt; &lt;p&gt;A \emph{view} represents states a...

10.36227/techrxiv.20025857 preprint EN cc-by-nc-sa 2022-06-09

Blockchain aggregators play an instrumental role in the evolution of blockchain technology, serving as pivotal enablers interoperability, efficiency, and user accessibility increasingly decentralized digital world. However, literature on this emerging technology is scarce not systematized, making it harder for practitioners researchers to understand field. In paper, we systematize aggregators, with a specific emphasis bridge aggregators. We present exhaustive analysis diverse array token...

10.36227/techrxiv.170492248.87354060/v1 preprint EN cc-by-nc-sa 2024-01-10

Decentralized ledger technology (DLT) is becoming ubiquitous in today’s society. However, organizations need to connect their existing systems and processes blockchains (centralized, decentralized) securely reliably, sometimes also implying that they (decentralized, decentralized). This challenge known as blockchain interoperability. We put the case forward academia industry must propose evaluation frameworks for interoperability solutions address three modes. Those are data transfers, asset...

10.36227/techrxiv.17093039.v5 preprint EN cc-by-nc-sa 2024-04-02

&lt;div&gt;The emergence of blockchain interoperability is reducing the risk investing in by avoiding vendor lock-in, leveraging interoperation, and providing migration capabilities. However, to fully unlock internet blockchains, it necessary provide enterprise mechanisms that allow service providers comply with different regulations, e.g., data privacy regulations. Each can be reached via a gateway, allowing interconnect value, services, enable self-sovereignty. To realize this vision, we...

10.36227/techrxiv.14120291.v1 preprint EN cc-by-nc-sa 2021-03-03
Coming Soon ...