Publications

2017

A Byzantine Fault-tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
João Sousa, Alysson Bessani, Marko Vukolic, SERIAL’17. Las Vegas, USA, December 2017

 

[ More ]

GINJA: One-dollar Cloud-based Disaster Recovery for Databases
Joel Alcântara, Tiago Oliveira, Alysson Bessani, Proceedings of the 2017 ACM/IFIP/USENIX Middleware Conference — Middleware’17. Las Vegas, NV, USA. December 2017.

 

[ More ]

The KISS principle in Software-Defined Networking: a framework for secure communications
Diego Kreutz, Jiangshan Yu, Paulo Esteves-Verissimo, Catia Magalhaes, Fernando M. V. Ramos, IEEE Security and Privacy. October 2017.

 

[ More ]

On the Design of Resilient Multicloud MapReduce
Pedro Costa, Miguel Correia, Fernando Ramos, IEEE Cloud Computing. October 2017.

 

[ More ]

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach
Reda Yaich, Nora Cuppens and Frédéric Cuppens, ARES 2017 (International Conference on Availability, Reliability and Security). August 2017.

 

[ More ]

Firewall Policies Provisioning Through SDN in the Cloud
Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Laparc, Frédéric Cuppens, 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'17), Philadelphia, USA, July 2017.

 

[ More ]

Secure Tera-scale Data Crunching with a Small TCB
Bruno Vavala, Nuno Neves, Peter Steenkiste, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Denver, USA, June 2017.

 

[ More ]

Mantus: Putting Aspects to Work for Flexible Multi-Cloud Deployment
Alex Palesandro, Marc Lacoste, Nadia Bennani, Chirine Ghedira Guegan, Denis Bourge, 10th IEEE International Conference on Cloud Computing (CLOUD), Hawaii, USA, June 2017.

 

[ More ]

Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce
Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia, IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Madrid, Spain, May 2017

 

[ More ]

Secure and Dependable Multi-Cloud Network Virtualization
Max Alaluna, Eric Vial, Nuno Neves, Fernando Ramos, EuroSys 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOM0), Belgrade, Serbia, April 2017

 

[ More ]

SDN-based Dynamic and Adaptive Policy Management System to Mitigate DDoS Attacks
Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar, EuroSys 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures (XDOM0), Belgrade, Serbia, April 2017

 

[ More ]

Somewhat/Fully Homomorphic Encrytion: implementation progress and challenges
Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore, Adeline Roux-Langlois, 2nd International Conference in honor of Professor Claude Carlet, Rabat, Morocco, April 2017

 

[ More ]

Rethinking Permissioned Blockchains
M. Vukolic, BCC 2017 : The First ACM Workshop on Blockchain, Cryptocurrencies and Contracts (BCC’17), Abu Dhabi, UAE, April 2017

 

[ More ]

Secure Virtual Network Embedding in a Multi-Cloud Environment
Max Alaluna, Luís Ferrolho, Jose Rui Figueira, Nuno Neves, Fernando M. V. Ramos, arXiv.org, 03 March 2017

 

[ More ]

Elastic State Machine Replication
Andre Nogueira, Antonio Casimiro, Alysson Bessani, IEEE Transactions on Parallel and Distributed Systems (IEEE T PARALL DISTR), March 2017

2016

Non-determinism in Byzantine Fault-Tolerant Replication
Christian Cachin, Simon Schubert, Marko Vukolic, 20th International Conference On Principles Of DIstributed Systems (OPODIS’16), Madrid, Spain

 

[ More ]

Usage Control Policy Enforcement in SDN-based Clouds: A Dynamic Availability Service Use Case
Khalifa Toumi, Muhammad Idrees Sabir, Fabien Charmet, Reda Yaich, Gregory Blanc, the 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016), Sydney, Australia

 

[ More ]

Hardware/Software co-Design of an Accelerator for FV Homomorphic Encryption Scheme using Karatsuba Algorithm
Vincent Migliore, Maria Méndez Real, Vianney Lapotre, Arnaud Tisserand, Caroline Fontaine, Guy Gogniat, IEEE Transactions on Computers, 2016

 

[ More ]

Overcoming Barriers for Ubiquitous User- Centric Healthcare Services
A. Palesandro, C. G. Guegan, M. Lacoste, N. Bennani, IEEE Cloud Computing, Special Issue on Cloud Computing for Enhanced Living Environments, 2016.

 

[ More ]

Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations
T. Oliveira, R. Mendes and A. Bessani, 20th International Conference On Principles Of DIstributed Systems (OPODIS’16), Madrid, Spain, December 2016.

 

[ More ]

Constant-Size Ciphertext Attribute-based Encryption from Multi-Channel Broadcast Encryption
S. Canard, C. Trinh, Twelth International Conference on Information Systems Security (ICISS 2016), Jaipur, India, December 2016.

 

[ More ]

Verifiable Message-Locked Encryption
S. Canard, F. Laguillaumie, M. Paindavoine, 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 2016.

 

[ More ]

User-Centric Security and Dependability in Cloud of Clouds
M. Lacoste, M. Miettinen, N. Neves, F. Ramos, M. Vukolic, F. Charmet, R. Yaich, K. Obornzynski, G. Vernekar, P. Sousa, IEEE Cloud Computing, Special Issue on Cloud Security, 2016.

 

[ More ]

XFT: Practical Fault Tolerance Beyond Crashes
S. Liu, P. Viotti, C. Cachin, V. Quéma, M. Vukolic, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), Savannah, GA, USA, November 2016.

 

[ More ]

PhishEye: Live Monitoring of Sandboxed Phishing Kits
X. Han, N. Kheir, D. Balzarotti, 23rd ACM conference on Computer and Communications Security (CCS), Vienna, Austria, October 2016.

 

[ More ]

A Novel Proof of Data Possession Scheme based on Set-Homomorphic Operations
N. Kaaniche, M. Laurent, S. Canard, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Verifiable Message-Locked Encryption
S. Canard, F. Laguillaumie, M. Paindavoine, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Towards Management of Chains of Trust for Multi-Clouds with Intel SGX
H. Kanzari, Marc Lacoste, 2nd Workshop on Security in Clouds (SEC2 2016), Lorient, France, July 2016.

 

[ More ]

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Y. Li, N. Cuppens-Boulahia, J.M. Crom, F.Cuppens, V.Frey, 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Ghent, Belgium, May 2016.

 

[ More ]

Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
S.d.Hoogh, B.Schoenmakers, M. Veeningen, Proceedings AFRICACRYPT 2016: International Conference on Cryptology, Morocco, Africa, April 2016.

 

[ More ]

Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants
E.A.P. Alchieri, A. Bessani, F. Greve, J. da Silva Fraga, IEEE Transactions on Dependable and Secure Computing, March 2016.

 

[ More ]

(Literally) above the clouds: virtualizing the network over multiple clouds
M. Alaluna, F. M. V. Ramos, N. Neves, IEEE Conference on Network Softwarization (NetSoft), Seoul, Korea, March 2016.

 

[ More ]

Consensus in a Box: Inexpensive Coordination in Hardware
Z. István, D. Sidler, G. Alonso, M. Vukolić, NSDI 16: 13th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, March 2016.

 

[ More ]

Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
B. Schoenmakers, M. Veeningen, N. de Vreede, Proceedings ACNS 2016, London, UK, January 2016.

 

[ More ]

2015

Similarity Measure for Security Policies in Service Provider Selection
Y. Li, N. Cuppens-Boulahia, J.-M. Crom, F. Cuppens, V. Frey, X. Ji, 11th International Conference on Information Systems Security (ICISS2015), Kolkata, India, December 2015.

 

[ More ]

Towards User-Centric Management of Security and Dependability in Clouds of Clouds
M. Lacoste, F. Charmet, 6th International Conference on E-Democracy, Athens, Greece, December 2015.

 

[ More ]

Separating the WHEAT from the Chaff: An Empirical Design for Georeplicated State Machines
J. Sousa, A. Bessani, The International Symposium on Reliable Distributed Systems, Montreal, Canada, September 2015.

 

[ More ]

The role of cloud services in malicious software: trends and insights?
X. Han, N. Kheir, D. Balzarotti, Paper in proceedings of DIMVA 2015, Milano, Italy, July 2015.

 

[ More ]

How many planet-wide leaders should there be?
S. Liu, M. Vukolic, Distributed Cloud Computing Workshop, Portland, USA, June 2015.

 

[ More ]

Nested Virtualization meets Micro-Hypervisors: Towards a Virtualization Architecture for User-Centric Multi-Clouds
A. Palesandro, M. Lacoste, C. Ghedira-Guegan, N. Bennani, SEC2 2015 (First ComPAS Workshop on Cloud Security), June 2015.

 

[ More ]

Software-Defined Networks: On the Road to the Softwarization of Networking
F. M. V. Ramos, D. Kreutz, P. Veríssimo, Cutter IT Journal, May 2015.

 

[ More ]

On the Consistency of Heterogeneous Composite Objects
A. Bessani, R. Mendes, T. Oliveira, proceedings of the First Workshop on Principles and Practice of Consistency for Distributed Data, March 2015.

 

[ More ]