@conference {8784090, title = {Blockchain-Based Publicly Verifiable Cloud Storage}, booktitle = {2019 IEEE International Conference on Smart Computing (SMARTCOMP)}, year = {2019}, pages = {381-386}, author = {N. Tapas and G. Merlino and F. Longo and A. Puliafito} } @conference {8875501, title = {Enabling Container-Based Fog Computing with OpenStack}, booktitle = {2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)}, year = {2019}, month = {July}, pages = {1049-1056}, abstract = {Operating system-level virtualization using containerization technologies have changed the world of application development and software by bringing flexibility, efficiency and new methods for managing and distributing software. Edge/Fog computing complements nowadays powerful centralized approach leveraging datacenters resources with a number of distributed fog nodes with relatively capable resources in order to provide advanced services in proximity to end users and data sources. In fact, this emerging paradigm provides ubiquitous processing abilities through scattered heterogeneous hardware with different energy availability and computational capabilities. This paper aims at presenting an extension of an IoT centric infrastructure Cloud framework, named Stack4Things, towards the edge through an integration with two of the OpenStack subsystems (i.e., Zun and Kuryr) that deal with containers management.}, keywords = {Application development, Cloud, cloud computing, computer centres, container management, container-based fog computing, containerization technologies, containers, datacenter resources, distributed fog nodes, distributing software, Ecosystems, Edge/Fog computing, Internet of Things, IoT, IoT centric infrastructure cloud framework, Kuryr, Neutrons, OpenStack, OpenStack subsystems, operating system-level virtualization, Servers, software management, ubiquitous processing abilities, virtualisation, Virtualization, Zun}, doi = {10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00181}, author = {Zakaria Benomar and F. Longo and G. Merlino and A. Puliafito} } @conference {9066039, title = {A Mininet-Based Emulated Testbed for the I/Ocloud}, booktitle = {2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)}, year = {2019}, month = {Dec}, pages = {277-283}, abstract = {Considering the proliferation of smart devices connected to the Internet, typically going under the aegis of Internet of Things (IoT), a trend has arisen to promote the Cloud paradigm as a suitable management system for such a complex environment. In this context, an effort to extend the OpenStack ecosystem to make it able to support the management of the IoT infrastructure has been made by virtue of the I/Ocloud approach, leading up to its reference implementation, the Stack4Things (S4T) middleware. S4T provides a set of suitable capabilities and features to make the (remote) IoT devices able to join an edge-based IaaS/PaaS Cloud. In the interest of enhancing the S4T middleware scalability and explore new capabilities in particular, ones related to Fog and Edge paradigms, it is becoming a must to test new features in practice at a low financial cost and particular constraints for instance, number/type of devices, network conditions, etc. For this purpose, the use of network emulation tools is a practical and suitable approach. In this paper, we present an integration between the S4T middleware and an emulation tool namely Containernet. Through the integration approach, we model network conditions (e.g., latency, bandwidth, packet loss) and devices (in forms of containers) using Containernet, and we manage the devices (i.e., containers) by means of S4T.}, keywords = {aegis, cloud computing, Cloud paradigm, complex environment, Containernet, containers, Edge computing, Edge/Fog computing, Emulation, input-output programs, Internet of Things, IoT, IoT devices, IoT infrastructure, low financial cost, middleware, Mininet, mininet-based, model network conditions, network emulation tools, OpenStack, OpenStack ecosystem, reference implementation, S4T middleware scalability, smart devices, Stack4Things middleware, suitable management system, Task analysis, Tools, virtualisation}, doi = {10.1109/MSN48538.2019.00060}, author = {Zakaria Benomar and D. Bruneo and F. Longo and G. Merlino and A. Puliafito} } @conference {8784013, title = {Software-Defined City Infrastructure: A Control Plane for Rewireable Smart Cities}, booktitle = {2019 IEEE International Conference on Smart Computing (SMARTCOMP)}, year = {2019}, pages = {180-185}, author = {G. Tricomi and G. Merlino and F. Longo and D. Salvatore and A. Puliafito} } @conference {8795376, title = {Toward a Trustless Smart City: the $\#$SmartME Experience}, booktitle = {2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)}, year = {2019}, pages = {204-207}, author = {A. Khare and G. Merlino and F. Longo and A. Puliafito and O. P. Vyas} } @conference {8784023, title = {Towards trustless prediction-as-a-service}, booktitle = {2019 IEEE International Conference on Smart Computing (SMARTCOMP)}, year = {2019}, month = {June}, pages = {317-322}, keywords = {application program interfaces, Blockchain, cloud computing, cloud provider infrastructure, Computational modeling, Cryptography, Deep Learning, deep learning models, deep neural network models, inference model, inference service, infrastructure acquisition, Machine learning, malicious behaviors, neural nets, neural networks, operation costs, peculiar threat models, prediction API provider, prediction API providers, prediction APIs, prediction-as-a-service, Predictive models, Protocols, security of data, self-hosting costs, software-as-a-service business model, Tendermint}, issn = {null}, doi = {10.1109/SMARTCOMP.2019.00068}, author = {G. Santhosh and F. De Vita and D. Bruneo and F. Longo and A. Puliafito} } @conference {8935014, title = {Transparent, Provenance-assured, and Secure Software-as-a-Service}, booktitle = {2019 IEEE 18th International Symposium on Network Computing and Applications (NCA)}, year = {2019}, pages = {1-8}, author = {N. Tapas and F. Longo and G. Merlino and A. Puliafito} } @article {8928171, title = {Using Deep Reinforcement Learning for Application Relocation in Multi-Access Edge Computing}, journal = {IEEE Communications Standards Magazine}, volume = {3}, number = {3}, year = {2019}, month = {Sep.}, pages = {71-78}, keywords = {5G mobile communication, Base stations, Computer architecture, Edge computing, Long Term Evolution, Quality of service, Reinforcement learning}, issn = {2471-2833}, doi = {10.1109/MCOMSTD.2019.1900011}, author = {F. De Vita and G. Nardini and A. Virdis and D. Bruneo and A. Puliafito and G. Stea} } @conference {8597889, title = {A Deep Reinforcement Learning Approach For Data Migration in Multi-Access Edge Computing}, booktitle = {2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K)}, year = {2018}, month = {Nov}, pages = {1-8}, keywords = {5G, 5G mobile communication, cloud computing, computational resources, data migration, Deep Reinforcement Learning, deep reinforcement learning approach, distributed services, Edge computing, Keras machine learning, Keras machine learning framework, learning (artificial intelligence), Long Term Evolution, LTE, MEC scenarios, Multi-access Edge Computing, multiaccess edge computing, network performance, OMNeT++/SimuLTE simulator, parameter settings, push data, Quality of service, Reinforcement learning, Resource allocation, resource utilization, Servers, SimuLTE}, doi = {10.23919/ITU-WT.2018.8597889}, author = {F. D. Vita and D. Bruneo and A. Puliafito and G. Nardini and A. Virdis and G. Stea} } @conference {8726749, title = {Extending Openstack for Cloud-Based Networking at the Edge}, booktitle = {2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)}, year = {2018}, month = {July}, pages = {162-169}, abstract = {Cloud-controlled virtual networking at the edge can be considered a critical feature, highly in demand in the IoT infrastructure management domain. Fostering the vision of the Cloud as a suitable control surface for IoT, an integration between the two ecosystems is achievable at a genuinely Infrastructure-as-a-Service level. This work thus describes an integration design between an IoT-centric infrastructure Cloud framework, already capable of limited networking functionality, and Neutron, the networking subsystem belonging to the core services of the OpenStack platform. Design considerations and trade-offs are detailed in the paper.}, keywords = {Bridges, Cloud, cloud computing, Cloud-controlled virtual networking, control surface, critical feature, Edge computing, IaaS, infrastructure management domain, Infrastructure-as-a-Service level, integration design, Internet of Things, IoT, IoT-centric infrastructure Cloud framework, Linux, network topology, network virtualization, networking functionality, networking subsystem, Neutron, Neutrons, OpenStack, OpenStack platform, Topology, Virtualization}, doi = {10.1109/Cybermatics_2018.2018.00058}, author = {Zakaria Benomar and D. Bruneo and S. Distefano and K. Elbaamrani and N. Idboufker and F. Longo and G. Merlino and A. Puliafito} } @article {35, title = {Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems}, journal = {Journal of Network and Computer Applications}, volume = {59}, year = {2016}, month = {01/2016}, pages = {208-218}, abstract = {

Abstract Nowadays, storage services offer a new way for Cloud providers to do business. This new trend is proved by the number of Cloud storage providers that are continuously appearing on the market. By now, using Cloud storage services is becoming a common practice for end-users. However, the current Cloud storage providers do not offer any guarantees regarding long-term availability and privacy. In fact, data stored in the Cloud could be locked-in, lost, or violated in terms of privacy. In this work, we present an innovative system that on one hand allows end-users to simultaneously rely on different Cloud storage providers in a transparent way and on the other hand to enforce long-term availability, obfuscation, and encryption. Our system is highly reliable, in fact, if a provider is not temporarily or permanently available, end-users continue accessing their data in a secure way. In addition, only the end-users have the full control of the overall security of their data and no sensitive information are disclosed to Cloud storage providers. Several experiments allow us to discuss the performance of our system compared against existing solutions.

}, keywords = {cloud computing, Long-term availability, Privacy, Reliability, Storage Clouds}, issn = {1084-8045}, doi = {10.1016/j.jnca.2014.09.021}, url = {http://www.sciencedirect.com/science/article/pii/S1084804514002288}, author = {A. Celesti and M. Fazio and M. Villari and A. Puliafito} } @article {427, title = {A cloud-based system to protect against industrial multi-risk events}, journal = {Procedia CIRP}, volume = {41}, year = {2016}, month = {02/2016}, type = {research}, chapter = {650}, abstract = {

Industrial areas frequently present a high concentration of production operations which are source of anthropic risks. For this reason Smart Public Safety is receiving an increasing attention from industry, research and authorities. Moreover, due the consequences of global warming, these areas could be subject to risk events with increased probability with respect to the past. Information technologies enable an innovative approach towards safety management, which relies on the evolution of tools for environmental monitoring and citizens{\textquoteright} interaction. This work presents the preliminary results of the Italian research project SIGMA - sensor Integrated System in cloud environment for the Advanced Multi-risk Management. The proposed system includes a continuous monitoring of the different information sources, thus reducing human control as much as possible. At the same time, the communication system manages multiple data flows in a flexible way, adapting itself to different working scenarios, enabling smarter applications. SIGMA intends to acquire, integrate and compute heterogeneous data, coming from various sensor networks in order to provide useful insights for the monitoring, forecasting and management of risk situations through services provided to citizens and businesses, both public and private. Based on the integration of different interoperating components, the system is able to provide a complete emergency management framework through simulations/optimizations and heterogeneous data manipulation tools. The prototype solution is detailed by a use case application in an industrial area located in the region of Sicily, Italy. In particular, web based modular applications connected through SIGMA allow the monitoring of the industrial environment through data gathering from different sensor networks, such as outdoor sensors mounted in the surroundings of large industrial areas, and support of the design of the logistics network aimed at covering the industrial risks.

}, author = {G. Stecca and A. Puliafito and M. Simonetti and G. Mariotta and P. Sciuto} } @proceedings {468, title = {Using Google Cloud Vision in Assistive Technology Scenarios}, journal = {IEEE Workshop on ICT solutions for eHealth 2016 (ICTS4eHealth2016)}, year = {2016}, address = {Messina, Italy}, abstract = {

Google Cloud Vision is an image recognition technology that allows you to remotely process the content of an image and to retrieve its relevant features, including image labeling, face and landmark detection, optical character recognition, and tagging of explicit content. By using specialized REST API, called Google Cloud Vision API, developers exploit such a technology within their own applications. Currently, this cloud-based tool is in limited preview and its services are accessible for trusted tester users only. From a developer{\textquoteright}s perspective, in this paper, we intend to use such software resources in order to achieve assistive technology solutions for people with disabilities. Specifically, we investigate some potential benefits of Cloud Vision tool towards the development of applications for users who are blind.

}, keywords = {API, Assistive Technology, embedded systems, Google Cloud Vision, Image Processing}, author = {D. Mulfari and A. Celesti and M. Fazio and M. Villari and A. Puliafito} } @proceedings {Fazio2015500, title = {Big Data Storage in the Cloud for Smart Environment Monitoring}, journal = {Procedia Computer Science}, volume = {52}, year = {2015}, note = {The 6th International Conference on Ambient Systems, Networks and Technologies (ANT-2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015)}, pages = {500 - 506}, abstract = {

Abstract Monitoring activities detect changes in the environment and can be used for several purpose. To develop new advanced services for smart environments, data gathered during the monitoring need to be stored, processed and correlated to different pieces of information that characterize or influence the environment itself. In this paper we propose a Cloud storage solution able to store huge amount of heterogeneous data, and provide them in a uniform way. To this aim, we adopt an hyrid architecture that couple Document and Object oriented strategies, in order to optimize data storage, querying and retrieval. In this paper, we present the architecture design and discuss some implementation details in the development of the architecture within a specific use case.

}, keywords = {SWE}, doi = {http://dx.doi.org/10.1016/j.procs.2015.05.023}, url = {http://www.sciencedirect.com/science/article/pii/S1877050915008236}, author = {M. Fazio and A. Celesti and A. Puliafito and M. Villari} } @article {7060517, title = {Cloud4sens: a cloud-based architecture for sensor controlling and monitoring}, journal = {IEEE Communications Magazine}, volume = {53}, number = {3}, year = {2015}, month = {March}, pages = {41-47}, keywords = {cloud clients, cloud computing, cloud framework, cloud service, cloud-based architecture, Cloud4Sens, Communication standards, Computer architecture, computerised instrumentation, Data models, data-centric model, Databases, device-centric model, environmental data, extensible messaging and presence protocol, Geospatial analysis, IEEE standards, open geospatial consortium, sensing resources management, sensor control, sensor monitoring, sensor web enablement, Sensors, software architecture, Standards, SWE specifications, Temperature sensors, virtual devices, virtual sensing infrastructure, Web services, X509 certificates, XMPP}, issn = {0163-6804}, doi = {10.1109/MCOM.2015.7060517}, author = {M. Fazio and A. Puliafito} } @proceedings {27, title = {Automating the Hadoop configuration for easy setup in resilient cloud systems}, journal = {IEEE Symposium on Computers and Communication (ISCC), 2014}, volume = {Workshops}, year = {2014}, month = {June}, pages = {1{\textendash}4}, publisher = {IEEE Computer Society}, address = {Washington DC}, keywords = {cloud computing, Hadoop, HDFS, Resilient Cloud Storage}, doi = {10.1109/ISCC.2014.6912631}, author = {A. Celesti and M. Fazio and A. Puliafito and M. Villari} } @proceedings {38, title = {Cloud Federation To Elastically Increase Mapreduce Processing Resources}, journal = {Euro-Par 2014 Workshops, Part II}, volume = {8806}, year = {2014}, month = {29}, pages = {97{\textendash}108}, publisher = {Springer International Publishing Switzerland}, edition = {LNCS}, address = {Cham (ZG)}, doi = {10.1007/978-3-319-14313-2_9}, url = {http://link.springer.com/chapter/10.1007\%2F978-3-319-14313-2_9}, author = {A. Panarello and A. Celesti and M. Fazio and M. Villari and A. Puliafito} } @inbook {50, title = {An Integrated System for Advanced Multi-risk Management Based on Cloud for IoT}, booktitle = {Advances onto the Internet of Things}, volume = {260}, number = {Advances in Intelligent Systems and Computing}, year = {2014}, pages = {253{\textendash}269}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, address = {Cham}, abstract = {

This chapter presents the Cloud computing technology as strategic solution for the deployment of IoT application and solutions. Cloud computing is a new ICT paradigm able to offer products and solutions as services. Thus, it allows the delivery of on-demand virtual resources (e.g., computational resources, storage systems, applications, data centers,...) over the Internet on a pay-for-use basis. Also, the distributed nature of Cloud computing guarantees high availability of resources dynamically adapting their allocation to specific requirements of the system. The research community together with big business companies are focusing their efforts in the adoption of Cloud for a massive interaction with the physical environment. To show a such trend, we present an on-going project, called SIGMA, which exploits Cloud technologies to acquire, integrate and compute heterogeneous data from several sensor networks for controlling and monitoring both environmental and industrial production systems. Specifically, we describe a new Cloud framework at the basis of the whole SIGMA architecture, in order to show benefits in the adoption of a such technology. The framework is compliant with the Sensor Web Enablement standard specifications and makes use of a plug-in platform to integrate heterogeneous sensing infrastructures. It allows to build abstract objects for accessing sensing devices and observations pandering to the Internet of Things needs.

}, keywords = {cloud computing, Risk management}, issn = {978-3-319-03992-3}, doi = {10.1007/978-3-319-03992-3_18}, url = {http://dx.doi.org/10.1007/978-3-319-03992-3_18}, author = {M. Fazio and A. Celesti and A. Puliafito and M. Villari}, editor = {Gaglio, Salvatore, Lo Re, Giuseppe} } @proceedings {39, title = {The Need of a Hybrid Storage Approach for IoT in PaaS Cloud Federation}, journal = {Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops}, year = {2014}, month = {May}, pages = {779{\textendash}784}, publisher = {IEEE COMPUTER SOC}, address = {Washington, DC}, abstract = {

Monitoring activities over many different types of sensors are very challenging to support advanced services for Internet of Things (IoT) and its future. However, one of the major issues is the explosion of the amount of heterogeneous information that has to be stored and processed, thus causing the well known Big Data problem. Some Cloud strategies have been investigated to offer IoT-oriented services, but they do not specifically address solutions for Big Data management. In this paper, we present a two-layer architecture based on a hybrid storage system able to support a Platform as a Service (PaaS) federated Cloud scenario. The proposed architecture combines the benefits of both storage approaches. In particular, it allows us on one hand to extend SQL-like legacy systems, and on the other hand to manage Big Data through an XML-like, non-SQL distributed storage system according to a Cloud federation approach.

}, keywords = {Big Data, cloud computing, federation, IoT, monitoring, PaaS, sensor network}, doi = {10.1109/WAINA.2014.162}, author = {M. Fazio and A. Celesti and M. Villari and A. Puliafito} } @proceedings {40, title = {A requirements analysis for IaaS cloud federation}, journal = {CLOSER 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science}, year = {2014}, pages = {584{\textendash}589}, publisher = {SCITEPRESS}, address = {Setubal}, abstract = {

The advent of Cloud computing offers different ways both to sell and buy resources and services according to a pay-per-use model. Thanks to virtualization technology, different Cloud providers supplying costeffective services provided in form of Infrastructure as a Service (IaaS) have been rising. Currently, there is another perspective which represents a further business opportunity for small/medium providers known as Cloud Federation. In fact, the Cloud ecosystem includes hundreds of independent and heterogeneous cloud providers, and a possible future alternative scenario is represented by the promotion of cooperation among them, thus enabling the sharing of computational and storage resources. In this paper, we specifically discuss an analysis of the requirements for the establishment of an IaaS Cloud Federation. Copyright {\textcopyright} 2014 SCITEPRESS - Science and Technology Publications.

}, doi = {10.5220/0004945705840589}, url = {http://www.scopus.com/inward/record.url?eid=2-s2.0-84902319762\&partnerID=40\&md5=002d2d3b47c28f5b08a119a113572a22}, author = {A. Panarello and A. Celesti and M. Fazio and M. Villari and A. Puliafito} } @proceedings {34, title = {Resource Management in Cloud Federation Using XMPP}, journal = {IEEE 13th International Symposium on Network Computing and Applications (NCA), 2014}, year = {2014}, month = {Aug}, pages = {67{\textendash}70}, publisher = {IEEE Computer Society}, address = {Washington DC}, abstract = {

This paper deals with Cloud federation issues, where Clouds are both providers and clients of virtual resource at the same time. Specifically, we have designed a solution based on a XMPP communication platform, which allows to set up federated environments and to easily manage virtual shared resources. Heterogeneous and dynamic Clouds can interact in near-real time, making available their own resources according to specific agreement policies. We are thinking to implement the proposed solution using the Hadoop framework, a well-known Cloud Map-Reduce middleware designed to offer different types of services. Here, we analyze the basic and useful elements necessary to making up federated clouds. By mean of Cloud federation, two or more Hadoop clusters can be connected in order to increase service scalability, overcoming some technical limitations of the Hadoop framework itself.

}, keywords = {cloud computing, Cloud services, federation, Hadoop, XMPP}, doi = {10.1109/NCA.2014.15}, author = {M. Fazio and A. Celesti and M. Villari and A. Puliafito} } @proceedings {48, title = {Using Virtualization And noVNC to Support Assistive Technology In Cloud Computing}, journal = {Third Symposium on Network Cloud Computing and Applications (NCCA)}, year = {2014}, pages = {125{\textendash}132}, publisher = {IEEE COMPUTER SOC}, address = {Wa}, abstract = {

In this paper, we focus on how the virtualization technology can support the usage of Assistive Technology (AT) in cloud computing. AT provides software tools to people with disabilities. Unfortunately, these pieces of software are not easy to configure when a disabled user needs to occasionally use a shared computer, e.g., in an internet point, in a library, in a campus, and so on. The proposed solution allows users to access remote Virtual Machines (VMs) through an HTML5 web interface. These virtual environments meet the user{\textquoteright}s personal demand: they support both traditional desktop applications and customized AT tools. In this way, people with disabilities can use any networked computer with a web browser to manage their personal working environments. Nevertheless, achieving such a goal in a cloud computing environment is not trivial at all, because existing remote desktop client viewer applications have not been designed to support the interaction with AT software running on VMs. To achieve such an objective, we propose an open source cloud-based system including no VNC as HTML5 remote desktop proxy/client web application, Virtual Network Computing (VNC) as open source technology to access a remote VM, Oracle Virtual Box as hypervisor, and CLEVER as Virtual Infrastructure Manager (VIM) middleware.

}, keywords = {Assistive Technology, cloud computing, disabled user, HTML5, Virtualization, VNC}, issn = {978-0-7695-5168-5}, doi = {10.1109/NCCA.2014.28}, author = {D. Mulfari and A. Celesti and M. Villari and A. Puliafito} } @booklet {47, title = {Data Reliability In Multi-provider Cloud Storage Service With RRNS}, journal = {Advances in Service-Oriented and Cloud Computing}, volume = {393}, year = {2013}, month = {13}, pages = {83{\textendash}93}, publisher = {Springer - Verlag Berlin Heidelberg}, address = {Berlin}, abstract = {Nowadays, more and more Cloud storage providers are appearing on the market. Nevertheless, data availability and confidentiality represent critical issues considering Cloud computing. This paper discusses an approach that on one hand enables customers to use at the same time different Cloud storage providers, and that on the other hand guarantees both data redundancy and obfuscation. According to our approach, files are fragmented and stored in different Cloud storage providers by means of the Redundant Residue Number System (RRNS). Besides providing us data redundancy, RRNS allows us to preserve the data confidentiality by means of an obfuscation-base strategy spreading metadata over different cloud providers. In addition, our approach allows a customer to retrieve his/her files even if a cloud storage provider is not available anymore. Experiments highlight the factors that have to be considered to configure the system according to the customer{\textquoteright}s requirements.}, keywords = {Big Data, cloud computing, Confidentiality, Reliability, Storage}, url = {http://link.springer.com/chapter/10.1007/978-3-642-45364-9_8}, author = {M. Villari and A. Celesti and F. Tusa and A. Puliafito} } @article {51, title = {A Diversified Set Of Security Features For Xmpp Communication Systems Useful In Cloud Computing Federation}, journal = {INTERNATIONAL JOURNAL ON ADVANCES IN SECURITY}, volume = {6}, year = {2013}, pages = {99{\textendash}110}, abstract = {

Nowadays, in the panorama of Cloud Computing, finding a right compromise between interactivity and security is not trivial at all. Currently, most of Cloud providers base their communication systems on the web service technology. The problem is that both Cloud architectures and services have started as simple but they are becoming increasingly complex. Consequently, web services are often inappropriate. Recently, many operators in both academia and industry are evaluating the eXtensible Messaging and Presence Protocol for the implementation of Cloud communication systems. In fact, the XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery, and inter-domain communication compared to web service technologies. Nevertheless, the protocol lacks of native security features. In this paper, we explore such security issues, discussing how they can be mitigated using both SAML/SASL Single Sign-On (SSO) and XEP 0027.

}, keywords = {authentication, cloud computing, data encryption, digital signature, federation, security, sso, XMPP}, url = {http://www.iariajournals.org/security/tocv6n34.html}, author = {A. Celesti and M. Villari and A. Puliafito} } @proceedings {53, title = {DRACO PaaS: A Distributed Resilient Adaptable Cloud Oriented Platform}, journal = {2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD Forum}, year = {2013}, pages = {1490{\textendash}1497}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, keywords = {cloud computing, Distributed System, PaaS, Service Composition}, doi = {10.1109/IPDPSW.2013.266}, author = {A. Celesti and N. Peditto and F. Verboso and M. Villari and A. Puliafito} } @article {41, title = {Sensed Data Sharing In Cloud Federation For Advances In Health Information Exchange}, journal = { International Journal of Measurement Technologies and Instrumentation Engineering (IJMTIE)}, volume = {3}, year = {2013}, pages = {36{\textendash}50}, abstract = {

In this paper the authors focus on sensing systems supporting data exchange among several healthcare administrative domains. The challenge in this area is twofold: efficient management of a huge amount of data produced by medical devices, bio-sensors and information systems, sharing sensed data for scientific and clinical purposes. The authors present a new information system that exploits Cloud computing capabilities to overcome such issues, also guaranteeing patients{\textquoteright} privacy. Their proposal integrates different healthcare institutions into a federated environment, thus establishing a trust context among the institutions themselves. The storage service is designed according to a fully distributed approach and it is based on the wide-used Open Source framework Hadoop, which is enriched to establish a compelling federated system. They adopt the XRI technology to formalize an XML-based data model which allows to simplify the classification, searching and retrieval of medical data.

}, issn = {2156-1737}, doi = {10.4018/ijmtie.2013100104}, url = {http://www.igi-global.com/article/sensed-data-sharing-in-cloud-federation-for-advances-in-health-information-exchange/109650}, author = {A. Celesti and M. Fazio and A. Puliafito and M. Villari} } @proceedings {49, title = {Using Virtualization And Guacamole/vnc To Provide Adaptive User Interfaces To Disabled People In Cloud Computing}, journal = {The 10th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC-2013)}, year = {2013}, month = {20}, pages = {72{\textendash}79}, publisher = {IEEE COMPUTER SOC}, address = {Washington, DC}, abstract = {

Assistive Technology (AT) provides essential computer accessibility for people with disabilities. In this paper, we examine how Cloud computing can provide adaptive user interfaces to people with disabilities in order to enable them accessing AT tools in form of Software as a Service (SaaS). The proposed solution consists in creating adaptive user interfaces deploying AT tools in Virtual Machines (VMs) which users can manage through the Internet. By using an HTML5-based web interface, computer users with disabilities are able to interact with personalized virtual desktops from any networked computer by means of a web browser without having to setup additional software on the physical machine. Nevertheless, using AT software in web-accessed VMs is not so easy as well as in physical Desktops, because several issues have to be overcome. In order to address such issues, we discuss an architecture integrating Guacamole, i.e., an HTML5 remote desktop gateway, Virtual Network Computing (VNC), i.e., a technology to control a remote Desktop, Virtual Box, i.e., a virtual machine monitor (or hypervisor), and CLEVER a Virtual Infrastructure Manager (VIM) middleware.

}, keywords = {Assistive Technology, cloud computing, HTML5, Physiological, Remote desktop, Virtualization infrastructure, Web browser}, issn = {978-1-4799-2481-3}, doi = {10.1109/UIC-ATC.2013.42}, author = {D. Mulfari and A. Celesti and M. Villari and A. Puliafito} } @article {60, title = {Virtual Machine Provisioning Through Satellite Communications In Federated Cloud Environments}, journal = {Future Generation Computer Systems}, volume = {28}, year = {2012}, month = {01/2012}, pages = {85{\textendash}93}, abstract = {

Cloud federation offers plenty of new services and business opportunities. However, many advanced services cannot be implemented in the real Cloud market due to several issues that have not been overcome yet. One of these concerns is the transfer of huge amount of data among federated Clouds. This paper aims to overcome such a limitation proposing an approach based on satellite communications. By comparing performance in data delivery on the Internet and satellite systems, it is evident that satellite technologies are enough ripe to be competitive against systems with a wired infrastructure. Thus, we propose to make use of satellite transmission to implement fast delivery of huge amount of data. Through the discussion of a use case, where a WEB TV company offers a streaming service, we show how to practically apply the proposed strategy in a real scenario, specifying the involvement of Cloud providers, Cloud users, satellite companies and end-user clients.

}, keywords = {cloud computing, Distributed Cloud service, federation, Satellite communications, Service delivery}, doi = {10.1016/j.future.2011.05.021}, url = {http://www.sciencedirect.com/science/article/pii/S0167739X11001038}, author = {A. Celesti and M. Fazio and M. Villari and A. Puliafito} } @article {275, title = {Energy control in dependable Wireless Sensor Networks: a modeling perspective}, journal = {PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS. PART O, JOURNAL OF RISK AND RELIABILITY}, volume = {225}, year = {2011}, pages = {424{\textendash}434}, abstract = {

Wireless sensor networks (WSN) are composed of a large number of tiny sensor nodes randomly distributed over a geographical region. In order to reduce power consumption, battery-operated sensors undergo cycles of sleeping-active periods that reduce their ability to send/receive data. Starting from the Markov reward model theory, this paper presents a dependability model to analyse the reliability of a sensor node. Also, a new dependability parameter is introduced, referred to as producibility, which is able to capture the capability of a sensor to accomplish its mission. Two different model solution techniques are proposed, one based on the evaluation of the accumulated reward distribution and the other based on an equivalent model based on non-Markovian stochastic Petri nets. The obtained results are used to investigate the dependability of a whole WSN taking into account the presence of redundant nodes. Topological aspects are taken into account, providing a quantitative comparison among three typical network topologies: star, tree, and mesh. Numerical results are provided in order to highlight the advantages of the proposed technique and to demonstrate the equivalence of the proposed approaches.

}, keywords = {Energy consumption, Markov reward models, network topology, non-Markovian stochastic Petri nets, producibility, Reliability, Wireless sensor networks}, doi = {10.1177/1748006X10397845}, author = {D. Bruneo and A. Puliafito and Marco Scarpa} } @booklet {294, title = {From UML to Petri Nets: the PCM-based Methodology}, journal = {IEEE TRANSACTIONS ON SOFTWARE ENGINEERING}, year = {2011}, pages = {65{\textendash}79}, author = {S. Distefano and Marco Scarpa and A. Puliafito} } @booklet {293, title = {A Representation Methodology for Performance Specifications in UML Domain}, journal = {COMPUTERS IN HUMAN BEHAVIOR}, volume = {27}, year = {2011}, pages = {1579{\textendash}1592}, abstract = {Performance related problems play a key role in the Software Development Process (SDP). In particular an early integration of performance specifications in the SDP has been recognized during last years as an effective approach to speed up the production of high quality and reliable software. In this context we defined and implemented a technique for automatically evaluating performance aspects of UML software architectures. To achieve this goal the starting UML model of the software architecture under exam has been mapped into a performance domain afterwards analyzed. The performance indices are inserted in the UML model exploiting the OMG Profile for Schedulability, Performance and Time Specification standard. However, to really automate the process, it was mandatory to specify the UML software representation by fixing semantic rules. The goal of this paper is the formalization of the model representation, characterizing the syntax and the semantics through which specifying performance requirements and behaviors into UML models in order to be compliant with the technique we implemented.}, keywords = {Meta-modeling, Semantics, Software Development Process, Software performance Ingineering, UML}, doi = {10.1016/j.chb.2010.11.003}, author = {S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {265, title = {Achieving Information Dependability in Grids through GDS2}, journal = {Parallel \& Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on}, year = {2010}, month = {23, 2010}, pages = {1{\textendash}8}, publisher = {IEEE}, address = {Piscataway, NJ}, doi = {10.1109/IPDPSW.2010.5470864}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {264, title = {Applying software engineering principles for designing Cloud@Home}, journal = {Cluster, Cloud and Grid Computing (CCGrid), 2010 10th IEEE/ACM International Conference on}, year = {2010}, month = {20, 2010}, pages = {1{\textendash}10}, publisher = {IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667}, address = {Piscataway, NJ}, doi = {10.1109/CCGRID.2010.76}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {262, title = {Cloud@Home: a New Enhanced Computing Paradigm}, journal = {Handbook of Cloud Computing}, year = {2010}, pages = {575{\textendash}594}, publisher = {Springer}, address = {Heidelberg}, doi = {10.1007/978-1-4419-6524-0_25}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa}, editor = {Borko Furht} } @proceedings {279, title = {Dependability analysis of Wireless Sensor Networks with active-sleep cycles and redundant nodes}, journal = {DYADEM-FTS {\textquoteright}10 Proceedings of the First Workshop on DYnamic Aspects in DEpendability Models for Fault-Tolerant Systems}, volume = {Supplemental Volume of the 8th European Dependable Computing Conference}, year = {2010}, month = {30 Aprile, 2010}, pages = {25{\textendash}30}, publisher = {ACM}, address = {New York, NY}, author = {D. Bruneo and A. Puliafito and Marco Scarpa} } @proceedings {277, title = {Dependability Evaluation of Wireless Sensor Networks: Redundancy and Topological Aspects}, journal = {Sensors, 2010 IEEE}, year = {2010}, month = {4 novembre 2010}, pages = {1827{\textendash}1831}, publisher = {IEEE}, address = {Piscataway, NJ}, author = {D. Bruneo and A. Puliafito and Marco Scarpa} } @booklet {280, title = {DESIGN AND MODELING IN THE SOFTWARE PERFORMANCE ENGINEERING DEVELOPMENT PROCESS}, journal = {JOURNAL OF CIRCUITS, SYSTEMS, AND COMPUTERS}, volume = {19}, year = {2010}, pages = {307{\textendash}323}, doi = {10.1142/S0218126610006220}, author = {S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {263, title = {From Volunteer to Cloud Computing: Cloud@Home}, journal = {CF {\textquoteright}10 Proceedings of the 7th ACM international conference on Computing frontiers}, year = {2010}, month = {19, 2010}, pages = {1{\textendash}3}, publisher = {ACM}, address = {New York, NY}, doi = {10.1145/1787275.1787304}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {259, title = {GS3: a Grid Storage System with Security Features}, journal = {JOURNAL OF GRID COMPUTING}, volume = {8}, year = {2010}, pages = {391{\textendash}418}, abstract = {Technological trend and the advent of worldwide networks, such as the Internet, made computing systems more and more powerful, increasing both processing and storage capabilities. In Grid computing infrastructures, the data storage subsystem is physically distributed among several nodes and logically shared among several users. This highlights the necessity of a) availability for authorized users only, b) confidentiality, and c) integrity of information and data: in one term security. In this work we face the problem of data security in Grid, by proposing a lightweight cryptography algorithm combining the strong and highly secure asymmetric cryptography technique (RSA) with the symmetric cryptography (AES). The proposed algorithm, we named Grid secure storage system (GS(3)), has been implemented on top of the Grid file access library (GFAL) of the gLite middleware, in order to provide a file system service with cryptography capability and POSIX interface. The choice of implementing GS(3) as a file system, the GS3FS, allows to protect the file system structure also, and to overcome the well-known problem of file rewriting in gLite/GFAL environments. In the specification of the GS3FS, particular care is addressed on providing a usable user interface and on implementing a file system that has low impact on the middleware. The final result is the introduction of a new storage Grid service into the gLite middleware, whose overall characteristics are never offered before, at the best of authors{\textquoteright} knowledge. The paper describes and details both the GS(3) algorithm and its implementation; the performance of such implementation are evaluated discussing the obtained results and possible application scenarios in order to demonstrate its effectiveness and usefulness.}, keywords = {Confidentiality, File system, GFAL, gLite, Grid, Integrity}, doi = {10.1007/s10723-010-9157-9}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {269, title = {Implementation of the Software Performance Engineering Development Process}, journal = {JOURNAL OF SOFTWARE}, volume = {5}, year = {2010}, pages = {872{\textendash}882}, doi = {10.4304/jsw.5.8.872-882}, author = {S. Distefano and Marco Scarpa and A. Puliafito} } @booklet {260, title = {Information Security in Data and Storage Grids through GS3}, journal = {Computational and Data Grids: Principles, Designs, and Applications}, year = {2010}, pages = {111{\textendash}127}, publisher = {IGI Global Publisher}, address = {Hershey}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa}, editor = {Nikolaos Preve} } @booklet {261, title = {Open and Interoperable Clouds: the Cloud@Home Way}, journal = {Cloud Computing: Principles, Systems and Applications}, year = {2010}, pages = {93{\textendash}111}, publisher = {Springer-Verlag}, address = {Heidelberg}, doi = {10.1007/978-1-84996-240-4_6}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa}, editor = {Lee Gillam-Nick Antonopoulos} } @proceedings {282, title = {Performance evaluation of gLite Grids through GSPNs}, journal = {IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS}, volume = {21}, year = {2010}, pages = {1611{\textendash}1625}, abstract = {

Grid Computing supports the shared and coordinated use of several resources in dynamic Virtual Organizations. In the last few years, it is evolving into a business-innovating technology that is driving commercial adoption. Such a new scenario calls for powerful strategies able to guarantee stringent QoS requirements in order to meet Service Level Agreements (SLAs) between customers and providers. For this reason, it is necessary to analyze and predict performance with respect to different load conditions or management strategies. In this paper, we present a methodology to analyze performance in gLite Grids through the use of Generalized Stochastic Petri Nets (GSPNs). We introduce a cluster-level model of a typical gLite site taking into account the coexistence between normal and MPI-based jobs. We investigate the influence of different strategies (e. g., scheduling) on the performance of the whole site, highlighting aspects related to both customer and provider point of views. We also provide a business-oriented performance analysis introducing two different SLA typologies and highlighting how the site configuration may influence the expected profit of the service provider.

}, keywords = {generalized stochastic petri nets, gLite middleware, Grid computing, MPI-based jobs, performance measurements, service level agreement}, doi = {10.1109/TPDS.2010.35/10.1109/TPDS.2010.35}, author = {D. Bruneo and Marco Scarpa and A. Puliafito} } @booklet {283, title = {Achieving Information Security in Network Computing Systems}, journal = {Dependable, Autonomic and Secure Computing, 2009. DASC {\textquoteright}09. Eighth IEEE International Conference on}, year = {2009}, month = {14}, pages = {71{\textendash}77}, publisher = {IEEE Computer Society}, address = {Washington, DC}, doi = {10.1109/DASC.2009.146}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {286, title = {Artificial Intelligence And Synchronization In Wireless Sensor Networks}, journal = {JOURNAL OF NETWORKS}, volume = {4}, year = {2009}, pages = {382{\textendash}391}, abstract = {The basic concept behind a Wireless Sensor Network is to deploy a large number of sensor nodes able to acquire and process data. Most of WSNs applications require sensor nodes to maintain local clocks both to determine the events order and to provide temporal information to measured data. Thus, providing a powerful synchronization system is one of the most important goals to be pursued if an efficient utilization of sensor networks has to be addressed. In order to achieve this goal, applications generally require a synchronization precision close to Milli seconds. This paper proposes a novel synchronization system based on Kohonens Self Organizing Maps (SOMs), able to provide some Artificial Intelligence features to sensor nodes. A SOM is a particular neural network that learns to classify data without any supervision. In each sensor node, a SOM is implemented to evaluate the sensor node time, using a very little amount of storage and computing resources. In a scenario where thousands of sensor nodes are placed, this system evaluates the time of each sensor in a distributed manner, assuming a very little percentage of nodes knowing their actual time, thus ensuring an effective clock synchronization among all the sensors.}, keywords = {neural networks, synchronization, Wireless sensor networks}, doi = {10.4304/jnw.4.6.382-391}, author = {L. Paladina and A. Biundo and Marco Scarpa and A. Puliafito} } @booklet {285, title = {Cloud@Home: Bridging the Gap between Volunteer and Cloud Computing}, journal = {Emerging Intelligent Computing Technology and Applications}, volume = {5754/2009}, year = {2009}, month = {19}, pages = {423{\textendash}432}, publisher = {Springer}, address = {Heidelberg}, doi = {10.1007/978-3-642-04070-2}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {295, title = {Developing High Quality Software}, journal = {INTERNATIONAL JOURNAL OF PARALLEL, EMERGENT AND DISTRIBUTED SYSTEMS}, volume = {24}, year = {2009}, pages = {171{\textendash}187}, doi = {10.1080/17445760802544110}, author = {Marco Scarpa and A. Puliafito} } @booklet {289, title = {Implementing Data Security In Grid Environment}, year = {2009}, month = {1 July 2009}, pages = {177{\textendash}182}, author = {V. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @proceedings {292, title = {Mobile Middleware In Enterprise Systems}, journal = {Handbook of Enterprise Integration}, year = {2009}, pages = {115{\textendash}132}, publisher = {Mostafa Hashem Sherif}, address = {Tinton Falls, New Jersey, USA}, author = {D. Bruneo and A. Puliafito and Marco Scarpa and A. Zaia}, editor = {Mostafa Hashem Sherif} } @booklet {290, title = {A Multi-sink Swarm-based Routing Protocol For Wireless Sensor Networks}, journal = {Computers and Communications, 2009. ISCC 2009. IEEE Symposium on}, year = {2009}, month = {8 2009}, pages = {28{\textendash}33}, publisher = {IEEE Computer Society}, address = {Washington, DC}, doi = {10.1109/ISCC.2009.5202301}, author = {A. Puliafito and Marco Scarpa and L. Paladina and M. Paone} } @booklet {296, title = {Robot Certificates And Visualgrid With Genius Grid Portal}, year = {2009}, month = {6 March 2009}, pages = {1{\textendash}2}, publisher = {EGEE and Open Grid Forum (OGF)}, author = {M. Iacono-Manno and G. Andronico and G. Minutoli and A. Puliafito and G. Iellamo and Marco Scarpa and M. Paone} } @booklet {284, title = {Volunteer Computing And Desktop Cloud: The Cloud@home Paradigm}, journal = {Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on}, year = {2009}, month = {11}, pages = {134{\textendash}139}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, doi = {10.1109/NCA.2009.41}, author = {V. D. Cunsolo and S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {298, title = {Advantages in Synchronization for Wireless Sensor Networks}, journal = {3RD INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1-2}, year = {2008}, month = {9 May 2008}, pages = {160{\textendash}164}, publisher = {IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667}, address = {Piscataway, NJ}, abstract = {Providing efficient mechanisms to reduce consuming power and optimize computing resources is one of the most important goals to be pursued when an efficient utilization of sensor networks has to be addressed. To reduce power consumption at the MAC level, sensor networks usually make use of a scheduled contention protocol that adopts listen/sleep cycles. Cycles synchronization can improve performance, although in a sensor network with hundreds of nodes a predefined synchronization degree will determine a huge power consumption due to messages overhead. This paper aims to analyze advantages and disadvantages of cycles synchronization. It provides some rules that help to select and configure a MAC level protocol or a synchronization algorithm with the aim to maximize the network performance.}, doi = {10.1109/ISWPC.2008.4556188}, author = {L. Paladina and Marco Scarpa and A. Puliafito} } @proceedings {297, title = {A GSPN Model To Analyze Performance Parameters in Glite Grids}, journal = {Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2008. WETICE {\textquoteright}08. IEEE 17th}, year = {2008}, month = {25, 2008}, pages = {198{\textendash}203}, publisher = {IEEE CS}, address = {Washington, DC}, abstract = {

Winner of the ETNGRID 2008 workshop best paper awardWinner of the ETNGRID 2008 workshop best paper awardWinner of the "ETNGRID best paper award" - ISSN:

}, doi = {10.1109/WETICE.2008.39}, author = {D. Bruneo and Marco Scarpa and A. Puliafito} } @booklet {291, title = {Self Organizing Maps For Synchronization In Wireless Sensor Networks}, journal = {New Technologies, Mobility and Security, 2008. NTMS {\textquoteright}08.}, year = {2008}, month = {7 november 2008}, pages = {1{\textendash}6}, publisher = {IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667}, address = {Piscataway, NJ}, author = {L. Paladina and A. Biundo and Marco Scarpa and A. Puliafito} } @booklet {270, title = {A Grid-based Algorithm For The Solution Of Non Markovian Stochastic Petri Nets}, journal = {CONCURRENCY AND COMPUTATION}, volume = {19}, year = {2007}, pages = {1353{\textendash}1370}, abstract = {WebSPN is a modeling tool for the analysis of non-Markovian stochastic Petri nets that we developed some years ago. Its solution algorithm is based on a discretization of time and an approximation of non-exponentially distributed firing time transitions by means of the phase-type distributions. In order to solve the problems related to the management of the state space (which can become very large) we parallelized the solution algorithm through the MPICH libraries. To improve the MPICH parallel implementation with an adequate security management, a more efficient load distribution and fault-tolerance capabilities, in this paper we propose the porting of WebSPN from the MPI to the Grid computational paradigm. In addition to a better flexibility in accessing computational and storage resources, one of the main advantages is the introduction of a fault recovery system to detect and recover from potential machine faults. The resulting new tool is named GridSPN.}, keywords = {DPH, Globus, Grid, MPI, MPICH-G2, non-markovian stochastic Petri net, parallel computation}, doi = {10.1002/cpe.1105}, author = {Marco Scarpa and A. Puliafito and S. Distefano} } @proceedings {304, title = {Mobile Middleware: Definition and Motivations}, journal = {The Handbook of Mobile Middleware}, year = {2006}, pages = {145{\textendash}167}, publisher = {Auerbach (CRC press)}, address = {NEW YORK}, author = {Bruneo D. and Marco Scarpa and A. Puliafito}, editor = {BELLAVISTA P.; CORRADI A. EDS} } @booklet {267, title = {GridSPN: a Grid-based non-Markovian Petri nets tool}, journal = {Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on}, year = {2005}, pages = {331{\textendash}336}, publisher = {IEEE}, address = {Piscataway, NJ}, doi = {10.1109/WETICE.2005.39}, author = {S. Distefano and A. Puliafito and Marco Scarpa} } @booklet {266, title = {Software Performance Analysis in UML models}, year = {2005}, pages = {115{\textendash}125}, publisher = {IEEE}, doi = {10.1109/FIRB-PERF.2005.19}, author = {S. Distefano and A. Puliafito and Marco Scarpa} } @proceedings {307, title = {Communication Paradigms for Mobile Grid Users}, journal = {Cluster Computing and the Grid, 2003. Proceedings. CCGrid 2003. 3rd IEEE/ACM International Symposium on}, year = {2003}, month = {15}, pages = {669{\textendash}676}, publisher = {IEEE / Institute of Electrical and Electronics Engineers Incorporated:445 Hoes Lane:Piscataway, NJ 08854:(800)701-4333, (732)981-0060, EMAIL: subscription-service@ieee.org, INTERNET: http://www.ieee.org, Fax: (732)981-9667}, address = {Piscataway, NJ}, author = {D. Bruneo and A. Puliafito and Marco Scarpa and A. Zaia} } @booklet {258, title = {A parallel approach for the solution of non Markovian Petri nets}, journal = {Recent Advances in Parallel Virtual Machine and Message Passing Interface}, volume = {2840}, year = {2003}, month = {October 2}, pages = {196{\textendash}203}, publisher = {Springer}, address = {Heidelberg}, doi = {10.1007/978-3-540-39924-7_29}, author = {Marco Scarpa and A. Puliafito and S. Distefano} } @booklet {308, title = {Analysis and Evaluation of non-Markovian Stochastic Petri Nets}, journal = {Computer Performance Evaluation.Modelling Techniques and Tools}, volume = {1786}, year = {2000}, month = {31}, pages = {171{\textendash}187}, publisher = {Springer}, address = {Heidelberg}, abstract = {In order to extend their applicability to more complex situations, in this paper we present a new approach for the analysis of non-Markovian Stochastic Petri Net (NMSPN) models, which is based on a discrete time approximation of the stochastic behavior of the marking process. The proposed approach, which resulted in a new modeling tool for the analysis of NMSPNs called WebSPN, allows to analyze a wider class of PN models with prd, prs and pri concurrently enabled generally distributed transitions. This implies the possibility of dealing with very complex systems with arbitrarily distributed events with very complex interrelations among each other. The adopted technique is described, an application example is solved and the results are carefully analyzed in order to demonstrate the validity of the proposed approach.}, author = {A. HORWART and A. Puliafito and Marco Scarpa and M. TELEK} } @booklet {309, title = {An analytical comparison of the client-server, remote evaluation and mobile agents protocols}, journal = {First International Symposium on Agent Systems and Applications, 1999 and Third International Symposium on Mobile Agents. Proceedings.}, year = {1999}, month = {06 Oct 1999}, pages = {278{\textendash}292}, abstract = {We deal with the study of the actual convenience of using the agent programming paradigm for accessing distributed service. We point out the benefits of such a communication paradigm by providing an analytical study of its basic features in comparison with the client-server approach and remote evaluation. The results that we have obtained show how agents must not always be considered the only solution to any communication issue, since in several cases their use might even reveal a drawback. We present several models of non-Markovian Petri nets, which have been solved through the WebSPN tool, and we provide a close comparison between the agent techniques (client-server and remote evaluation). We also focus our attention on providing some practical remarks which can help the developer during the design, in order to select the communication paradigm which best suits the features of the application that has to be developed}, doi = {10.1109/ASAMA.1999.805420}, author = {A. Puliafito and S. RICCOBENE and Marco Scarpa} } @booklet {314, title = {Design and implementation of a WEB-based non-Markovian stochastic Petri net tool}, journal = {Advances in Computer and Information Sciences {\textquoteright}98}, volume = {53}, year = {1998}, pages = {101{\textendash}109}, publisher = {IOS PRESS}, address = {Amsterdam}, author = {A. HORVATH and A. Puliafito and Marco Scarpa and M. TELEK and O. TOMARCHIO} } @booklet {315, title = {WebSPN: A WEB-accessible Petri Net Tool}, journal = {Int. Conf. on WEB based Modeling and Simulation}, year = {1998}, month = {14}, pages = {121{\textendash}126}, publisher = {The Society for Modeling \& Simulation International (SGS)}, doi = {10.1.1.56.2787}, author = {A. BOBBIO and A. Puliafito and Marco Scarpa and M. TELEK} } @booklet {316, title = {Reliability Analysis of a Redundant Database for UMTS Systems}, journal = {IEEE Petri Nets Performance Models (PNPM{\textquoteright}97)}, year = {1997}, month = {6}, pages = {247{\textendash}256}, publisher = {IEEE Computer Society}, address = {Washington, DC}, author = {S. PALAZZO and A. Puliafito and Marco Scarpa} } @booklet {299, title = {Evaluation of Performability Parameters in Client-Server Environments}, journal = {COMPUTER JOURNAL}, volume = {39}, year = {1996}, author = {A. Puliafito and S. RICCOBENE and Marco Scarpa} } @booklet {318, title = {Modeling of client-server systems}, journal = {Modeling Analysis and Simulation of Comp. and Telecom. Systems (MASCOT95)}, year = {1995}, month = {20 January}, pages = {340{\textendash}344}, publisher = {IEEE Press}, author = {A. Puliafito and S.RICCOBENE and Marco Scarpa} }