Short Courses of the 22nd Brazilian Symposium on Information and Computational Systems Security

Authors

Carlos Raniery Paula dos Santos (ed)
UFSM
Walter Priesnitz Filho (ed)
UFSM
Paulo André da Silva Gonçalves (ed)
UFPE
Marcia Henke (ed)
UFSM

Keywords:

Information Security, Computational Systems, SBSeg 2022 Short Courses, SBSeg 2022

Synopsis

The Short Courses Book of the 22nd Brazilian Symposium on Information and Computational Systems Security (SBSeg 2022) brings the written version of the proposals accepted and presented in this edition of SBSeg. In the SBSeg's short courses, there is practical and cute-edge knowledge in the cybersecurity area, thus we have more applied and more theoretical short courses in this edition of SBSeg. The 4 chapters of the short courses book deal with topics such as: Authentication and Authorization: old demands, new challenges, and emerging technologies; Providing Security in Smart Cities: Applications, Challenges and Trends in Electric Mobility and Smart Pricing with NFTs; Introduction to Malicious Code Analysis for Windows environment; and Securing Computer Networks in the Era of the Programmable Data Plane. These chapters aim to update the professional’s knowledge of who already works in cybersecurity and provide students with content not normally covered in courses in the area.

Chapters

  • 1. Autenticação e Autorização: antigas demandas, novos desafios e tecnologias emergentes
    Emerson Ribeiro de Mello, Shirlei Aparecida de Chaves, Carlos Eduardo da Silva, Michelle Silva Wangham, Andrey Brito, Marco Aurélio Amaral Henriques
  • 2. Provendo Segurança em Cidades Inteligentes: Aplicações, Desafios e Tendências em Mobilidade Elétrica e Tarifação Inteligente com NFTs
    Paulo Mann, Guilherme Scofano, Yona Lopes, Helio N. Cunha Neto, Diogo M. F. Mattos, Natalia C. Fernandes
  • 3. Introdução à Análise de Códigos Maliciosos para ambiente Windows
    Renato Marinho, Mateus Santos, Raimir Holanda, Antonio Horta
  • 4. Protegendo Redes de Computadores na era do Plano de Dados Programáveis
    Arthur Selle Jacobs, Antônio João Gonçalves de Azambuja, Alberto Egon Schaeffer-Filho, Jéferson Campos Nobre, Juliano Araújo Wickboldt, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Weverton Luis da Costa Cordeiro

Downloads

Download data is not yet available.

References

ACQUISTI, Alessandro et al. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), ACM New York, NY, USA, v. 50, n. 3, p. 1–41, 2017.

ADKINS, Heather et al. Building secure and reliable systems: best practices for designing, implementing, and maintaining systems. First edition. Beijing [China] ; Boston [MA]: O’Reilly, 2020. 519 p. ISBN 9781492083122. Disponível em: [link].

ALLAN, Ant. Hype Cycle for Identity and Access Management Technologies. Gartner, jul. 2020. Disponível em: [link]. Acesso em: 5 mai. 2021.

ALLEN, Christopher (Ed.). The Path to Self-Sovereign Identity. Abr. 2016. Disponível em: [link]. Acesso em: 14 mai. 2021.

Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P. e Peacock, A. (2019). Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable Energy Reviews, 100:143–174.

Andriesse, D. (2018). Practical Binary Analysis. No Starch Press.

ANGULO, Julio et al. Towards Usable Privacy Policy Display & Management-The PrimeLife Approach. In: HAISA. 2011. p. 108–118.

ANSI. Role Based Access Control - Policy-Enhanced. 2012. ANSI/INCITS 494-2012.

ANSI. Role Based Access Control. 2004. ANSI/INCITS 359-2004.

Anstee, D., Bussiere, D., Sockrider, G., and Morales, C. (2017). Worldwide infrastructure security report. Arbor Networks Inc., Westford, MA, USA.

Ante, L. (2022). The Non-Fungible Token (NFT) market and its relationship with Bitcoin and Ethereum. FinTech, 1(3):216–224.

Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., et al. (2017). Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17), pages 1093–1110.

Apolinário, W. d. A. (2019). Implementação de smart contracts e tokens não-fungíveis na geração e aquisição de certificados de energia renovável no brasil. B.S. thesis, Universidade Federal do Rio Grande do Norte.

APPLE. Apple, Google, and Microsoft commit to expanded support for FIDO standard to accelerate availability of passwordless sign-ins. Mai. 2022. Disponível em: [link]. Acesso em: 3 ago. 2022.

Arcenegui, J., Arjona, R., Román, R. e Baturone, I. (2021). Secure combination of IoT and blockchain by physically binding IoT devices to smart non-fungible tokens using PUFs. Sensors, 21(9):3119.

ATHERTON et al. Academic Interfederation into the 2030s. Zenodo, mai. 2022. DOI:10.5281/zenodo.6584587. Disponível em: <https://doi.org/10.5281/zenodo.6584587>.

ATHERTON, Christopher John et al. Federated Identity Management for Research Collaborations. Jun. 2018. DOI: 10.5281/zenodo.1307551. Disponível em: <https://doi.org/10.5281/zenodo.1307551>.

Avizienis, A., Laprie, J.-C., Randell, B., and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing, 1(1):11–33.

BAILEY, Christopher; CHADWICK, David W.; LEMOS, Rogério de. Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, v. 80, n. 5, p. 935–952, 2014. ISSN 0022-0000. DOI: 10.1016/j.jcss.2014.02.003. Disponível em: [link].

BARTH, A. HTTP State Management Mechanism. Abr. 2011. Disponível em: <http://www.rfc-editor.org/rfc/rfc6265.txt>.

BARTH, Susanne; IONITA, Dan; HARTEL, Pieter. Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Comput. Surv., Association for Computing Machinery, New York, NY, USA, v. 55, n. 3, fev. 2022. ISSN 0360-0300. DOI: 10.1145/3502288. Disponível em: <https://doi.org/10.1145/3502288>.

BASNEY, Jim et al. CILogon: Enabling federated identity and access management for scientific collaborations. English (US). Proceedings of Science, Sissa Medialab Srl, v. 351, 2019. ISSN 1824-8039. DOI: 10.22323/1.351.0031.

Beckett, R., Gupta, A., Mahajan, R., and Walker, D. (2017). A general approach to network configuration verification. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pages 155–168.

Beeple, C. (2021). Everydays: The first 5000 days. [link]. Acessado em 24 de agosto de 2022.

Benet, J. (2014). IPFS-content addressed, versioned, P2P file system - Draft 3. arXiv preprint arXiv:1407.3561, p. 1–11.

Benson, T. A. (2019). In-network compute: Considered armed and dangerous. In Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS ’19, pages 216–224, New York, NY, USA. ACM.

Bhuyan, M. H., Bhattacharyya, D., and Kalita, J. K. (2015). An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection. Pattern Recognition Letters, 51:1–7.

Bianco, D. (2022). Pirâmide da dor. [link].

Birnfeld, K., da Silva, D. C., Cordeiro, W., and de França, B. B. N. (2020). P4 switch code data flow analysis: Towards stronger verification of forwarding plane software. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, pages 1–8.

Bloomberg (2022). Nvidia game card prices fall along with crypto mining demand. [link]. Acessado em 26 de agosto de 2022. Disponível em [link]. Acessado em 01/09/2022

Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., et al. (2014a). P4: Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review, 44(3):87–95.

Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., et al. (2014b). P4: Programming protocol-independent packet processors. 44 (3): 87–95, july 2014.

Bosshart, P., Gibb, G., Kim, H.-S., Varghese, G., McKeown, N., Izzard, M., Mujica, F., and Horowitz, M. (2013). Forwarding metamorphosis: Fast programmable match-action processing in hardware for sdn. ACM SIGCOMM Computer Communication Review, 43(4):99–110.

Botacin, M. F., Geus, P. L., and Grégio, A. R. A. (2018). The other guys: automated analysis of marginalized malware. Journal of Computer Virology and Hacking Techniques, 14(1):87–98.

Boutaba, R. and Aib, I. (2007). Policy-based management: A historical perspective. Journal of Network and Systems Management, 15(4):447–480.

BRADLEY, John et al. (Ed.). Client to Authenticator Protocol (CTAP). Jun. 2021.

BRAMHALL, Susan et al. CAS Protocol 3.0 Specification. Dez. 2017. Disponível em: [link]. Acesso em: 3 ago. 2022.

BRASIL. Lei nº 13.709, de 14 de agosto de 2018. Diário Oficial da República Federativa do Brasil, Brasília, DF, 14 ago. 2018. Disponível em: [link]. Acesso em: 28 mai. 2021.

BROEDER, Daan et al. Federated Identity Management for Research Collaborations. Geneva, abr. 2012. CERN-OPEN-2012-006. Disponível em: <https://cds.cern.ch/record/1442597>.

Browne, R. (2021). Visa jumps into the NFT craze, buying a ‘CryptoPunk’ for $150,000. [link]. Acessado em 24 de agosto de 2022.

Brum, H. B. (2022). Um método para coleta dinâmica e eficiente de estatísticas em redes programáveis.

CABARCOS, Patricia; KRUPITZER, Christian; BECKER, Christian. A Survey on Adaptive Authentication. ACM Computing Surveys, v. 52, p. 1–30, set. 2019. DOI: 10.1145/3336117.

CAMERON, Kim. The Laws of Identity. 2005. Disponível em: [link]. Acesso em: 28 fev. 2022.

CAPPELLI, Dawn; MOORE, Andrew; TRZECIAK, Randall. The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Upper Saddle River, NJ: Addison-Wesley, 2012. 389 p. (The Sei seriesin software engineering). OCLC: ocn752067994. ISBN 9780321812575.

Carbon Credits (2021). The ultimate guide to understanding carbon credits. https://carboncredits.com/the-ultimate-guide-to-understanding-carbon-credits/. Acessado em 31 de agosto de 2022.

Carey, S. (2017). Why a single failed router can ground a thousand flights. The Wall Street Journal.

Carvey, H. (2014). Windows Forensic Analysis Toolkit. Syngress.

Castanheira, L., Schaeffer-Filho, A., and Benson, T. A. (2019). P4-intel: Bridging the gap between icf diagnosis and functionality. In Proceedings of the 1st ACM CoNEXT Workshop on Emerging In-Network Computing Paradigms, ENCP ’19, page 21–26, New York, NY, USA. Association for Computing Machinery.

CAVOUKIAN, Ann. Privacy by Design: The 7 Foundational Principles. Ago. 2009. Information and Privacy Commissioner of Ontario. Disponível em: [link]. Acesso em: 3 ago. 2022.

CHAGAS, M. et al. SM4VO: A Security Management Mechanism for Virtual Organizations. 2019 9th Latin-American Symposium on Dependable Computing (LADC), p. 1–10, 2019. DOI: 10.1109/LADC48089.2019.8995732.

Chainlink (2022a). Chainlink. https://chain.link/. Acessado em 27 de agosto de 2022.

Chainlink (2022b). New report highlights how blockchains and oracles are redefining the energy industry. [link]. Acessado em 31 de agosto de 2022.

Charikar, M., Chen, K., and Farach-Colton, M. (2002). Finding frequent items in data streams. In International Colloquium on Automata, Languages, and Programming, pages 693–703. Springer.

Che, T. (2021). The world’s 1st destroyed diamond NFT: Who, what, when, where, why & how. [link]. Acessado em 23 de agosto de 2022.

Chow, M., Meisner, D., Flinn, J., Peek, D., and Wenisch, T. F. (2014). The mystery machine: End-to-end performance analysis of large-scale internet services. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pages 217–231, Broomfield, CO. USENIX Association.

CiscoNetworks (2017). Cisco ios netflow. In Accessed on June, 29 2017.

CoinTelegraph Research (2021). Blockchains vie for NFT market, but Ethereum still dominates. [link]. Acessado em 24 de agosto de 2022.

Craven, R., Lobo, J., Lupu, E., Russo, A., and Sloman, M. (2011). Policy refinement: Decomposition and operationalization for dynamic domains. In 2011 7th International Conference on Network and Service Management, pages 1–9. IEEE.

da Silva, A. S., Smith, P., Mauthe, A., and Schaeffer-Filho, A. (2015). Resilience support in software-defined networking: A survey. Computer Networks, 92:189–207.

Dang, B., Gazet, A., Bachaalany, E., and Josse, S. (2014). Practical Reverse Engineering. Wiley.

Dang, H. T., Canini, M., Pedone, F., and Soulé, R. (2016). Paxos made switch-y. SIGCOMM Comput. Commun. Rev., 46(2):18–24.

DASGUPTA, Dipankar; ROY, Arunava; NAG, Abhijit. Multi-Factor Authentication. In: ADVANCES in User Authentication. Cham: Springer International Publishing, 2017. p. 185–233. ISBN 978-3-319-58808-7. DOI: 10.1007/978-3-319-58808-7_5. Disponível em: <https://doi.org/10.1007/978-3-319-58808-7_5>.

Digiconomist (2022). Ethereum energy consumption index. [link]. Acessado em 26 de agosto de 2022.

Dobrescu, M. and Argyraki, K. (2014). Software dataplane verification. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 101–114, Seattle, WA. USENIX Association.

Dowling, M. (2022). Is non-fungible token pricing driven by cryptocurrencies? Finance Research Letters, 44:102097.

DUNPHY, Paul; PETITCOLAS, Fabien AP. A first look at identity management schemes on the blockchain. IEEE security & privacy, IEEE, v. 16, n. 4, p. 20–29, 2018.

Ethereum.org (2022). Ethereum energy consumption. [link]. Acessado em 26 de agosto de 2022.

Etherscan (2021a). Transação de compra do diamante no Ethereum. [link]. Acessado em 23 de agosto de 2022.

Etherscan (2021b). Transação de compra do Nyan Cat no Ethereum. [link]. Acessado em 24 de agosto de 2022.

FALCÃO, Eduardo et al. Autenticando aplicações nativas da nuvem com identidades SPIFFE. In: MINICURSOS XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. 2021. p. 100–144.

Feferman, D. L., Mejia, J. S., Saraiva, N., and Rothenberg, C. E. (2018). Uma nova revolucao em redes: Programacao do plano de dados com p4. Escola Regional de Informátiva do Piauí (ERIPI), Teresina, Brazil.

FELDMAN, Daniel et al. Solving the Bottom Turtle: a SPIFFE way to establish trust in your infrastructure via universal identity. 2020. ISBN 978-0-578-77737-5. Disponível em: thebottomturtle.io.

Fernandes, E. L. and Rothenberg, C. E. (2014). Openflow 1.3 software switch. Salao de Ferramentas do XXXII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribu?dos SBRC, pages 1021–1028.

FERRAIOLO, David F.; KUHN, D. Richard. Future directions in role-based access control. In: THE FIRST ACM WORKSHOP. Proceedings of the first ACM Workshop on Role-based access control - RBAC ’95. Gaithersburg, Maryland, United States: ACM Press, 1996. 8–es. ISBN 9780897917599. DOI: 10.1145/270152.270165. Disponível em: <http://portal.acm.org/citation.cfm?doid=270152.270165>. Acesso em: 12 ago. 2022.

FIDO. How FIDO Addresses a Full Range of Use Cases. Mar. 2022. Disponível em: [link]. Acesso em: 3 ago. 2022.

FIELDING, R.; NOTTINGHAM, M.; RESCHKE, J. HTTP Semantics. Jun. 2022. Disponível em: <http://www.rfc-editor.org/rfc/rfc9110.txt>.

FIELDING, Roy Thomas. REST: Architectural Styles and the Design of Networkbased Software Architectures. 2000. Doctoral dissertation – University of California, Irvine. Disponível em: [link].

Filecoin (2022). Filecoin. ipns://filecoin.io/. Acessado em 26 de agosto de 2022.

Flow (2022a). Flow. https://flow.com/. Acessado em 26 de agosto de 2022.

Flow (2022b). Sustainability built to be green: Leading web3 to a moreeco-friendly future. https://flow.com/sustainability. Acessado em 26 de agosto de 2022.

FORUM, World Economic. A Blueprint for Digital Identity. 2016. Disponível em: <https://www3.weforum.org/docs/WEF_A_Blueprint_for_Digital_Identity.pdf>.

Fosdick, L. D. and Osterweil, L. J. (2011). Data flow analysis in software reliability. In Engineering of Software, pages 49–85. Springer.

Freire, L., Neves, M., Leal, L., Levchenko, K., Schaeffer-Filho, A., and Barcellos, M. (2018). Uncovering bugs in p4 programs with assertion-based verification. In SOSR, page 4. ACM.

Galante, L., Botacin, M., Grégio, A., and de Geus, P. L. (2018). Malicious linux binaries: A landscape. Anais Estendidos do XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pages 213–222.

Gao, S., Chau, K. T., Liu, C., Wu, D. e Chan, C. C. (2014). Integrated energy management of plug-in electric vehicles in power grid with renewables. IEEE Transactions on Vehicular Technology, 63(7):3019–3027.

Gao, Y., Al-Sarawi, S. F. e Abbott, D. (2020). Physical unclonable functions. Nature Electronics, 3(2):81–91.

Garcia, L. F. U., Villaça, R. S., Ribeiro, M. R., Martins, R. F. T., Verdi, F. L., and Marcondes, C. (2018). Introdução à linguagem p4-teoria e prática. Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC)-Minicursos.

GERADIN, Damien; KATSIFIS, Dimitrios; KARANIKIOTI, Theano. Google as a de facto privacy regulator: Analyzing Chrome’s removal of third-party cookies from an antitrust perspective. TILEC Discussion Paper No. DP2020-034, 2020.

Ghasemi, M., Benson, T., and Rexford, J. (2017). Dapper: Data plane performance diagnosis of tcp. In Proceedings of the Symposium on SDN Research, SOSR ’17, pages 61–74, New York, NY, USA. ACM.

Gil, T. M. and Poletto, M. (2001). {MULTOPS}: A {DataStructure} for bandwidth attack detection. In 10th USENIX Security Symposium (USENIX Security 01).

GOODIN, Dan. Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA. Disponível em: [link]. Acesso em: 3 ago. 2022.

Gourisetti, S. N. G., Ümit Cali, Choo, K.-K. R., Escobar, E., Gorog, C., Lee, A., Lima, C., Mylrea, M., Pasetti, M., Rahimi, F., Reddi, R. e Sani, A. S. (2021). Standardization of the distributed ledger technology cybersecurity stack for power and energy applications. Sustainable Energy, Grids and Networks, 28:100553.

Gragido, W. (2012). Understanding indicators of compromise (ioc) part i. Dostupné z [link], 18(5):2016.

GRASSI, Paul; GARCIA, Michael; FENTON, James. NIST Special Publication 800-63-3 Digital Identity Guidelines. 2020. https://doi.org/10.6028/NIST.SP.800-63-3.

GRIMES, Roger. 12+ ways to hack multi-factor authentication. KnowBe4, 2019. Disponível em: [link]. Acesso em: 3 ago. 2022.

GROUP, World Bank. Principles on identification for sustainable development: toward the digital age - First Edition (English). 2018.

GRÜNER, A. et al. A Comparative Analysis of Trust Requirements in Decentralized Identity Management. Advances in Intelligent Systems and Computing, v. 926, p. 200–213, 2020. ISBN: 9783030150310 Publisher: Springer Verlag. ISSN 21945357. DOI: 10.1007/978-3-030-15032-7_18.

GUIDORIZZI, Richard P. Security: Active Authentication. IT Professional, v. 15, n. 4, p. 4–7, 2013. DOI: 10.1109/MITP.2013.73.

Hamed, H. and Al-Shaer, E. (2006). Taxonomy of conflicts in network security policies. IEEE Communications Magazine, 44(3):134–141.

Haq, O., Abaid, Z., Bhatti, N., Ahmed, Z., and Syed, A. (2015). Sdninspired, real-time botnet detection and flow-blocking at isp and enterprise-level. In 2015 IEEE International Conference on Communications (ICC), pages 5278–5283. IEEE.

HARDT, D. The OAuth 2.0 Authorization Framework. Out. 2012. http://www.rfceditor.org/rfc/rfc6749.txt. Disponível em: [link]. Acesso em: 3 ago. 2022.

HAYASHI, Eiji et al. CASA: Context-Aware Scalable Authentication. In: PROCEEDINGS of the Ninth Symposium on Usable Privacy and Security. Newcastle, United Kingdom: Association for Computing Machinery, 2013. (SOUPS ’13). ISBN 9781450323192. DOI: 10.1145/2501604.2501607. Disponível em: <https://doi.org/10.1145/2501604.2501607>.

Hecht, M. S. (1977). Flow Analysis of Computer Programs. Elsevier Science Inc.

HODGES, Jeff et al. (Ed.). Web Authentication: An API for accessing Public Key Credentials Level 2. Abr. 2021.

HOMOLIAK, Ivan et al. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Computing Surveys, v. 52, n. 2, 30:1–30:40, 2 abr. 2019. ISSN 0360-0300. DOI: 10.1145/3303771. Disponível em: <https://doi.org/10.1145/3303771>. Acesso em: 9 jun. 2022.

Hoque, N., Bhattacharyya, D. K., and Kalita, J. K. (2015). Botnet in ddos attacks: trends and challenges. IEEE Communications Surveys & Tutorials, 17(4):2242–2270.

Horgan, J. R. and London, S. (1991). Data flow coverage and the c language. In Proceedings of the symposium on Testing, analysis, and verification, pages 87–97.

HU, Vincent C. et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Jan. 2014. DOI: 10.6028/NIST.SP.800-162. Disponível em: <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-162.pdf>. Acesso em: 12 ago. 2022.

IBM. Cost of a Data Breach Report 2022. 2022. Disponível em: <https://www.ibm.com/security/data-breach>.

IEC TC 57 (2003-2022). IEC 61850 - communication networks and systems in substations. Relatório técnico, IEC - TC 57 (Technical Committee on Power systems management and associated information exchange).

IEEE Standard for a Software Quality Metrics Methodology. IEEE Std 1061-1998, 1998. DOI: 10.1109/IEEESTD.1998.243394.

ITU. NGN identity management framework. International Telecommunication Union (ITU), 2009. Recommendation Y.2720. Disponível em: <https://www.itu.int/rec/T-RECY.2720-200901-I>.

Jackson, J. (2022). The blockchain projects making renewable energy a reality. [link]. Acessado em 23 de agosto de 2022.

JAKOBSSON, Markus et al. Implicit authentication for mobile devices. In: USENIX ASSOCIATION. PROCEEDINGS of the 4th USENIX conference on Hot topics in security. 2009. v. 1, p. 25–27.

Jepsen, T., Alvarez, D., Foster, N., Kim, C., Lee, J., Moshref, M., and Soulé, R. (2019). Fast string searching on pisa. In Proceedings of the 2019 ACM Symposium on SDN Research, SOSR ’19, page 21â28, New York, NY, USA. Association for Computing Machinery.

Jin, X., Li, X., Zhang, H., Soulé, R., Lee, J., Foster, N., Kim, C., and Stoica, I. (2017). Netcache: Balancing key-value stores with fast in-network caching. SOSP ’17.

JONES, M.; BRADLEY, J.; SAKIMURA, N. (Ed.). Introduction to JSON Web Tokens. Disponível em: <https://jwt.io/introduction/>. Acesso em: 2 jun. 2020.

JØSANG, Audun; ZOMAI, Muhammed Al; SURIADI, Suriadi. Usability and privacy in identity management architectures. In: AUSTRALIAN COMPUTER SOCIETY, INC. PROCEEDINGS of the fifth Australasian symposium on ACSW frontiers-Volume 68. 2007. p. 143–152. Disponível em: <http://dl.acm.org/citation.cfm?id=1274548>.

Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y. e Hossain, E. (2017). Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Transactions on Industrial Informatics, 13(6):3154–3164.

Kang, M. S., Gligor, V. D., Sekar, V., et al. (2016). Spiffy: Inducing cost-detectability tradeoffs for persistent link-flooding attacks. In NDSS, volume 1, pages 53–55.

Karame, G. O. (2012). Two Bitcoins at the price of one? Doublespending attacks on fast payments in Bitcoin. Em In Proc. of Conference on Computer and Communication Security.

Karandikar, N., Chakravorty, A. e Rong, C. (2021). Blockchain based transaction system with fungible and non-fungible tokens for a communitybased energy infrastructure. Sensors, 21(11):3822.

Karger, E., Jagals, M. e Ahlemann, F. (2021). Blockchain for smart mobility—literature review and future research agenda. Sustainability, 13(23):13268.

Kazemian, P. (2017). Network path not found? Forward Networks Blog.

Khurshid, A., Zou, X., Zhou, W., Caesar, M., and Godfrey, P. B. (2013). {VeriFlow}: Verifying {Network-Wide} invariants in real time. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 15–27.

Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., and Irwin, J. (1997). Aspect-oriented programming. In European conference on object-oriented programming, pages 220–242. Springer.

Kim, P. (2018). The Hacker Playbook 3: Practical Guide To Penetration Testing. Independently published.

Kim, Y., Lau, W. C., Chuah, M. C., and Chao, H. J. (2006). Packetscore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE transactions on dependable and secure computing, 3(2):141–155.

Kiong, L. e Xiang, L. (2021). Investing in DeFi and NFT projects on alternative blockchains: A Beginner’s Guide to Investing in DeFi and NFT Projects on Alternative Blockchains other than Ethereum. Liew Voon Kiong.

Kirli, D., Couraud, B., Robu, V., Salgado-Bravo, M., Norbu, S., Andoni, M., Antonopoulos, I., Negrete-Pincetic, M., Flynn, D. e Kiprakis, A. (2022). Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renewable and Sustainable Energy Reviews, 158(112013).

Kleymenov, A. and Thabet, A. (2019). Malware Analysis. Packt Publishing Ltd. Mastering

Krause, M. J. e Tolaymat, T. (2018). Quantification of energy and carbon costs for mining cryptocurrencies. Nature Sustainability, 1(11):711–718.

Kreutz, D., Ramos, F. M., and Verissimo, P. (2013). Towards secure and dependable software-defined networks. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN ’13, pages 55–60, New York, NY, USA. ACM.

Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., and Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1):14–76.

Lakhina, A., Crovella, M., and Diot, C. (2005). Mining anomalies using traffic feature distributions. ACM SIGCOMM computer communication review, 35(4):217–228.

Lapolli, C., Adilson Marques, J., and Gaspary, L. P. (2019). Offloading real-time ddos attack detection to programmable data planes. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pages 19–27.

LAWSON, Bruce et al. HTML 5.3. Jan. 2021. Disponível em: <https://www.w3.org/TR/html53/>. Acesso em: 11 ago. 2022.

LEACH, Paul J.; MEALLING, Michael; SALZ, Rich. A Universally Unique IDentifier (UUID) URN Namespace. Jul. 2005. Disponível em: <https://tools.ietf.org/html/rfc4122>.

Li, W., Rentemeister, M., Badeda, J., Jöst, D., Schulte, D. e Sauer, D. U. (2020). Digital twin for battery systems: Cloud battery management system with online state-of-charge and state-of-health estimation. Journal of Energy Storage, 30:101557.

Liu, C., Zhang, X., Chai, K., Loo, J. e Chen, Y. (2021). A survey on blockchain-enabled smart grids: Advances, applications and challenges. IET Smart Cities, 3:56–78.

Liu, J., Hallahan, W., Schlesinger, C., Sharif, M., Lee, J., Soulé, R., Wang, H., Ca¸scaval, C., McKeown, N., and Foster, N. (2018). P4v: Practical verification for programmable data planes. In ACM SIGCOMM 2018, pages 490–503, New York, NY, USA. ACM.

Liu, S., Feng, P., Wang, S., Sun, K., and Cao, J. (2022). Enhancing malware analysis sandboxes with emulated user behavior. Computers & Security, 115:102613.

Lopes, N. P., Bjørner, N., Godefroid, P., Jayaraman, K., and Varghese, G. (2015). Checking beliefs in dynamic networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pages 499–512, Oakland, CA. USENIX Association.

Lopes, N., Bjørner, N., McKeown, N., Rybalchenko, A., Talayco, D., and Varghese, G. (2016). Automatically verifying reachability and well-formedness in p4 networks. Technical Report, Tech. Rep.

Lopes, Y., Fernandes, N. C. e Muchaluat-Saade, D. C. (2015). Geração Distribuída de Energia: Desafios e Perspectivas em Redes de Comunicação. Em Minicursos do XXXIII SBRC, p. 55–109. SBC.

LÓPEZ, M Allende. Self-sovereign identity: The future of identity: Self-sovereignity, digital wallets, and blockchain. v. 10. 2020. p. 0002635. Disponível em: [link]. Acesso em: 6 ago. 2022.

Lupu, E. C. and Sloman, M. (1999). Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng., 25(6):852–869.

M’RAIHI, D. et al. TOTP: Time-Based One-Time Password Algorithm. Mai. 2011. Disponível em: <http://www.rfc-editor.org/rfc/rfc6238.txt>.

Mace, J. and Fonseca, R. (2018). Universal context propagation for distributed system instrumentation. In Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, pages 8:1–8:18, New York, NY, USA. ACM.

MACHANI, Salah et al. (Ed.). FIDO UAF Architectural Overview. Out. 2020.

MAQBALI, Fatma Al; MITCHELL, Chris J. Web password recovery — a necessary evil? arXiv, 2018. DOI: 10.48550/ARXIV.1801.06730. Disponível em: <https://arxiv.org/abs/1801.06730>.

McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. (2008). Openflow: enabling innovation in campus networks. ACM SIGCOMM computer communication review, 38(2):69–74.

Medeiros, D. S. V., Fernandes, N. C. e Mattos, D. M. F. (2019). Smart Contracts and the Power Grid: A Survey. Em 1st Blockchain, Robotics and AI for Networking Security Conference (BRAINS), p. 140–194.

MELLO, Emerson Ribeiro de; CHAVES, Shirlei Aparecida. O uso do endereço de email pelos sites mais acessados pelo público brasileiro e os possíveis impactos na privacidade de seus usuários. In: XI Computer on the Beach. 2020.

MEREWOOD, Rowan. Cookies SameSite explicados. Mai. 2020. Disponível em: <https://web.dev/samesite-cookies-explained/>. Acesso em: 3 ago. 2022.

MICROSOFT. From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud. Jul. 2022. Disponível em: [link]. Acesso em: 3 ago. 2022.

Mills, A. and Legg, P. (2020). Investigating anti-evasion malware triggers using automated sandbox reconfiguration techniques. Journal of Cybersecurity and Privacy, 1(1):19–39.

Miraz, M. H., Excell, P. S. e Sobayel, K. (2021). The Non-Fungible Token (NFT) market and its relationship with Bitcoin and Ethereum. Annals of Emerging Technologies in Computing (AETiC), 5(4):54–59.

Mirkovic, J., Prier, G., and Reiher, P. (2002). Attacking ddos at the source. In 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pages 312–321. IEEE.

Monnappa, K. A. (2018). Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware. Packt Publishing Ltd.

Morte, A. B., Meira, A., Costa, R. e Mariz, D. (2020). Uma análise sobre o uso de DLTs no tratamento de dados pessoais: Aderência aos princípios e direitos elencados na LGPD. Em Anais do III Workshop em Blockchain: Teoria, Tecnologia e Aplicações, p. 74–87, Porto Alegre, RS, Brasil. SBC.

Moshref, M., Yu, M., and Govindan, R. (2013). Resource/accuracy tradeoffs in software-defined measurement. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 73–78.

Moshref, M., Yu, M., Govindan, R., and Vahdat, A. (2016). Trumpet: Timely and precise triggers in data centers. In Proceedings of the 2016 ACM SIGCOMM Conference, pages 129–143.

Musamih, A., Salah, K., Jayaraman, R., Yaqoob, I., Puthal, D. e Ellahham, S. (2022). NFTs in healthcare: Vision, opportunities, and challenges. IEEE Consumer Electronics Magazine, p. 1–14.

NAKAMURA, Emili Tissato et al. Identidade Digital Descentralizada: conceitos, aplicações, iniciativas, plataforma de desenvolvimento e implementação de caso de uso. In: MINICURSO - SBSeg 2019 - Petrópolis - RJ. 2019. Disponível em: <https://sol.sbc.org.br/livros/index.php/sbc/catalog/view/85/372/636-1>.

Neto, H. N. C., Mattos, D. M. F. e Fernandes, N. C. (2020). Privacidade do usuário em aprendizado colaborativo: Federated learning, da teoria à prática. Em Livro de Minicursos do SBSEG 2020. Sociedade Brasileira de Computação.

Neves, M., Freire, L., Schaeffer-Filho, A., and Barcellos, M. (2018). Verification of p4 programs in feasible time using assertions. In Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT ’18, page 73–85, New York, NY, USA. Association for Computing Machinery.

Neves, M., Huffaker, B., Levchenko, K., and Barcellos, M. (2021). Dynamic property enforcement in programmable data planes. IEEE/ACM Transactions on Networking, 29(4):1540–1552.

NIST. Digital Identity Guidelines. Digital Identity Guidelines: Authentication and Lifecycle Management. National Institute of Standards e Technology, jun. 2017. NIST Special Publication 800-63B. DOI: https://doi.org/10.6028/NIST.SP.800-63b.

NIST. Digital Identity Guidelines. National Institute of Standards e Technology, jun. 2017. NIST Special Publication 800-63-3. DOI: https://doi.org/10.6028/NIST.SP.800-63-3.

Nita, S. L., Mihailescu, M. I. e Pau, V. C. (2018). Security and cryptographic challenges for authentication based on biometrics data. Cryptography, 2(4).

Noether, S., Mackenzie, A. et al. (2016). Ring confidential transactions. Ledger, 1:1–18.

Nofer, M., Gomber, P., Hinz, O. e Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3):183–187.

NOTTINGHAM, M. URI Design and Ownership. Jun. 2020. Disponível em: <https://www.rfc-editor.org/rfc/rfc8820>.

Nova, A. (2021). A token improvement: The rise of non-fungible tokens. https://www.powerledger.io/media/a-token-improvement. Acessado em 29 de agosto de 2022.

Oliveira, M. T., Reis, L. H., Medeiros, D. S., Carrano, R. C., Olabarriaga, S. D. e Mattos, D. M. (2020). Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications. Computer Networks, 179:107367.

OPEN, OASIS. OASIS Security Services (SAML) TC. Disponível em: [link]. Acesso em: 8 ago. 2022.

OPENID. Specifiations. Disponível em: <https://openid.net/developers/specs/>. Acesso em: 8 ago. 2022.

OSTERN, Nadine; CABINAKOVA, Johana. Pre-prototype testing: empirical insights on the expected usefulness of decentralized identity management systems. In: PROCEEDINGS of the 52nd Hawaii International Conference on System Sciences. 2019.

OWENS, Kentrell et al. User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. In: SEVENTEENTH Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, ago. 2021. p. 57–76. ISBN 978-1-939133-25-0. Disponível em: [link]. Acesso em: 9 ago. 2022.

P4.org (2018). Switch. https://github.com/p4lang/switch.

Panda, A., Lahav, O., Argyraki, K., Sagiv, M., and Shenker, S. (2017). Verifying reachability in networks with mutable datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pages 699–718, Boston, MA. USENIX Association.

Pareti, S. e Núñez, I. (2021). Blockchain as an information system in Chile: The case of Open Energy Project - Chilean’s Ministry of Energy. Revista Ibérica de Sistemas e Tecnologias de Informação, 1(E39):554–568.

Peng, T., Leckie, C., and Ramamohanarao, K. (2004). Proactively detecting distributed denial of service attacks using source ip address monitoring. In International conference on research in networking, pages 771–782. Springer.

Phaal, P. (2009). sflow: Sampling rates. In June 2009.

PHILLIPS, Tricia. Hype Cycle for Identity and Access Management Technologies. Gartner, jul. 2021. Disponível em: [link]. Acesso em: 3 ago. 2022.

Platt, M., Sedlmeir, J., Platt, D., Xu, J., Tasca, P., Vadgama, N. e Ibañez, J. I. (2021). The energy footprint of blockchain consensus mechanisms beyondproof-of-work. Em 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), p. 1135–1144.

Poon, J. e Buterin, V. (2017). Plasma: Scalable autonomous smart contracts. Relatório técnico, Plasma.io, https://plasma.io/plasma.pdf.

Poon, J. e Dryja, T. (2016). The Bitcoin lightning network: Scalable off-chain instant payments. Relatório Técnico Draft 0.5.9.2, Bitcoin Lightning, [link].

PREUKSCHAT, Alex; REED, Drummond. Self-sovereign identity. Manning Publications, 2021.

Rapps, S. and Weyuker, E. J. (1985). Selecting software test data using data flow information. IEEE Trans. Softw. Eng., 11(4):367–375.

Rebello, G., Camilo, G., Silva, L., Souza, L., Guimarães, L., Alchieri, E., Greve, F. e Duarte, O. (2019). Correntes de blocos: Algoritmos de consenso e implementaçao na plataforma Hyperledger Fabric. Em Jornada de Atualização em Informática (JAI) - XXXIX Congresso da Sociedade Brasileira de Computação.

RED (2021). Restart energy democracy platform - user guide. Relatório Técnico Version 1.0, RED.

REESE, Ken et al. A Usability Study of Five Two-Factor Authentication Methods. In: FIFTEENTH Symposium on Usable Privacy and Security (SOUPS 2019). Santa Clara, CA: USENIX Association, ago. 2019. p. 357–370. ISBN 978-1-939133-05-2. Disponível em: [link].

RISSANEN, Erik (Ed.). eXtensible Access Control Markup Language (XACML) Version 3.0 Plus Errata 01. Jul. 2017. OASIS Standard incorporating Approved Errata. Disponível em: [link].

ROSE, Scott et al. Zero Trust Architecture. Gaithersburg, MD, 2020. DOI: 10.6028/NIST.SP.800-207. Disponível em: [link].

Rosenfeld, M. et al. (2012). Overview of colored coins. White paper, bitcoil. co. il, 41:94.

Rossi, E. (2022). NFTs for renewable energy certification - a solid use case. [link]. Acessado em 31 de agosto de 2022.

Ruggieri, R., Ruggeri, M., Vinci, G. e Poponi, S. (2021). Electric mobility in a smart city: European overview. Energies, 14(2).

RYU, Riseul et al. Continuous Multimodal Biometric Authentication Schemes: A Systematic Review. IEEE Access, v. 9, p. 34541–34557, 2021. DOI: 10.1109/ACCESS.2021.3061589.

Sahay, S. K., Sharma, A., and Rathore, H. (2020). Evolution of malware and its detection techniques. In Tuba, M., Akashe, S., and Joshi, A., editors, Information and Communication Technology for Sustainable Development, pages 139–150, Singapore. Springer Singapore.

Sahmim, S., Gharsellaoui, H. e Bouamama, S. (2019). Edge computing: Smart identity wallet based architecture and user centric. Procedia Computer Science, 159:1246–1257.

Saingre, D., Ledoux, T. e Menaud, J.-M. (2022). Measuring performances and footprint of blockchains with BCTMark: a case study on Ethereum smart contracts energy consumption. Cluster Computing, 25(4):2819–2837.

SALEM, Malek Ben; HERSHKOP, Shlomo; STOLFO, Salvatore J. A Survey of Insider Attack Detection Research. In: STOLFO, Salvatore J. et al. (Ed.). Insider Attack and Cyber Security. Boston, MA: Springer US, 2008. v. 39. p. 69–90. DOI: 10.1007/978-0-387-77322-3_5. Disponível em: <http://link.springer.com/10.1007/978-0-387-77322-3_5>. Acesso em: 12 ago. 2022.

Sanvito, D., Siracusano, G., and Bifulco, R. (2018). Can the network be the ai accelerator? In Proceedings of the 2018 Morning Workshop on In-Network Computing, NetCompute ’18, page 20-25, New York, NY, USA. Association for Computing Machinery.

Sapio, A., Abdelaziz, I., Aldilaijan, A., Canini, M., and Kalnis, P. (2017). In-network computation is a dumb idea whose time has come. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks, HotNets-XVI, pages 150–156, New York, NY, USA. ACM.

Save Planet Earth (2021). Save planet earth official white paper - the cryptocurrency response to reversing the effects of climate change. Relatório Técnico v4, Save Planet Earth.

SCHAAR, Peter. Privacy by Design. Identity in the Information Society, v. 3, n. 2, p. 267–274, 2010. DOI: 10.1007/s12394-010-0055-x.

SEAMLESSACCESS. SeamlessAccess enables true Single Sign-On. Disponível em: <https://seamlessaccess.org>. Acesso em: 5 mai. 2021.

SERASA. Pesquisa Global de Identidade e Fraude 2021. 2021. Disponível em: [link].

Sflow (2017). sflow.org - making the network visible. In Accessed on June, 29 2017.

Shannon, C. E. (1948). A mathematical theory of communication. The Bell system technical journal, 27(3):379–423.

Sigelman, B. H., Barroso, L. A., Burrows, M., Stephenson, P., Plakal, M., Beaver, D., Jaspan, S., and Shanbhag, C. (2010). Dapper, a large-scale distributed systems tracing infrastructure. Technical report, Google, Inc.

Sikorski, Michael; Honig, A. (2012). Practical malware analysis: the hands on guide to dissecting malicious software. no starch press.

SILVA, Carlos Eduardo da; DINIZ, Thomás et al. Self-adaptive authorisation in OpenStack cloud platform. Journal of Internet Services and Applications, v. 9, n. 1, p. 19, 16 set. 2018. ISSN 1869-0238. DOI: 10.1186/s13174-018-0090-7. Disponível em: <https://doi.org/10.1186/s13174-018-0090-7>.

SILVA, Carlos Eduardo da; MEDEIROS, Welkson Renny de; SAMPAIO, Silvio Costa. PEP4Django - a policy enforcement point for python web applications. In: IX workshop de gestão de identidades digitais (WGID). São Paulo, SP, Brazil, 2019.

SILVA, Carlos Eduardo da; SILVA, José Diego Saraiva da et al. Self-adaptive role-based access control for business processes. In: PROCEEDINGS of the 12th international symposium on software engineering for adaptive and self-managing systems (SEAMS2017). Buenos Aires, Argentina: IEEE Press, 2017. (SEAMS 2017), p. 193–203. ISBN 978-1-5386-1550-8. DOI: 10.1109/SEAMS.2017.13. Disponível em: [link].

Singh, S., Hosen, A. S. M. S. e Yoon, B. (2021). Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access, 9:13938–13959.

Sivaraman, A., Kim, C., Krishnamoorthy, R., Dixit, A., and Budiu, M. (2015). Dc.p4: Programming the forwarding plane of a data-center switch. In Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, SOSR ’15, pages 2:1–2:8, New York, NY, USA. ACM.

Skoudis, E. and Zeltser, L. (2003). Malware: Fighting Malicious Code. Prentice Hall PTR, Upper Saddle River, NJ, USA.

Solana (2022). Solana’s energy use report: March 2022. [link]. Acessado em 26 de agosto de 2022.

Son, S., Shin, S., Yegneswaran, V., Porras, P., and Gu, G. (2013). Model checking invariant security properties in openflow. In 2013 IEEE International Conference on Communications (ICC), pages 1974–1979. IEEE.

Spells of Genesis (2022). Spells of genesis. https://spellsofgenesis.com/. Acessado em 23 de agosto de 2022.

SRINIVAS, S. et al. (Ed.). Universal 2nd Factor (U2F) Overview. Abr. 2017. Disponível em: [link].

Stanwell (2022). How blockchain can impact the energy market. [link]. Acessado em 23 de agosto de 2022.

Stoenescu, R., Popovici, M., Negreanu, L., and Raiciu, C. (2016). Symnet: Scalable symbolic execution for modern networks. In ACM SIGCOMM 2016, pages 314–327. ACM.

TAYLOR, John. News from the e-Science Programme, first phase. Social Science Information, RCUK website, v. 47, n. 2, p. 131–157, 2001.

Tezos Foundation (2022). Sustainability through innovation. https://tezos.com/carbon/. Acessado em 26 de agosto de 2022.

Thomason, J. (2022). Blockchain and GreenFi - tools for climateaction. [link]. Acessado em 23 de agosto de 2022.

Travassos, G., Shull, F., Fredericks, M., and Basili, V. R. (1999). Detecting defects in object-oriented designs: Using reading techniques to increase software quality. SIGPLAN Not., 34(10):47–56.

Tripathy, R. P., Mishra, M. R. e Dash, S. R. (2020). Next generation warehouse through disruptive IoT blockchain. Em 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), p. 1–6. IEEE.

Udupi, Y. B., Sahai, A., and Singhal, S. (2007). A classificationbased approach to policy refinement. In 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pages 785–788. IEEE.

UNION, European. Regulamento (UE) 2016/679 do Parlamento Europeu e do Conselho. Jornal Oficial da União Europeia, European Union, 4 mai. 2016. Disponível em: [link].

UTZ, Christine et al. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In: PROCEEDINGS of the 2019 ACM SIGSAC Conference on Computer and Communications Security. London, United Kingdom: Association for Computing Machinery, 2019. (CCS ’19), p. 973–990. ISBN 9781450367479. DOI: 10.1145/3319535.3354212.

Valeonti, F., Bikakis, A., Terras, M., Speed, C., Hudson-Smith, A. e Chalkias, K. (2021). Crypto collectibles, museum funding and OpenGLAM: challenges, opportunities and the potential of non-fungible tokens (NFTs). Applied Sciences, 11(21):9931.

Vergilio, S. R., Maldonado, J. C., and Jino, M. (1997). Constraint based selection of test sets to satisfy structural software testing criteria. In Proceedings 17th International Conference of the Chilean Computer Science Society, pages 256–263.

VERMA, Abhishek et al. Large-scale cluster management at Google with Borg. In: PROCEEDINGS of the Tenth European Conference on Computer Systems. 2015. p. 1–17.

Verma, D. C. (2002). Simplifying network administration using policybased management. IEEE network, 16(2):20–26.

Verma, P., O’Regan, B., Hayes, B., Thakur, S. e Breslin, J. G. (2018). Enerport: Irish blockchain project for peer- to-peer energy trading. Energy Informatics, 1(14).

VisaNews (2021). #newprofilepic. [link]. Acessado em 26 de agosto de 2022.

W3C. A JSON-based Serialization for Linked Data. Jul. 2020. Disponível em: <https://www.w3.org/TR/json-ld/>. Acesso em: 23 jul. 2022.

W3C. Decentralized Identifiers (DIDs) v1.0. 2022. Disponível em: <https://www.w3.org/TR/did-core/>. Acesso em: 21 jul. 2022.

W3C. Verifiable Credentials Data Model v1.1. 2022. Disponível em: <https://www.w3.org/TR/vc-data-model/>. Acesso em: 23 jul. 2022.

Wang, Q., Qin, B., Hu, J. e Xiao, F. (2020). Preserving transaction privacy in Bitcoin. Future Generation Computer Systems, 107:793–804.

Wang, Y. e Kogan, A. (2018). Designing confidentialitypreserving blockchain-based transaction processing systems. International Journal of Accounting Information Systems, 30:1–18.

WANGHAM, Michelle S; DOMENECH, Marlon C; MELLO, Emerson R de. Infraestruturas de Autenticação e de Autorização para Internet das Coisas. In: MINICURSOS do XIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais - SBSeg 2013. 2013.

WANGHAM, Michelle Silva; MELLO, Emerson Ribeiro de et al. Gerenciamento de identidades federadas. In: MINICURSOS X Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. 2010. p. 1–52.

WARD, Rory; BEYER, Betsy. BeyondCorp: A new approach to enterprise security, 2014. [link].

Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., and Waldbusser, S. (2001). Terminology for policy-based management. Technical report.

WIEFLING, Stephan; DÜRMUTH, Markus; LO IACONO, Luigi. More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-Based Authentication. In: ANNUAL Computer Security Applications Conference. Austin, USA: Association for Computing Machinery, 2020. (ACSAC ’20), p. 203–218. ISBN 9781450388580. DOI: 10.1145/3427228.3427243. Disponível em: <https://doi.org/10.1145/3427228.3427243>.

WILANDER, John. Intelligent Tracking Prevention 2.2. Abr. 2019. Disponível em: <https://webkit.org/blog/8828/intelligent-tracking-prevention-2-2/>. Acesso em: 3 ago. 2022.

Winder, D. (2020). Much of the internet went down yesterday: Here’s the reason why. Forbes.

Wong, R. (2018). Mastering Reverse Engineering: Re-engineer your ethical hacking skills. Packt Publishing Ltd.

World Economic Forum (2018). Fourth industrial revolution for the earth series - building block(chain)s for a better planet. Relatório técnico, World Economic Forum.

WU, Cong et al. ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. In: ICC 2019 - 2019 IEEE International Conference on Communications (ICC). 2019. p. 1–6. DOI: 10.1109/ICC.2019.8761435.

Xiong, Z. and Zilberman, N. (2019). Do switches dream of machine learning? toward in-network classification. In Proceedings of the 18th ACM Workshop on Hot Topics in Networks, HotNets ’19, page 25â33, New York, NY, USA. Association for Computing Machinery.

YADRON, Danny. Man Behind the First Computer Password: It’s Become a Nightmare. Edição: The Wall Street Journal. Mai. 2014. Disponível em: <https://www.wsj.com/articles/BL-DGB-35227>. Acesso em: 22 jul. 2022.

Yahoo (2021). The burned picasso nft to digitally preserve artistic legacy. [link]. Acessado em 23 de agosto de 2022.

Yaqub, R., Ahmad, S., Ali, H. e Asar, A. u. (2020). AI and blockchain integrated billing architecture for charging the roaming electric vehicles. IoT, 1(2):382–397.

Ycharts.com (2022a). Bitcoin average confirmation time. https://ycharts.com/indicators/bitcoin_average_confirmation_time. Acessado em 26 de agosto de 2022.

Ycharts.com (2022b). Ethereum average confirmation time. https://ycharts.com/indicators/ethereum_average_block_time. Acessado em 26 de agosto de 2022.

Yoon, J. W., Kim, H. e Huh, J. H. (2010). Hybrid spam filtering for mobile communication. Computers & Security, 29(4):446–459.

Yu, M., Greenberg, A., Maltz, D., Rexford, J., Yuan, L., Kandula, S., and Kim, C. (2011). Profiling network performance for multi-tier data center applications. In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI11).

Yuan, Y. e Wang, F.-Y. (2016). Towards blockchain-based intelligent transportation systems. Em 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), p. 2663–2668. IEEE.

Zargar, S. T., Joshi, J., and Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE communications surveys & tutorials, 15(4):2046–2069.

Zemler, F. e Westner, M. (2019). Blockchain and GDPR: Application scenarios and compliance requirements. Em Portland International Conference on Management of Engineering and Technology (PICMET), p. 1–8.

Zhang, X. e Wang, D. (2019). Adaptive traffic signal control mechanism for intelligent transportation based on a consortium blockchain. IEEE Access, 7:97281–97295.

Zhao, X., Chen, Z., Chen, X., Wang, Y. e Tang, C. (2017). The DAO attack paradoxes in propositional logic. Em 2017 4th International Conference on Systems and Informatics (ICSAI), p. 1743–1746.

Zhao, Y., Peng, K., Xu, B., Liu, Y., Xiong, W. e Han, Y. (2019). Applied engineering programs of energy blockchain in US. Energy Procedia, 158:2787–2793.

Downloads

Publication date

September 12, 2022

Details about the available publication format: Full Volume

Full Volume

ISBN-13 (15)

978-85-7669-510-3