- Blockchain Technology Applications and Security
- Information Technology Governance and Strategy
- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Cloud Data Security Solutions
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Big Data and Business Intelligence
- Advanced Software Engineering Methodologies
- Software System Performance and Reliability
- Distributed systems and fault tolerance
- Software Engineering Techniques and Practices
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Data Quality and Management
- Cryptography and Data Security
- FinTech, Crowdfunding, Digital Finance
- Software Engineering Research
- Healthcare Operations and Scheduling Optimization
- ERP Systems Implementation and Impact
- Digital Transformation in Industry
- Security and Verification in Computing
- Semantic Web and Ontologies
- Construction Project Management and Performance
- Technology Adoption and User Behaviour
Hospital Braga
2025
Instituto de Engenharia de Sistemas e Computadores Investigação e Desenvolvimento
2010-2024
University of Lisbon
2013-2024
Instituto Superior Técnico
2010-2024
Massachusetts Institute of Technology
2022-2024
Film Independent
2024
Duke Kunshan University
2023
Instituto Politécnico de Lisboa
2007-2021
Institute for Systems Engineering and Computers
2001-2018
Lusíada University of Lisbon
2017
Ineffective data management practices pose serious issues to individuals and companies, e.g., risk of identity theft online exposure. Self-sovereign (SSI) is a new approach that ensures users have full control their personal data. In this work, we alleviate breach user privacy problems by showing how SSI can fit within the context established enterprise access technologies. light recent endeavors, explore use decentralized identifiers, verifiable credentials, blockchains support SSI. We...
Entrepreneurs, enterprises, and governments are using distributed ledger technology (DLT) as a component of complex information systems, therefore interoperability capabilities required. Interoperating DLTs enable network effects synergies, similarly to the rise Internet, it unlocks full potential technology. However, due novelty area, mechanisms (IMs) still not well understood, is studied in silos. Consequently, choosing proper IM for use case challenging. Our article has three...
A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how currently deployed and used, likely paths of future development.
<p>The last few years have seen a steep increase in blockchain interoperability research. Most solutions connect public blockchains; hence, the main cross-chain use case is token transfer. By-design platform transparency, tamper-resistance, and auditability make blockchains an infrastructure candidate for Central Bank Digital Currencies (CBDCs), but bridging CBDCs important missing piece general. In this paper, we leverage asset transfer protocol, ODAP/SATP, to define extendable...
Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges. On one hand, hacks on bridges led to monetary losses of around 3.1 billion USD, highlighting flaws security models governing interoperability mechanisms and ineffectiveness incident response frameworks. other users bridge operators experience restricted privacy, which broadens potential attack surface. In this paper, we present most comprehensive study date...
Thymic tumors are a rare condition that affects both genders equally, typically presenting between the ages of 40 and 70. Although often asymptomatic, they can give rise to paraneoplastic syndromes, with myasthenia gravis being most common. The presentation pure red cell aplasia, however, remains an uncommon manifestation. Thymectomy is primary treatment, but it may not always be sufficient for managing associated immunosuppressive therapy necessary. This case involves 50-year-old, otherwise...
A Hipertensão Arterial Sistêmica é uma doença silenciosa, responsável por um alto índice de morbidade no Brasil e mundo. Nesse sentido, tendo em vista os potenciais agravos à saúde decorrentes do tratamento ineficaz dessa condição, diversas classes fármacos tem sido empregadas como medidas terapêuticas, destacando-se, nesse esteio, inibidores da enzima conversora angiotensina (IECA). contexto, o objetivo deste estudo foi analisar a produção científica acerca dos efeitos colaterais...
Human resource contracting processes depend on trustworthy qualifications (diplomas or certificates) that may be counterfeit falsified and are hard to verify manually. This paper leverages blockchain technology smart contracts, enforce a decentralized verification solution for higher education certificates, e.g., university diplomas. The allows Higher-Education Institutions (HEI) register the certificates they issue in blockchain, recruiting organizations check authenticity integrity of...
Purpose The complexity of business environments often causes organizations to produce several inconsistent views the same process (BP), leading fragmentation. BP view integration attempts an integrated from different model, facilitating management models. Design/methodology/approach To study trends integration, authors conduct extensive and systematic literature review summarize findings since 1970s. With a starting corpus 918 documents, this survey draws up inventory solutions used in...
<p>Blockchain interoperability conflates the need for distributed systems to communicate with third- party without existence of a canonical chain or orchestration layer. As there is not “a rule them all” (due reasons such as performance, privacy, and market forces), these rely on exchanging data value across network boundaries. Interconnected achieve higher than sum their parts, similar how Internet emerged set isolated Local Area Networks (LANs) - and, by force surprising synergies,...
Ecosystems of multiple blockchains are now a reality. Multichain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this article, present our contribution minimizing bridge attacks, by monitoring <italic...
The field of blockchain interoperability plays a pivotal role in adoption. Despite these advances, notorious problem persists: the high number and success rate attacks on bridges. We propose Harmonia, framework for building robust, secure, efficient, decentralized cross-chain applications. A main component Harmonia is DendrETH, efficient zero-knowledge proof-based light client. DendrETH mitigates security problems by lowering attack surface relying properties proofs. instance this paper an...
Enabling blockchain-based digital asset exchanges requires blockchain interoperability capabilities. Although some solutions have been proposed in recent years, and crypto-currency transfers across legal jurisdictions are still an unsolved problem. To realize this vision, we propose Hermes, a fault-tolerant middleware that connects networks, enabling the transfer of data value jurisdictions. Hermes is based on Open Digital Asset Protocol (ODAP), protocol. utilizes novel mechanism called...
<p>Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging research area, we recently have witnessed many attacks that caused billions dollars in losses. Attacks against bridges connect chains at the top such terms monetary cost, no apparent solution seems emerge from ongoing chaos. </p> <p>In this paper, present our contribution...
<p>Ecosystems of multiple blockchains are now a reality. Multi-chain applications and protocols perceived as necessary to enable scalability, privacy, composability. Despite being promising emerging area, we have been witnessing devastating attacks on cross-chain bridges that caused billions dollars in losses, no apparent solution seems emerge from the ongoing chaos. In this paper, present our contribution minimizing bridge attacks, by monitoring <em>cross-chain model</em>....
<p>Recent years have witnessed significant advancements in cross-chain technology. However, the field faces two pressing challenges when it comes to security and privacy. Hacks on bridges led monetary losses of around 3 billion USD, highlighting flaws models governing interoperability mechanisms (IMs) ineffectiveness incident response frameworks. Additionally, exploration privacy within scenarios remains relatively unexplored. Hackers benefit from extensive privacy, whereas users...
<p>Distributed ledger technology (DLT) provides decentralized and tamper-resistant data storage, replicated among mutually untrusting participants. With the advancement of this technology, different privacy-preserving blockchains have been proposed, such as Corda, Hyperledger Fabric, Digital Asset's Canton. These distributed ledgers only provide \emph{partial consistency}, which implies that participants can view same differently. </p> <p>A \emph{view} represents states a...
Decentralized ledger technology (DLT) is becoming ubiquitous in today’s society. However, organizations need to connect their existing systems and processes blockchains (centralized, decentralized) securely reliably, sometimes also implying that they (decentralized, decentralized). This challenge known as blockchain interoperability. We put the case forward academia industry must propose evaluation frameworks for interoperability solutions address three modes. Those are data transfers, asset...
In order to continuously improve its knowledge and identify problems possible solutions, an organization requires understanding of the way business is aligned with organizational strategy how information systems are supporting business. The paper presents a framework for describing associating concepts at multiple levels detail using three separate areas concerns: goals strategy, processes, systems. presented as extension Unified Modeling Language (UML) standard UML Profile. illustrated by...