André Vasconcelos

ORCID: 0000-0003-0038-7199
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Information Technology Governance and Strategy
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Cloud Data Security Solutions
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Big Data and Business Intelligence
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Distributed systems and fault tolerance
  • Software Engineering Techniques and Practices
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Data Quality and Management
  • Cryptography and Data Security
  • FinTech, Crowdfunding, Digital Finance
  • Software Engineering Research
  • Healthcare Operations and Scheduling Optimization
  • ERP Systems Implementation and Impact
  • Digital Transformation in Industry
  • Security and Verification in Computing
  • Semantic Web and Ontologies
  • Construction Project Management and Performance
  • Technology Adoption and User Behaviour

Hospital Braga
2025

Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2010-2024

University of Lisbon
2013-2024

Instituto Superior Técnico
2010-2024

Massachusetts Institute of Technology
2022-2024

Film Independent
2024

Duke Kunshan University
2023

Instituto Politécnico de Lisboa
2007-2021

Institute for Systems Engineering and Computers
2001-2018

Lusíada University of Lisbon
2017

Ineffective data management practices pose serious issues to individuals and companies, e.g., risk of identity theft online exposure. Self-sovereign (SSI) is a new approach that ensures users have full control their personal data. In this work, we alleviate breach user privacy problems by showing how SSI can fit within the context established enterprise access technologies. light recent endeavors, explore use decentralized identifiers, verifiable credentials, blockchains support SSI. We...

10.1109/trustcom50675.2020.00264 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Entrepreneurs, enterprises, and governments are using distributed ledger technology (DLT) as a component of complex information systems, therefore interoperability capabilities required. Interoperating DLTs enable network effects synergies, similarly to the rise Internet, it unlocks full potential technology. However, due novelty area, mechanisms (IMs) still not well understood, is studied in silos. Consequently, choosing proper IM for use case challenging. Our article has three...

10.1145/3564532 article EN Deleted Journal 2022-11-07

A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how currently deployed and used, likely paths of future development.

10.1145/3648607 article EN Communications of the ACM 2024-09-24

<p>The last few years have seen a steep increase in blockchain interoperability research. Most solutions connect public blockchains; hence, the main cross-chain use case is token transfer. By-design platform transparency, tamper-resistance, and auditability make blockchains an infrastructure candidate for Central Bank Digital Currencies (CBDCs), but bridging CBDCs important missing piece general. In this paper, we leverage asset transfer protocol, ODAP/SATP, to define extendable...

10.36227/techrxiv.21809430.v2 preprint EN cc-by-nc-sa 2023-03-27

Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges. On one hand, hacks on bridges led to monetary losses of around 3.1 billion USD, highlighting flaws security models governing interoperability mechanisms and ineffectiveness incident response frameworks. other users bridge operators experience restricted privacy, which broadens potential attack surface. In this paper, we present most comprehensive study date...

10.36227/techrxiv.24595764.v4 preprint EN cc-by-nc-sa 2024-06-03

Thymic tumors are a rare condition that affects both genders equally, typically presenting between the ages of 40 and 70. Although often asymptomatic, they can give rise to paraneoplastic syndromes, with myasthenia gravis being most common. The presentation pure red cell aplasia, however, remains an uncommon manifestation. Thymectomy is primary treatment, but it may not always be sufficient for managing associated immunosuppressive therapy necessary. This case involves 50-year-old, otherwise...

10.7759/cureus.76750 article EN Cureus 2025-01-01

A Hipertensão Arterial Sistêmica é uma doença silenciosa, responsável por um alto índice de morbidade no Brasil e mundo. Nesse sentido, tendo em vista os potenciais agravos à saúde decorrentes do tratamento ineficaz dessa condição, diversas classes fármacos tem sido empregadas como medidas terapêuticas, destacando-se, nesse esteio, inibidores da enzima conversora angiotensina (IECA). contexto, o objetivo deste estudo foi analisar a produção científica acerca dos efeitos colaterais...

10.70164/jmbr.v2i1.507 article PT cc-by-nc-nd Journal of Medical and Biosciences Research. 2025-02-07

Human resource contracting processes depend on trustworthy qualifications (diplomas or certificates) that may be counterfeit falsified and are hard to verify manually. This paper leverages blockchain technology smart contracts, enforce a decentralized verification solution for higher education certificates, e.g., university diplomas. The allows Higher-Education Institutions (HEI) register the certificates they issue in blockchain, recruiting organizations check authenticity integrity of...

10.1109/brains49436.2020.9223305 article EN 2020-09-01

Purpose The complexity of business environments often causes organizations to produce several inconsistent views the same process (BP), leading fragmentation. BP view integration attempts an integrated from different model, facilitating management models. Design/methodology/approach To study trends integration, authors conduct extensive and systematic literature review summarize findings since 1970s. With a starting corpus 918 documents, this survey draws up inventory solutions used in...

10.1108/bpmj-11-2020-0529 article EN Business Process Management Journal 2022-03-31

<p>Blockchain interoperability conflates the need for distributed systems to communicate with third- party without existence of a canonical chain or orchestration layer. As there is not “a rule them all” (due reasons such as performance, privacy, and market forces), these rely on exchanging data value across network boundaries. Interconnected achieve higher than sum their parts, similar how Internet emerged set isolated Local Area Networks (LANs) - and, by force surprising synergies,...

10.36227/techrxiv.23418677.v3 preprint EN cc-by-nc-sa 2023-09-14

Ecosystems of multiple blockchains are now a reality. Multichain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this article, present our contribution minimizing bridge attacks, by monitoring <italic...

10.1109/tr.2023.3336246 article EN IEEE Transactions on Reliability 2023-12-18

The field of blockchain interoperability plays a pivotal role in adoption. Despite these advances, notorious problem persists: the high number and success rate attacks on bridges. We propose Harmonia, framework for building robust, secure, efficient, decentralized cross-chain applications. A main component Harmonia is DendrETH, efficient zero-knowledge proof-based light client. DendrETH mitigates security problems by lowering attack surface relying properties proofs. instance this paper an...

10.36227/techrxiv.170327806.66007684/v1 preprint EN cc-by 2023-12-22

Enabling blockchain-based digital asset exchanges requires blockchain interoperability capabilities. Although some solutions have been proposed in recent years, and crypto-currency transfers across legal jurisdictions are still an unsolved problem. To realize this vision, we propose Hermes, a fault-tolerant middleware that connects networks, enabling the transfer of data value jurisdictions. Hermes is based on Open Digital Asset Protocol (ODAP), protocol. utilizes novel mechanism called...

10.1109/scc53864.2021.00062 article EN 2021-09-01

&lt;p&gt;Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging research area, we recently have witnessed many attacks that caused billions dollars in losses. Attacks against bridges connect chains at the top such terms monetary cost, no apparent solution seems emerge from ongoing chaos. &lt;/p&gt; &lt;p&gt;In this paper, present our contribution...

10.36227/techrxiv.20718058.v2 preprint EN cc-by-nc-sa 2023-01-24

&lt;p&gt;Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this paper, present our contribution minimizing bridge attacks, by monitoring &lt;em&gt;cross-chain model&lt;/em&gt;....

10.36227/techrxiv.20718058.v3 preprint EN cc-by-nc-sa 2023-11-29

&lt;p&gt;Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges when it comes to security and privacy. Hacks on bridges led monetary losses of around 3 billion USD, highlighting flaws models governing interoperability mechanisms (IMs) ineffectiveness incident response frameworks. Additionally, exploration privacy within scenarios remains relatively unexplored. Hackers benefit from extensive privacy, whereas users...

10.36227/techrxiv.24595764 preprint EN cc-by 2023-11-29

&lt;p&gt;Distributed ledger technology (DLT) provides decentralized and tamper-resistant data storage, replicated among mutually untrusting participants. With the advancement of this technology, different privacy-preserving blockchains have been proposed, such as Corda, Hyperledger Fabric, Digital Asset's Canton. These distributed ledgers only provide \emph{partial consistency}, which implies that participants can view same differently. &lt;/p&gt; &lt;p&gt;A \emph{view} represents states a...

10.36227/techrxiv.20025857 preprint EN cc-by-nc-sa 2022-06-09

Decentralized ledger technology (DLT) is becoming ubiquitous in today’s society. However, organizations need to connect their existing systems and processes blockchains (centralized, decentralized) securely reliably, sometimes also implying that they (decentralized, decentralized). This challenge known as blockchain interoperability. We put the case forward academia industry must propose evaluation frameworks for interoperability solutions address three modes. Those are data transfers, asset...

10.36227/techrxiv.17093039.v5 preprint EN cc-by-nc-sa 2024-04-02

In order to continuously improve its knowledge and identify problems possible solutions, an organization requires understanding of the way business is aligned with organizational strategy how information systems are supporting business. The paper presents a framework for describing associating concepts at multiple levels detail using three separate areas concerns: goals strategy, processes, systems. presented as extension Unified Modeling Language (UML) standard UML Profile. illustrated by...

10.1109/edoc.2001.950424 article EN 2002-11-13
Coming Soon ...