

{"id":1140,"date":"2021-06-22T16:11:21","date_gmt":"2021-06-22T14:11:21","guid":{"rendered":"https:\/\/tsp.iit.cnr.it\/?page_id=1140"},"modified":"2021-06-30T15:02:14","modified_gmt":"2021-06-30T13:02:14","slug":"distributed-systems-security","status":"publish","type":"page","link":"https:\/\/tsp.iit.cnr.it\/en\/research\/distributed-systems-security\/","title":{"rendered":"Distributed Systems Security"},"content":{"rendered":"<p><strong>Distributed systems<\/strong> have become increasingly common in recent years because of the multiple advantages they bring, such as <strong>scalability, flexibility, and reliability<\/strong>. Many modern IT systems are based on a distributed architecture, following the paradigms of <strong>public or hybrid Cloud<\/strong>, of <strong>Edge Computing<\/strong>, of <strong>Peer-to-Peer networks<\/strong>, or even combination of them, such as the <strong>distributed Cloud<\/strong>.\u00a0<br><br><strong>Our research activity focuses on several security aspects of distributed systems<\/strong>. In particular, <strong>we work on the design and the implementation of access control models<\/strong> tackling the needs of several distributed systems, also taking into account heterogeneous ones, i.e., systems composed of nodes\/devices that are heterogeneous from the computational capabilities and\/or from the information types and availability points of view. We also study how to extend such access control systems to cover usage control as well, thus <strong>being able to detect and react to violations while the accesses are in progress<\/strong>, hence significantly enhancing the security of dynamic distributed systems. <br>We also investigate <strong>distributed intrusion detection models<\/strong>, aimed at enhancing the accuracy of traditional intrusion detection techniques by taking into account and properly organizing and processing the features collected from all the nodes of the system. Furthermore, <strong>the definition of techniques for preserving data privacy in dynamic peer to peer environments<\/strong>, e.g., in Distributed Online Social Networks just to mention one, is a further research topic of our interest.<\/p>","protected":false},"excerpt":{"rendered":"<p>Distributed systems have become increasingly common in recent years because of the multiple advantages they bring, such as scalability, flexibility, and reliability. Many modern IT systems are based on a distributed architecture, following the paradigms of public or hybrid Cloud, of Edge Computing, of Peer-to-Peer networks, or even combination of them, such as the distributed [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1135,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"pagina_con_sottopagine.php","meta":{"footnotes":""},"class_list":["post-1140","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=1140"}],"version-history":[{"count":2,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1140\/revisions"}],"predecessor-version":[{"id":1216,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1140\/revisions\/1216"}],"up":[{"embeddable":true,"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/pages\/1135"}],"wp:attachment":[{"href":"https:\/\/tsp.iit.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=1140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}