Arias-Cabarcos, Patricia; Almenares, Florina; Sánchez-Guerrero, Rosa; Marin, Andrés; Díaz-Sánchez, Daniel Multi-device Single Sign-on for cloud service continuity Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: authentication, computing paradigm, synchronization Bernabé-Sánchez, Iván; Díaz-Sánchez, Daniel; Muñoz-Organero, Mario Optimizing resources on gateways using OSGi Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: p2p network, raudo2, Security, software García-Rubio, Carlos; Familiar, Miguel; Martínez, Jose; Corredor, Ivan Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective Journal Article In: COMPUTER NETWORKS, vol. 56, iss. 4, pp. 1303-1328, 2012, ISSN: 1389-1286. Abstract | Links | BibTeX | Tags: battery, location tracking, middleware, Pervasive computing, wireless sensor Sánchez, Rosa; Almenares, Florina; Arias, Patricia; Díaz-Sánchez, Daniel; Marín, Andrés Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols Rodriguez-Carrion, Alicia; Campo-Vázquez, Celeste; García-Rubio, Carlos Recommendations on the Move. In: Recommender Systems for the Social Web Book Chapter In: pp. 179-193, Springer International Publishing, Recommender Systems for the Social Web, 2012, ISBN: 978-3-642-25693-6. Abstract | Links | BibTeX | Tags: current location, global position system, mobile phone, prediction algorithm, recommender system Yndurain-Gil, Elena; Bernhardt, D; Campo-Vázquez, Celeste Augmenting Mobile Search Engines to Leverage Context Awareness Journal Article In: IEEE Internet Computing, vol. 16, iss. 2, pp. 17-25, 2012, ISSN: 1089-7801. Abstract | Links | BibTeX | Tags: Mobile communication, search process, Ubiquitous computing Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Marín-López, Andrés; Arias-Cabarcos, Patricia; Almenares-Mendoza, Florina Improving privacy in identity management systems for health care scenarios Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-8th, 2011, Riviera Maya, Mexico, UCAMI, 2011, ISBN: 978-84-694-9677-0. Abstract | Links | BibTeX | Tags: anonymity, delegation, desarrollodespliegue, federation, health care, identity management, privacy, Pseudonymity, user-centric Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenares-Mendoza, Florina; López, Andrés Marín-; Arias-Cabarcos, Patricia; Proserpio, Davide An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Abstract | Links | BibTeX | Tags: authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste; Cortés, Alberto; García-Lozano, Estrella; Noriega-Vivas, Patricia Analysis of Location Prediction Performance of LZ Algorithms using GSM Cell-based Location Data Conference 5th International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), UCAMI, 2011. Abstract | Links | BibTeX | Tags: españavirtual, GSM, gsm-based location, lz, LZ Algorithms, prediction, predictions Sanvido, Fabio; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Marín-López, Andrés Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures Proceedings Article In: UBICOMM 2011 : The Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 165 - 168, 2011, ISBN: 978-1-61208-171-7 . Abstract | Links | BibTeX | Tags: ontology interoperability, SAML, semantic policy, semantic services Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenarez, Florina; Arias, Patricia; Proserpio, Davide; Marín, Andrés Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. Abstract | Links | BibTeX | Tags: authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX Díaz-Sánchez, Daniel; Almenarez, Florina; Marín, Andrés; Arias, Patricia; Sánchez-Guerrero, Rosa; Sanvido, Fabio A privacy aware media gateway for connecting private multimedia clouds to limited devices Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. Abstract | Links | BibTeX | Tags: Cloud computing, emadrid, multimedia, privacy, streaming Díaz-Sánchez, Daniel; Sánchez, Rosa; Arias, Patricia; Sánchez, Iván Bernabé; Almenares, Florina Family Personalization Service Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), pp. 145-149, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: group modeling, personalization, privacy aware, raudo2 Marin, Andres; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Sanvido, Fabio Consumer electronics for social video services Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: bluetooth, Protocols, usability Sanvido, Fabio; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Marín-López, Andrés A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Abstract | BibTeX | Tags: Cloud computing, future internet, identity management, raudo2, Security, trust Bernabé-Sánchez, Iván; Díaz-Sánchez, Daniel; Muñoz-Organero, Mario Using XMPP to Federate Multimedia UPnP Devices Proceedings Article In: XIII Jornadas de ARCA.: Sistemas cualitativos y sus aplicaciones en Diagnosis, Robótica e Inteligencia Ambiental, pp. 62-67, 2011, ISBN: 978-84-615-5513-0. BibTeX | Tags: Noriega-Vivas, Patricia; Campo-Vázquez, Celeste; García-Rubio, Carlos; García-Lozano, Estrella Supporting L3 Femtocell Mobility Using the MOBIKE Protocol Conference Second International Conference on Access Network (ACCESS 2011), IARIA XPS, 2011, ISBN: 978-1-61208-142-7. Abstract | Links | BibTeX | Tags: femtocell architecture, mobile femtocell Cortés, Alberto; García-Rubio, Carlos; Campo-Vázquez, Celeste; García-Lozano, Estrella; Rodriguez-Carrion, Alicia Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. Abstract | Links | BibTeX | Tags: EasyWireless, iteaeasywireless, network interface, Pervasive computing Proserpio, Davide; Díaz-Sánchez, Daniel; Almenárez, Florina; Marín, Andrés; Guerrero, Rosa Sánchez Achieving IPTV Service Portability through Delegation Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 492 - 498, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Authorization, Hardware, IPTV, Protocols, prototiposNFC, Servers, Subscription Díaz-Sánchez, Daniel; Almenarez, Florina; Marín, Andrés; Proserpio, Davide; Cabarcos., Patricia Arias Media Cloud: An Open Cloud Computing Middleware for Content Management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 970 - 978, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Cloud computing, Home Automation, Indexes, Media, netlab, Protocols, Social network services Almenárez, Florina; Arias, Patricia; Díaz-Sánchez, Daniel; Marín, Andrés; Sánchez., Rosa fedTV: Personal Networks Federation for IdM in Mobile DTV Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 499 - 506, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: anot, anotacionsemantica, authentication, Digital TV, identity management, Mobile communication, Mobile computing, mobile DTV, Mobile handsets, Personal Network Federation, SAML, Trust management Proserpio, Davide; Sanvido, Fabio; Diaz-Sanchez, Daniel; Marin, Andrés IPTV meets delegation: Achieving IPTV service portability Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Access control, emadrid, home network, IPTV, Protocols Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel Presence-aware personalized television Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: bluetooth, Security, tv broadcasting Almenares, Florina; Marin, Andrés; Diaz-Sanchez, Daniel; Arias, Patricia Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: authentication, Digital TV, Protocols Diaz-Sanchez, Daniel; Almenares, Florina; Marin, Andrés; Proserpio, Davide Media Cloud: Sharing contents in the large Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Access control, Cloud computing, media cloud Cabarcos, Patricia Arias; Guerrero, Rosa Sánchez; Mendoza, Florina Almenárez; Díaz-Sánchez, Daniel; López, Andrés Marín FamTV: An Architecture for Presence-Aware Personalized Television Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 1, pp. 6-13, 2011, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: content personalization, Digital TV, identity management, presence detection Proserpio, Davide; Sanvido, Fabio; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel; Marín-López, Andrés Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. Abstract | Links | BibTeX | Tags: authentication, cryptography, IP networks, Protocols Díaz-Sánchez, Daniel; Almenárez, Florina; Marín, Andrés; Mikoczy, Eugen; Weik, Peter; Magedanz, Thomas An Identity Management Infrastructure for Secure Personalized IPTV Services Book Chapter In: vol. 46, pp. 668 - 683, Springer Berlin Heidelberg, 2011, ISBN: 978-3-642-17850-4. Abstract | Links | BibTeX | Tags: IdM, iptv security, netlab, NGN based IPTV Almenárez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos Trust management for multimedia P2P applications in autonomic networking Journal Article In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705. Abstract | Links | BibTeX | Tags: anotacionsemantica, Autonomic networking, ITACA, Multimedia P2P applications, Trust attacks, Trust management Rodriguez-Carrion, Alicia; García-Rubio, Carlos; Campo-Vázquez, Celeste Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks Journal Article In: IEEE COMMUNICATIONS LETTERS, vol. 14, iss. 8, pp. 707-709, 2010, ISSN: 1089-7798. Abstract | Links | BibTeX | Tags: cellular networks, location, lz, prediction Lampropoulos, Konstantinos; Diaz-Sanchez, Daniel; Almenares, Florina; Weik, Peter; Denazis, Spyros Introducing a cross federation identity solution for converged network environments Proceedings Article In: IPTComm '10: Principles, Systems and Applications of IP Telecommunications, pp. 1-12, 2010, ISSN: 1868-2634. Abstract | Links | BibTeX | Tags: communication hardware, dimands, Hardware, interfaces and storage, networks Díaz-Sánchez, Daniel; Almenárez, Florina; Marín, Andrés; Mikoczy, Eugen; Weik, Peter; Magedanz, Thomas An Identity Management Infrastructure for Secure Personalized IPTV Services Proceedings Article In: TRIDENTCOM 2010: International ICST Conference on Testbeds and Research Infrastructures for the
Development of Networks and Communities, pp. 1 - 10, Springer Berlin Heidelberg, 2010, ISBN: 3-642-17850-2. Abstract | BibTeX | Tags: IdM, iptv security, NGN based IPTV Díaz-Sánchez, Daniel; Marín, Andrés; Almenárez, Florina; Cortés, Alberto Socializing electronics: Secure interactions in social networks Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: privacy, Social network services Díaz-Sánchez, Daniel; Sanvido, Fabio; Proserpio, Davide; Marín, Andrés Extended DLNA protocol: Sharing protected pay TV contents Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: cryptography, Protection, Protocols Díaz-Sánchez, Daniel; Marín, Andrés; Almenárez, Florina; Cortés, Alberto Social applications in the home network Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 220-225, 2010, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: anotacionsemantica, credential management, home network, privacy in social networks, security policy Diaz-Sanchez, Daniel; Sanvido, Fabio; Proserpio, Davide; Marin, Andres DLNA, DVB-CA and DVB-CPCM integration for commercial content management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 79-87, 2010, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: anotacionsemantica, Conditional Access System, Consumer electronics, content protection, copy management, home network, Security, Telematics, User-generated content Proserpio, Davide; Sanvido, Fabio; Díaz-Sánchez, Daniel; Almenares, Florina; Marín, Andrés An Improved IMS Authentication Mechanism and its Cost Analysis Proceedings Article In: EUNICE 2009: Eunice International Workshop, The Internet of the Future, 2009. Forné, Jordi; Hinarejos, Francisca; Marín, Andrés; Almenárez, Florina; Lopez, Javier; Montenegro, Jose A.; Lacoste, Marc; Díaz, Daniel Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Abstract | Links | BibTeX | Tags: authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec Almenarez, Florina; Arias, Patricia; Marín, Andrés; Díaz, Daniel Towards dynamic trust establishment for identity federation Proceedings Article In: EATIS '09: Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, pp. 1-4, 2009, ISBN: 9781605583983. Abstract | Links | BibTeX | Tags: applied computing, enterprise computing, españavirtual, information system applications, information systems Diaz-Sanchez, Daniel; Marin, Andres; Almenarez, Florina; Cortes, Alberto Sharing Conditional Access Modules through the home network Proceedings Article In: 2009 Digest of Technical Papers International Conference on Consumer Electronics, Institute of Electrical and Electronics Engineers (IEEE), 2009, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Home Automation, Protection, smart cards Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones Conference Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008, SPRINGER, 2009, ISBN: 978-3-540-85866-9. Abstract | Links | BibTeX | Tags: camera smart phones, image processing, ITACA, J2ME, Symbian Díaz-Sánchez, Daniel; Marín, Andrés; Almenárez, Florina; Cortés, Alberto Sharing conditional access modules through the home network for pay TV access Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 55, iss. 1, no. 1, pp. 88-96, 2009, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Conditional Access System, content protection and sharing, descrambler registration protocol, home network, IPTV, prototipomiddleware Díaz-Sánchez, Daniel; Proserpio, Davide; Marín-López, Andrés; Almenárez-Mendoza, Florina; Weik, Peter A General IMS Registration Protocol for Wireless Networks Interworking Book Chapter In: Wireless and Mobile Networking, vol. 308, pp. 32 - 43, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Abstract | Links | BibTeX | Tags: authentication protocol, catedranokia, extensible authentication protocol, home network, integracionvertical, pseudo ramdon function, session initiation protocol Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Marín-López, Andrés; Díaz-Sánchez, Daniel Enabling SAML for Dynamic Identity Federation Management Book Chapter In: vol. 308, pp. 173 - 184, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Abstract | Links | BibTeX | Tags: identity provider, reputation score, trust decision, trust establishment, Trust Relationship, UICC-NFC Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Rodríguez-García, Francisco; López-Rizaldos, Joaquín; Cubero-Vega, Alfonso; Ormaetxea, Itziar; Luis-Lopez, Juan; Fernández, Sergio; Ortigosa, Fernando; Kotuliak, Ivan; Mikoczy, Eugen; Lahnalampi, Timo; Koski, Timo; Avessta, Sussana Interoperability of IP Multimedia Subsystems: The NetLab Approach Book Chapter In: IFIP Advances in Information and Communication Technology, vol. 308, pp. 20 - 31, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Abstract | Links | BibTeX | Tags: authentication and QoS in IMS, IMS interoperability, living labs, netlab Cortes, Alberto; Garcia-Rubio, Carlos; Campo, Celeste; Marin, Andres; Almenarez, Florina; Díaz, Daniel Decoupling path failure detection from congestion control to improve SCTP failovers Journal Article In: IEEE COMMUNICATIONS LETTERS, vol. 12, no. 11, pp. 858-860, 2008, ISSN: 1089-7798. Abstract | Links | BibTeX | Tags: computer network reliability, congestion control, recursoseducativos, Transport protocols García-Rubio, Carlos; Campo-Vázquez, Celeste The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective Book Chapter In: pp. 315-332, NOVA SCIENCE PUBLISHERS INC , 2008, ISBN: 978-1-60456-680-2. BibTeX | Tags: Pervasive computing Diaz-Sánchez, Daniel; Marín, Andrés; Almenárez, Florina; Cortes, Alberto DVB-H Key Management System for UMTS Capable Devices Proceedings Article In: 2008 Digest of Technical Papers - International Conference on Consumer Electronics, Institute of Electrical and Electronics Engineers (IEEE), 2008, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: 3G, cryptography, Digital video broadcasting, Protection, visualizacioncontenidosTDT Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto Descubrimiento de servicios en redes MANET con y sin soporte multicast Conference VII Jornadas de ingeniería telemática (JITEL 2008), 2008. BibTeX | Tags: Almenarez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7. Abstract | Links | BibTeX | Tags: anotacionsemantica, middleware, peer to peer computing, Pervasive computing2012
@inproceedings{pa018,
title = {Multi-device Single Sign-on for cloud service continuity},
author = {Patricia Arias-Cabarcos and Florina Almenares and Rosa Sánchez-Guerrero and Andrés Marin and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/6162011},
doi = {https://doi.org/10.1109/ICCE.2012.6162011},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes a novel middleware architecture that allows security sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.},
keywords = {authentication, computing paradigm, synchronization},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa016,
title = {Optimizing resources on gateways using OSGi},
author = {Iván Bernabé-Sánchez and Daniel Díaz-Sánchez and Mario Muñoz-Organero},
url = {https://ieeexplore.ieee.org/document/6161957},
doi = {https://doi.org/10.1109/ICCE.2012.6161957},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {There are lots of devices and services inside a home which have to be managed. OSGi platforms alleviate this management by installing some services on a gateway located at home. A service provider might manage those services as part of a package of services. In general, OSGi platforms are connected to centralized repositories facilitating the maintenance by service providers. However, when various service providers work on a given gateway the number of services and components installed in it increases. This sometimes leads to inconsistencies as duplicate components that might cause performance problems or service interruptions. This paper presents a system for analyzing and automatically optimizing the components deployed on a OSGi home gateway.},
keywords = {p2p network, raudo2, Security, software},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{garciarubio005,
title = {Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective},
author = {Carlos García-Rubio and Miguel Familiar and Jose Martínez and Ivan Corredor},
doi = {https://doi.org/10.1016/j.comnet.2011.12.005},
issn = {1389-1286},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
journal = {COMPUTER NETWORKS},
volume = {56},
issue = {4},
pages = {1303-1328},
publisher = {Computer Network},
abstract = {The increase in physical resources for the next-generation of embedded computing devices, as well as in the efforts carried out by the scientific and research communities, is paving the way for Smart Infrastructures based on Wireless Sensor Networks. In such manner, not only open and formally defined Service-Oriented Frameworks are required, but also efficient middleware technologies that ease the development of new sensor-based services. From the cornerstone analysis of pervasive computing principles applied to Smart Spaces creation, this article presents the μSMS (micro Subscription Management System) middleware. This approach specifies and develops the notion of virtual sensor services created for Smart Environments over sensor networks from tiny in-network services based on agent technology. In the framework of the μSWN European Research Project, this architecture has been validated in a Smart Hospital real-world scenario using a healthcare virtual sensor service. Considering such purpose, medical status monitoring, location tracking and perimeter surveillance agent-based services have been developed. This study is concluded by a comparative analysis of the system considering memory overhead, packet delivery ratio, average end-to-end delay and battery lifetime as evaluation metrics. The results show a lightweight middleware implementation with good overall system and network performance.},
keywords = {battery, location tracking, middleware, Pervasive computing, wireless sensor},
pubstate = {published},
tppubtype = {article}
}
@article{almenarez003,
title = {Enhancing privacy and dynamic federation in IdM for consumer cloud computing},
author = {Rosa Sánchez and Florina Almenares and Patricia Arias and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6170060
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6170060},
doi = {https://doi.org/10.1109/TCE.2012.6170060},
issn = {0098-3063},
year = {2012},
date = {2012-02-01},
urldate = {2012-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {1},
pages = {95-103},
abstract = {Consumer cloud computing paradigm has emerged as the natural evolution and integration of advances in several areas including distributed computing, service oriented architecture and consumer electronics. In this complex ecosystem, security and identity management challenges have cropped up, given their dynamism and heterogeneity. As a direct consequence, dynamic federated identity management with privacy improvements has arisen as an indispensable mechanism to enable the global scalability and usability that are required for the successful implantation of Cloud technologies. With these requirements in mind, we present an IdM architecture based on privacy and reputation extensions compliance with the SAMLv2/ID-FF standards.},
keywords = {authentication, Cloud computing, Computer architecture, context, desarrollodespliegue, privacy, Protocols},
pubstate = {published},
tppubtype = {article}
}
@inbook{campo012,
title = {Recommendations on the Move. In: Recommender Systems for the Social Web},
author = {Alicia Rodriguez-Carrion and Celeste Campo-Vázquez and Carlos García-Rubio},
url = {https://doi.org/10.1007/978-3-642-25694-3},
doi = {https://doi.org/10.1007/978-3-642-25694-3_9},
isbn = {978-3-642-25693-6},
year = {2012},
date = {2012-01-21},
urldate = {2012-01-21},
pages = {179-193},
publisher = {Springer International Publishing},
edition = {Recommender Systems for the Social Web},
abstract = {Recommender systems can take advantage of the user’s current location in order to improve the recommendations about places the user may be interested in. Taking a step further, these suggestions could be based not only on the user’s current location, but also on the places where the user is supposed to be in the near future, so the recommended locations would be on the path the user is going to follow. In order to do that we need some location prediction algorithms so that we can get those future locations. In this chapter we explain how to use the algorithms belonging to LZ family (LZ, LeZi Update and Active LeZi) as recommender engines, and we propose some ways of using these algorithms in places where the user has not been before or how to take advantage of the social knowledge about certain place so as to make these recommendations richer. Finally we show a prototype implementation of a recommender system for touristic places made up of these LZ predictors.},
keywords = {current location, global position system, mobile phone, prediction algorithm, recommender system},
pubstate = {published},
tppubtype = {inbook}
}
@article{campo010,
title = {Augmenting Mobile Search Engines to Leverage Context Awareness },
author = {Elena Yndurain-Gil and D Bernhardt and Celeste Campo-Vázquez},
url = {https://ieeexplore.ieee.org/document/6133261},
doi = {https://doi.org/10.1109/mic.2012.17},
issn = {1089-7801},
year = {2012},
date = {2012-01-17},
urldate = {2012-01-17},
journal = {IEEE Internet Computing},
volume = {16},
issue = {2},
pages = {17-25},
abstract = {Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through mobile than conventional desktop computers. Internet search is likely going to remain one of the major ways to find information and services on the web. In order to provide satisfactory usability, mobile searches will have to take into consideration the nature of handsets. Being both pervasive and person-centric they continuously capture information about users and their context. Context awareness can enhance the mobile search experience by augmenting user queries with context information captured through the handset's sensors. In this paper we propose a unified architecture supporting context-awareness in mobility and show how it can be applied to mobile searches. Based on real life contextual data captured from handsets we discuss design approaches and end-user benefits of making mobile searches more context-aware.Mobile phones are becoming the chosen platforms for web access, with a forecast that over the coming decade more users will connect to the internet through mobile than conventional desktop computers. Internet search is likely going to remain one of the major ways to find information and services on the web. In order to provide satisfactory usability, mobile searches will have to take into consideration the nature of handsets. Being both pervasive and person-centric they continuously capture information about users and their context. Context awareness can enhance the mobile search experience by augmenting user queries with context information captured through the handset's sensors. In this paper we propose a unified architecture supporting context-awareness in mobility and show how it can be applied to mobile searches. Based on real life contextual data captured from handsets we discuss design approaches and end-user benefits of making mobile searches more context-aware.},
keywords = {Mobile communication, search process, Ubiquitous computing},
pubstate = {published},
tppubtype = {article}
}
2011
@inproceedings{pa033,
title = {Improving privacy in identity management systems for health care scenarios},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Andrés Marín-López and Patricia Arias-Cabarcos and Florina Almenares-Mendoza},
url = {http://hdl.handle.net/10016/13102},
isbn = {978-84-694-9677-0},
year = {2011},
date = {2011-12-27},
urldate = {2011-12-27},
booktitle = {Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-8th, 2011, Riviera Maya, Mexico},
publisher = {UCAMI},
abstract = {Privacy is a very complex and subjective concept with different meaning to different people. The meaning depends on the context. Moreover, privacy is close to the user information and thus, present in any ubiquitous computing scenario. In the context of identity management (IdM), privacy is gaining more importance since IdM systems deal with services that requires sharing attributes belonging to users’ identity with different entities across domains. Consequently, privacy is a fundamental aspect to be addressed by IdM to protect the exchange of user attributes between services and identity providers across different networks and security domains in pervasive computing. However, problems such as the effective revocation consent, have not been fully addressed. Furthermore, privacy depends heavily on users and applications requiring some degree of flexibility. This paper analyzes the main current identity models, as well as the privacy support presented by the identity management frameworks. After the main limitations are identified, we propose a delegation protocol for the SAML standard in order to enhance the revocation consent within healthcare scenarios.},
keywords = {anonymity, delegation, desarrollodespliegue, federation, health care, identity management, privacy, Pseudonymity, user-centric},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa034,
title = {An identity aware wimax personalization for pervasive computing services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenares-Mendoza and Andrés Marín- López and Patricia Arias-Cabarcos and Davide Proserpio },
url = {http://hdl.handle.net/10016/13098
https://e-archivo.uc3m.es/bitstreams/685697a7-32a6-45e9-b60c-913dad70d44e/download},
isbn = {978-84-694-9677-0},
year = {2011},
date = {2011-12-27},
urldate = {2011-12-27},
booktitle = {Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico.},
publisher = {UCAMI},
abstract = {Mobile Internet access is becoming more and more pervasive in the new 4G scenarios, where WiMAX is to play a crucial role. WiMax has advantages when considering both energy consumption and bandwidth, when compared with HSDPA and LTE. However, we have found some limitations in IEEE 802.16 security support, which may limit authentication and authorization mechanisms for ubiquitous service development. In this article we analyze weaknesses and vulnerabilities we have found in WiMAX security. WiMax, with the adequate identity management support, could be invaluable for developing new pervasive computing services. We propose the introduction of identity management in WiMAX, as a pervious step to the definition of identity aware WiMax personalization of pervasive computing services.},
keywords = {authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@conference{campo024,
title = {Analysis of Location Prediction Performance of LZ Algorithms using GSM Cell-based Location Data},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez and Alberto Cortés and Estrella García-Lozano and Patricia Noriega-Vivas},
url = {https://hdl.handle.net/10016/13103
https://e-archivo.uc3m.es/bitstreams/66c1a251-8ce0-4a0f-b342-86a8b45e60e8/download},
year = {2011},
date = {2011-12-20},
urldate = {2011-12-20},
booktitle = {5th International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAMI 2011)},
publisher = {UCAMI},
abstract = {Predictions about users' next locations allow bringing forward their future context, thus having additional time to react. To make such predictions, algorithms capable of learning mobility patterns and estimating the next location are needed. This work is focused on making the predictions on mobile terminals, thus resource consumption being an important constraint. Among the predictors with low resource consumption, the family of LZ algorithms has been chosen to study their performance, analyzing the results drawn from processing location records of 95 users. The main contribution is to divide the algorithms into two phases, thus being possible to use the best combination to obtain better prediction accuracy or lower resource consumption.},
keywords = {españavirtual, GSM, gsm-based location, lz, LZ Algorithms, prediction, predictions},
pubstate = {published},
tppubtype = {conference}
}
@inproceedings{pa021,
title = {Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures},
author = {Fabio Sanvido and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Andrés Marín-López
},
url = {https://d1wqtxts1xzle7.cloudfront.net/83301598/download_full-libre.pdf?1649227962=&response-content-disposition=inline%3B+filename%3D2011_Technical_Program_Committee_PECES_2.pdf&Expires=1712232629&Signature=VNZB3mTjl0twRnbwVDjheAym0V2F-5MxmOZn9hlYyDBFGrPQ6xahSqA~DoWxky9SL5qicmVX2u9cpKqLmk39IRcwzDt7QW4kIBlJrOHMHHU1XzQxcz6e-1jFvsHPLexu6T-vxyEWvcDR-9iFKKU1LzJdoNxCm09EpG5JQB0TAQGqCI5HYnLSXdYGQHSJhTse1og0Ap2cN7nZcKakGIUfky5dytM24gegfmiZv2hoegIxrx2V~KY0WnfCx1RqcNQ~wtiS8VnG4w5ha7YrNl7HEpwVn9ut~dINxDp81uBEK-eaRpXm0cyWkq9vd2N0l2Y4zp~WWFtl5HrIzPciziTW6A__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA#page=178},
isbn = {978-1-61208-171-7 },
year = {2011},
date = {2011-12-12},
booktitle = {UBICOMM 2011 : The Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies},
pages = {165 - 168},
abstract = {The approach of users connected anytime, anywhere, has led to merging isolated islands of enriched services environments into the WEB, leaving the user free to choose among an huge number of services. In this context the introduction of ontologies and the creation of semantic Web services mainly focus on using reasoners and planning algorithms to achieve automation in basic processes as discovery, composition and invocation. Nevertheless, there is a problem in standardizing one unique ontology that rises in alignment issues between the domain-specific ontologies on which semantic web service description language eventually rely. Moreover, there is no standardized processes that properly face privacy problem when participants require a graduate disclosure of domain sensitive information. We argue in this paper that a negotiation layer that could connect service consumer and service provider is necessary in order to overcome such limitations. The use of SAML as transverse security language is proposed.},
keywords = {ontology interoperability, SAML, semantic policy, semantic services},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa022,
title = {Introducing identity management in WiMAX to enable secure and personalized services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenarez and Patricia Arias and Davide Proserpio and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6097228},
doi = {https://doi.org/10.1109/WMNC.2011.6097228},
isbn = {978-1-4577-1192-3},
year = {2011},
date = {2011-12-12},
urldate = {2011-12-12},
booktitle = {2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.},
keywords = {authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa023,
title = {A privacy aware media gateway for connecting private multimedia clouds to limited devices},
author = {Daniel Díaz-Sánchez and Florina Almenarez and Andrés Marín and Patricia Arias and Rosa Sánchez-Guerrero and Fabio Sanvido},
url = {https://ieeexplore.ieee.org/document/6097259},
doi = {https://doi.org/10.1109/WMNC.2011.6097259},
isbn = {978-1-4577-1192-3},
year = {2011},
date = {2011-12-12},
urldate = {2011-12-12},
booktitle = {2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Multimedia availability is exceeding our capacity of management in home environment and outside it. For that reason, solutions as Media Cloud have brought the concept of Cloud Computing to home environments. Media Cloud provides a comprehensive and efficient solution for managing content among federated home environments. However, when consuming those contents outside a home environment some problems should be addressed as dealing with limited devices and protecting user generated and commercial contents from eavesdroppers. This article describes a solution that enables limited devices to access contents located in private clouds, as Media Cloud, with the cooperation of network providers.},
keywords = {Cloud computing, emadrid, multimedia, privacy, streaming},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa026,
title = {Family Personalization Service},
author = {Daniel Díaz-Sánchez and Rosa Sánchez and Patricia Arias and Iván Bernabé Sánchez and Florina Almenares},
url = {https://ieeexplore.ieee.org/document/6031878},
doi = {https://doi.org/10.1109/ICCE-Berlin.2011.6031878},
issn = {2166-6814},
year = {2011},
date = {2011-09-29},
urldate = {2011-09-29},
booktitle = {2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin)},
pages = {145-149},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {User centricity is important when designing new products and services. Automatic personalization emerges as key feature to prevent users from being bothered by complex management tasks, allowing them to get the most from their devices. However, devices within home environments are shared among family members, making personalization complex. This article describes a system that uses presence detection through several low cost cameras. It uses a centralized repository for personalization and an event based protocol for configuring devices surrounding users. The system addresses privacy-based filtering and group preference modeling.},
keywords = {group modeling, personalization, privacy aware, raudo2},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa027,
title = {Consumer electronics for social video services},
author = {Andres Marin and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Fabio Sanvido
},
url = {https://ieeexplore.ieee.org/document/6031884},
doi = {https://doi.org/10.1109/ICCE-Berlin.2011.6031884},
issn = {2166-6814},
year = {2011},
date = {2011-09-29},
booktitle = {2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Video conference services have been there for quite a long time. First commercial services, enabled by ISDN, where mainly operated by Telcos, then IP enabled video conference and multiconference through the session description protocol (IETF RFC 4566). The common explanation why these services were not massively adopted was price, bandwidth limitation and poor usability. Today bandwidth has greatly improved thanks to ADSL penetration, and many free and commercial providers offer more usable video conference services. Still these services are not massively adopted by domestic users. We also base on the hypothesis that video conference integration with social networks and home networks, will dramatically improve usability and market, but we consider that both integration and usability will be greatly increased through flexible consumer electronics. In this article we explain the requirements of such a device, its architecture, and the advantages for users and technology adoption.},
keywords = {bluetooth, Protocols, usability},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa028,
title = {A Survey on Security in Future Internet and Cloud},
author = {Fabio Sanvido and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Andrés Marín-López},
isbn = {978-1-61208-148-9},
year = {2011},
date = {2011-08-27},
urldate = {2011-08-27},
booktitle = {International Conference on Advances in Future Internet (UBICOMM 2011)},
abstract = {https://personales.upv.es/thinkmind/dl/conferences/afin/afin_2011/afin_2011_2_30_70129.pdf},
keywords = {Cloud computing, future internet, identity management, raudo2, Security, trust},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{accn001,
title = {Using XMPP to Federate Multimedia UPnP Devices},
author = {Iván Bernabé-Sánchez and Daniel Díaz-Sánchez and Mario Muñoz-Organero},
isbn = {978-84-615-5513-0},
year = {2011},
date = {2011-07-04},
booktitle = { XIII Jornadas de ARCA.: Sistemas cualitativos y sus aplicaciones en Diagnosis, Robótica e Inteligencia Ambiental},
pages = {62-67},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
@conference{campo026,
title = {Supporting L3 Femtocell Mobility Using the MOBIKE Protocol },
author = {Patricia Noriega-Vivas and Celeste Campo-Vázquez and Carlos García-Rubio and Estrella García-Lozano},
url = {https://e-archivo.uc3m.es/bitstreams/e15d3ef3-3d4e-4b09-92c0-20319a1bf797/download
https://hdl.handle.net/10016/13811},
isbn = {978-1-61208-142-7},
year = {2011},
date = {2011-06-24},
urldate = {2011-06-24},
booktitle = {Second International Conference on Access Network (ACCESS 2011)},
pages = {30-35},
publisher = {IARIA XPS},
abstract = {Femtocells can be used to improve the indoor coverage and bandwidth of 3G cellular networks in homes and buildings. They are designed to be placed in a fixed location. However, their use would also be interesting in mobile environments such as public transportation systems. This paper studies the mobility limitations at the layer 3 and suggests an approach to support mobility on femtocell networks. This solution employs the protocols already defined in the femtocell architecture, minimizing thus the impact on it.},
keywords = {femtocell architecture, mobile femtocell},
pubstate = {published},
tppubtype = {conference}
}
@conference{campo025,
title = {Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices},
author = {Alberto Cortés and Carlos García-Rubio and Celeste Campo-Vázquez and Estrella García-Lozano and Alicia Rodriguez-Carrion },
doi = {https://doi.org/10.1109/PERCOMW.2011.5766876},
isbn = {978-1-61284-938-6},
year = {2011},
date = {2011-05-12},
urldate = {2011-05-12},
booktitle = {International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011)},
pages = {239-244},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Many modern devices come with several, heterogeneous, network interface cards (NICs). However, simple operations like transferring data flows to the cheapest NIC or to one with enough Quality of Service (QoS) are awkward tasks on most Operating Systems. In this paper, we discuss the criteria to select the proper NIC for a given data flow. We also present a new Operating System service, called netqos, to publish data and figures of merit for these criteria. The main objective of netqos is providing relevant information to applications and middleware about NIC selection criteria, isolating them from the idiosyncrasies of the many QoS gathering tools and allowing to choose the proper NIC to fit their needs. We have built this new service as a synthetic file system for the Linux kernel. We describe our experiences in using it in a real-world scenario and the practical and inherent limitations of this approach.},
keywords = {EasyWireless, iteaeasywireless, network interface, Pervasive computing},
pubstate = {published},
tppubtype = {conference}
}
@article{diazsanchez007,
title = {Achieving IPTV Service Portability through Delegation},
author = {Davide Proserpio and Daniel Díaz-Sánchez and Florina Almenárez and Andrés Marín and Rosa Sánchez Guerrero},
url = {https://ieeexplore.ieee.org/document/5955184
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955184},
doi = {https://doi.org/10.1109/TCE.2011.5955184},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {492 - 498},
abstract = {IPTV Set-top boxes rely on tamper proof hardware to cope with content protection but hampers enjoying an IPTV subscription in other devices. There are solutions that share the IPTV subscription using the home network but there is no approach to make the IPTV subscription portable. This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol.},
keywords = {Authorization, Hardware, IPTV, Protocols, prototiposNFC, Servers, Subscription},
pubstate = {published},
tppubtype = {article}
}
@article{diazsanchez008,
title = {Media Cloud: An Open Cloud Computing Middleware for Content Management},
author = {Daniel Díaz-Sánchez and Florina Almenarez and Andrés Marín and Davide Proserpio and Patricia Arias Cabarcos.},
url = {https://ieeexplore.ieee.org/document/5955247
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955247},
doi = {https://doi.org/10.1109/TCE.2011.5955247},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {970 - 978},
abstract = {Cloud computing allows accessing resources across Internet transparently: requiring no expertise in, or control over the underlying infrastructure. There is an increasing interest in sharing media files with family and friends. However, UPnP or DLNA were not designed for media distribution beyond the boundaries of a local network and manage media files through web applications can be tedious. To overcome this problem, we propose Media Cloud, a middleware for Set-top boxes for classifying, searching, and delivering media inside home network and across the cloud that interoperates with UPnP and DLNA.},
keywords = {Cloud computing, Home Automation, Indexes, Media, netlab, Protocols, Social network services},
pubstate = {published},
tppubtype = {article}
}
@article{almenarez002,
title = {fedTV: Personal Networks Federation for IdM in Mobile DTV},
author = {Florina Almenárez and Patricia Arias and Daniel Díaz-Sánchez and Andrés Marín and Rosa Sánchez.},
url = {https://ieeexplore.ieee.org/document/5955185
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5955185},
doi = {https://doi.org/10.1109/TCE.2011.5955185},
issn = {0098-3063},
year = {2011},
date = {2011-05-03},
urldate = {2011-05-03},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {2},
pages = {499 - 506},
abstract = {Mobile Social TV and Mobile Video Blogging are new challenging scenarios arising from mobile and online DTV. They will allow for new interactions, and dynamically share content and delegate services. That requires the dynamic discovery, joining, and establishing new federations, emerging the trust management as an important facet for that. Such trust management should be autonomous, user-centric, and dynamic to cope with forthcoming applications. We propose an enhanced mobile client to support federated environments for cooperation in mobile DTV scenarios. Our proposal extends the Enhanced Client Profile defined in SAML v2, incorporating a trust management layer inside user's consumer electronic devices' software.},
keywords = {anot, anotacionsemantica, authentication, Digital TV, identity management, Mobile communication, Mobile computing, mobile DTV, Mobile handsets, Personal Network Federation, SAML, Trust management},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa029,
title = {IPTV meets delegation: Achieving IPTV service portability},
author = {Davide Proserpio and Fabio Sanvido and Daniel Diaz-Sanchez and Andrés Marin},
url = {https://ieeexplore.ieee.org/document/5722630},
doi = {https://doi.org/10.1109/ICCE.2011.5722630},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {IPTV Set-top boxes rely on tamper proof hardware to cope with content protection but hampers enjoying an IPTV subscription in other devices. There are solutions that share the IPTV subscription using the home network but there is no approach to make the IPTV subscription portable. This article describes a solution to delegate IPTV rights to any STB using an inexpensive piece of hardware and the OAuth protocol.},
keywords = {Access control, emadrid, home network, IPTV, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa030,
title = {Presence-aware personalized television},
author = {Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/5722854},
doi = {https://doi.org/10.1109/ICCE.2011.5722854},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Since the advent of the digital era, the traditional TV scenario has rapidly evolved towards an ecosystem comprised of a myriad of services, applications, channels, and contents. As a direct consequence, the amount of available information and configuration options targeted at today's end consumers have become unmanageable. Thus, personalization and usability emerge as indispensable elements to improve our content-overloaded digital homes. With these requirements in mind, we present a way to combine content adaptation paradigms together with presence detection in order to allow a seamless and personalized entertainment experience when watching TV.},
keywords = {bluetooth, Security, tv broadcasting},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa031,
title = {Personal networks federation in mobile DTV},
author = {Florina Almenares and Andrés Marin and Daniel Diaz-Sanchez and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/5722641},
doi = {https://doi.org/10.1109/ICCE.2011.5722641},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile and online DTV encourages new scenarios and applications to dynamically share content or delegate services between user's personal devices and networks. This requires the establishment of federations in a dynamic way, emerging the trust management as an important facet for that. Such trust management should be autonomous, user-centric, and dynamic to cope with forthcoming applications. This article addresses the mentioned requirements, by defining a SAML-compliant enhanced client to support federated environments for cooperation in mobile DTV scenarios. Such client is extended with a trust layer inside consumer electronic devices' software.},
keywords = {authentication, Digital TV, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa035,
title = {Media Cloud: Sharing contents in the large},
author = {Daniel Diaz-Sanchez and Florina Almenares and Andrés Marin and Davide Proserpio},
url = {https://ieeexplore.ieee.org/document/5722554},
doi = {https://doi.org/10.1109/ICCE.2011.5722554},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Cloud computing allows accessing resources across Internet transparently: requiring no expertise in, or control over the underlying infrastructure. UPnP or DLNA were not designed for media distribution beyond the boundaries of a local network. To overcome this problem, we propose Media Cloud, a home gateway service for classifying, searching and delivering media across the cloud that interoperates with UPnP and DLNA.},
keywords = {Access control, Cloud computing, media cloud},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{ariascabarcos003,
title = {FamTV: An Architecture for Presence-Aware Personalized Television},
author = {Patricia Arias Cabarcos and Rosa Sánchez Guerrero and Florina Almenárez Mendoza and Daniel Díaz-Sánchez and Andrés Marín López},
url = {https://ieeexplore.ieee.org/document/5735473
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5735473},
doi = {https://doi.org/10.1109/TCE.2011.5735473},
issn = {0098-3063},
year = {2011},
date = {2011-02-01},
urldate = {2011-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {57},
issue = {1},
pages = {6-13},
abstract = {Since the advent of the digital era, the traditional TV scenario has rapidly evolved towards an ecosystem comprised of a myriad of services, applications, channels, and contents. As a direct consequence, the amount of available information and configuration options targeted at today's end consumers have become unmanageable. Thus, personalization and usability emerge as indispensable elements to improve our content-overloaded digital homes. With these requirements in mind, we present a way to combine content adaptation paradigms together with presence detection in order to allow a seamless and personalized entertainment experience when watching TV.},
keywords = {content personalization, Digital TV, identity management, presence detection},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa024,
title = {Introducing Infocards in NGN to Enable User-Centric Identity Management},
author = {Davide Proserpio and Fabio Sanvido and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez and Andrés Marín-López },
url = {https://ieeexplore.ieee.org/document/5683383},
doi = {https://doi.org/10.1109/GLOCOM.2010.5683383},
issn = {1930-529X},
year = {2011},
date = {2011-01-10},
booktitle = {2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {With the rapid evolution of networks and the widespread penetration of mobile devices with increasing capabilities, that have already become a commodity, we are getting a step closer to ubiquity. Thus, we are moving a great part of our lives from the physical world to the online world, i.e. social interactions, business transactions, relations with government administrations, etc. However, while identity verification is easy to handle in the real world, there are many unsolved challenges when dealing with digital identity management, especially due to the lack of user awareness when it comes to privacy. Thus, with the aim to enhance the navigation experience and security in multiservice and multiprovider environments the user must be empowered to control how her attributes are shared and disclosed between different domains.With these goals on mind, we leverage the benefits of the Infocard technology and introduce this usercentric paradigm into the emerging NGN architectures. This paper proposes a way to combine the gains of a SAML federation between service and identity providers with the easiness for the final user of the Inforcard System using the well known architectural schema of IP Multimedia Subsystem.},
keywords = {authentication, cryptography, IP networks, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inbook{bc002,
title = {An Identity Management Infrastructure for Secure Personalized IPTV Services},
author = {Daniel Díaz-Sánchez and Florina Almenárez and Andrés Marín and Eugen Mikoczy and Peter Weik and Thomas Magedanz },
url = {https://link.springer.com/chapter/10.1007/978-3-642-17851-1_67},
doi = {https://doi.org/10.1007/978-3-642-17851-1_67},
isbn = {978-3-642-17850-4},
year = {2011},
date = {2011-01-03},
urldate = {2011-01-03},
volume = {46},
pages = {668 - 683},
publisher = {Springer Berlin Heidelberg},
abstract = {This article focus on IPTV security and IPTV service personalization by the introduction of an Identity Provider as new participant in IPTV service provision that deals with authentication, user profile and device profile management. The Identity Provider, integrated as part of the Telco operator, would provider user profiles with a wider scope than application specific profiles, enabling high personalization of services and improvement of user experience. Paper gives overview about existing IPTV security technologies but also describe novel architecture for secure personalized NGN based IPTV services.
},
keywords = {IdM, iptv security, netlab, NGN based IPTV},
pubstate = {published},
tppubtype = {inbook}
}
2010
@article{almenarez001,
title = {Trust management for multimedia P2P applications in autonomic networking},
author = {Florina Almenárez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://doi.org/10.1016/j.adhoc.2010.09.005
https://www.sciencedirect.com/science/article/abs/pii/S1570870510001459?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1570870510001459/pdfft?md5=57c716d20dd2bb1db25f81c4cc063ebb&pid=1-s2.0-S1570870510001459-main.pdf},
doi = {https://doi.org/10.1016/j.adhoc.2010.09.005},
issn = {1570-8705},
year = {2010},
date = {2010-10-01},
urldate = {2010-10-01},
journal = {Ad Hoc Networks},
volume = {9},
issue = {4},
pages = {687-697},
abstract = {In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities’ behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.},
keywords = {anotacionsemantica, Autonomic networking, ITACA, Multimedia P2P applications, Trust attacks, Trust management},
pubstate = {published},
tppubtype = {article}
}
@article{campo011,
title = {Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks},
author = {Alicia Rodriguez-Carrion and Carlos García-Rubio and Celeste Campo-Vázquez},
doi = {https://doi.org/10.1109/lcomm.2010.08.092033},
issn = {1089-7798},
year = {2010},
date = {2010-08-09},
urldate = {2010-08-09},
journal = {IEEE COMMUNICATIONS LETTERS},
volume = {14},
issue = {8},
pages = {707-709},
abstract = {In mobile phones, it is useful to know the most probable next location to make decisions about future actions. In this letter we compare three LZ based prediction algorithms. The originality of our work is that we make it in a cellular network, we separate the algorithms into two independent phases (tree updating and probability calculation), we have included Active LeZi in the study, and we evaluate hit rate and resource consumption, including processing time.},
keywords = {cellular networks, location, lz, prediction},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa025,
title = {Introducing a cross federation identity solution for converged network environments},
author = {Konstantinos Lampropoulos and Daniel Diaz-Sanchez and Florina Almenares and Peter Weik and Spyros Denazis
},
url = {https://dl.acm.org/doi/10.1145/1941530.1941532},
doi = {https://doi.org/10.1145/1941530.1941532},
issn = {1868-2634},
year = {2010},
date = {2010-08-02},
urldate = {2010-08-02},
booktitle = {IPTComm '10: Principles, Systems and Applications of IP Telecommunications},
pages = {1-12},
abstract = {The Future Internet architecture, based on the integration of existing networks and services, and the addition of many new devices like sensors, face a series of important technical challenges, one of them being the management of diverse user identities. The diversity and plethora of the services and procedures affected by the unassociated existing user identities stress the necessity for a holistic solution to deal with the different aspects of the identity management problem. Existing efforts propose limited identity solutions that can only be applied within well defined boundaries and cannot extend their functionality to support converged network environments and service operations across different administrative domains. This paper presents a Dynamic Identity Mapping Association N' Discovery System (DIMANDS) as a holistic identity solution for large scale heterogeneous network environments. This solution offers cross federation identity services and is based on a universal discovery mechanism which spans across different networks, layers and federations. It is also empowered with a unified trust framework which can collect and process diverse trust information to provide trust decisions on a widely accepted format.},
keywords = {communication hardware, dimands, Hardware, interfaces and storage, networks},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa036,
title = {An Identity Management Infrastructure for Secure Personalized IPTV Services},
author = {Daniel Díaz-Sánchez and Florina Almenárez and Andrés Marín and Eugen Mikoczy and Peter Weik and Thomas Magedanz },
isbn = {3-642-17850-2},
year = {2010},
date = {2010-05-20},
urldate = {2011-03-09},
booktitle = {TRIDENTCOM 2010: International ICST Conference on Testbeds and Research Infrastructures for the
Development of Networks and Communities},
pages = {1 - 10},
publisher = {Springer Berlin Heidelberg},
abstract = {This article focus on IPTV security and IPTV service personalization by the introduction of an Identity Provider as new participant in IPTV service provision that deals with authentication, user profile and device profile management. The Identity Provider, integrated as part of the Telco operator, would provider user profiles with a wider scope than application specific profiles, enabling high personalization of services and improvement of user experience. Paper gives overview about existing IPTV security technologies but also describe novel architecture for secure personalized NGN based IPTV services.},
keywords = {IdM, iptv security, NGN based IPTV},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa038,
title = {Socializing electronics: Secure interactions in social networks},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenárez and Alberto Cortés},
url = {https://ieeexplore.ieee.org/document/5418685},
doi = {https://doi.org/10.1109/ICCE.2010.5418685},
issn = {2158-3994},
year = {2010},
date = {2010-02-22},
booktitle = {2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Social networks help us to follow friends and family daily lives. Home devices are rich in user's information so they are appropriate platforms to deploy social network applications. This article addresses two main requirements: content must be adapted to different devices and user's privacy must be respected. To enable social network interaction in home environments and to overcome privacy problems we present two home gateway applications: the Social Enabler and its counterpart the Social Watchdog.},
keywords = {privacy, Social network services},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa037,
title = {Extended DLNA protocol: Sharing protected pay TV contents},
author = {Daniel Díaz-Sánchez and Fabio Sanvido and Davide Proserpio and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/5418687},
doi = {https://doi.org/10.1109/ICCE.2010.5418687},
issn = {2158-3994},
year = {2010},
date = {2010-02-10},
booktitle = {2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {DLNA can be considered as a good candidate for sharing protected contents among authorized devices. There is a important penetration of DLNA certified devices, and it offers link protection. We identify problems on DLNA's link protection, DTCP-IP, and we propose to improve the authentication and key derivation mechanism. DLNA sharing can be extended to include pre and post acquisition protection content at the price of inexpensive descrambler.},
keywords = {cryptography, Protection, Protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{diazsanchez005,
title = {Social applications in the home network},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenárez and Alberto Cortés},
url = {https://ieeexplore.ieee.org/document/5439148
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5439148},
doi = {https://doi.org/10.1109/TCE.2010.5439148},
issn = {0098-3063},
year = {2010},
date = {2010-02-01},
urldate = {2010-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {56},
issue = {1},
pages = {220-225},
abstract = {Home devices like set-top boxes and media gateways are a rich source of users' information. They can play a role to facilitate interactions with friends and relatives in social networks. However these interactions have to follow policies to safeguard users' privacy while maintaining the complexity low for the average user. In this article we prototype an architecture based for home devices to participate in social networks. Besides, we explore the privacy issues and how the privacy offered in social networks can be improved.},
keywords = {anotacionsemantica, credential management, home network, privacy in social networks, security policy},
pubstate = {published},
tppubtype = {article}
}
@article{diazsanchez006,
title = {DLNA, DVB-CA and DVB-CPCM integration for commercial content management},
author = {Daniel Diaz-Sanchez and Fabio Sanvido and Davide Proserpio and Andres Marin},
url = {https://ieeexplore.ieee.org/document/5439129
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5439129},
doi = {https://doi.org/10.1109/TCE.2010.5439129},
issn = {0098-3063},
year = {2010},
date = {2010-02-01},
urldate = {2010-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {56},
issue = {1},
pages = {79-87},
abstract = {DLNA can be considered as a good candidate for sharing user-generated contents among household networked consumer electronics. However, commercial content sharing requires a high degree of device protection that DLNA does not provides. We propose a solution supporting acquisition and post acquisition content protection by the integration of DLNA with DVB Conditional Access and DVB Content Protection & Copy Management. This article shows the design and implementation of a solution to improve commercial content management over DLNA.},
keywords = {anotacionsemantica, Conditional Access System, Consumer electronics, content protection, copy management, home network, Security, Telematics, User-generated content},
pubstate = {published},
tppubtype = {article}
}
2009
@inproceedings{pa039,
title = {An Improved IMS Authentication Mechanism and its Cost Analysis},
author = {Davide Proserpio and Fabio Sanvido and Daniel Díaz-Sánchez and Florina Almenares and Andrés Marín },
year = {2009},
date = {2009-12-14},
urldate = {2009-12-14},
booktitle = {EUNICE 2009: Eunice International Workshop, The Internet of the Future},
keywords = {UICC-NFC},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{marin001,
title = {Pervasive authentication and authorization infrastructures for mobile users},
author = {Jordi Forné and Francisca Hinarejos and Andrés Marín and Florina Almenárez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Díaz},
url = {https://www.sciencedirect.com/science/article/pii/S0167404809000911?via%3Dihub},
doi = {https://doi.org/10.1016/j.cose.2009.09.001},
issn = {0167-4048},
year = {2009},
date = {2009-09-25},
urldate = {2009-09-25},
journal = {COMPUTERS & SECURITY},
volume = {29},
issue = {4},
pages = {501-514},
abstract = {Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.},
keywords = {authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa040,
title = {Towards dynamic trust establishment for identity federation},
author = {Florina Almenarez and Patricia Arias and Andrés Marín and Daniel Díaz },
url = {https://dl.acm.org/doi/10.1145/1551722.1551747
https://dl.acm.org/doi/pdf/10.1145/1551722.1551747},
doi = {https://doi.org/10.1145/1551722.1551747},
isbn = {9781605583983},
year = {2009},
date = {2009-06-17},
urldate = {2009-06-17},
booktitle = {EATIS '09: Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship},
number = {25},
pages = {1-4},
abstract = {Federation has emerged as a key concept for identity management, as it is the basis to reduce complexity in the companies and improve user experience. However, the problem of establishing identity federations in dynamic open environments, where it is desirable to speed up the processes of service provisioning and deprovisioning, has not been fully addressed. This paper reviews the existing frameworks for identity federation, analyzing the underlying trust mechanisms and its suitability to be applied in the mentioned environments. Finally, we propose a generic extension for the Security Assertion Markup Language (SAML) standard in order to facilitate the creation of federation relationships in a secure dynamic way between prior unknown parties.},
keywords = {applied computing, enterprise computing, españavirtual, information system applications, information systems},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa041,
title = {Sharing Conditional Access Modules through the home network},
author = {Daniel Diaz-Sanchez and Andres Marin and Florina Almenarez and Alberto Cortes},
url = {https://ieeexplore.ieee.org/document/5012348},
doi = {https://doi.org/10.1109/ICCE.2009.5012348},
issn = {2158-3994},
year = {2009},
date = {2009-05-29},
booktitle = {2009 Digest of Technical Papers International Conference on Consumer Electronics},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {In this article we present a system for sharing a conditional access module among different visualization devices. Current pay-TV systems require having conditional access modules and smart cards replicated at every visualization device willing to access pay-TV contents. In this article, we show how a home gateway, capable of securely distribute decryption keys, home visualization devices, an inexpensive descrambler, and a home network, enable a flexible solution to access pay-TV.},
keywords = {Home Automation, Protection, smart cards},
pubstate = {published},
tppubtype = {inproceedings}
}
@conference{campo0028,
title = {Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones},
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés },
doi = {https://doi.org/10.1007/978-3-540-85867-6_6},
isbn = {978-3-540-85866-9},
year = {2009},
date = {2009-03-10},
urldate = {2009-03-10},
booktitle = {Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008},
pages = {48-56},
publisher = {SPRINGER},
abstract = {Nowadays, many smart phones have a built-in camera that is often used as a conventional digital camera. With some image processing in the mobile phone, new applications can be offered to the user, such as augmented reality games or helper applications for visually impaired people. However, image processing applications may require high processor speed and massive dynamic memory, which are scarce resources in smart phones. Image processing algorithms usually consists of long loops iterating some operations. In this paper we evaluate the performance of smart phones executing these operations. We consider both native and J2ME applications. The results we present can help to decide what we can and we cannot do in a mobile phone, and to quantify the performance penalty when using J2ME.},
keywords = {camera smart phones, image processing, ITACA, J2ME, Symbian},
pubstate = {published},
tppubtype = {conference}
}
@article{diazsanchez004,
title = {Sharing conditional access modules through the home network for pay TV access},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenárez and Alberto Cortés},
url = {https://ieeexplore.ieee.org/document/4814419
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4814419},
doi = {https://doi.org/10.1109/TCE.2009.4814419},
issn = {0098-3063},
year = {2009},
date = {2009-02-02},
urldate = {2009-02-02},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {55},
number = {1},
issue = {1},
pages = {88-96},
abstract = {In this article we present a system for sharing a Conditional Access Module among different visualization devices. Current pay-TV systems require having conditional access modules and smart cards replicated at every visualization device willing to access Pay-TV contents. In this article, we show how a home gateway, capable of securely distribute decryption keys to home visualization device, an inexpensive descrambler, and a home network, enable a flexible solution to access Pay-TV.},
keywords = {Conditional Access System, content protection and sharing, descrambler registration protocol, home network, IPTV, prototipomiddleware},
pubstate = {published},
tppubtype = {article}
}
@inbook{bc006,
title = {A General IMS Registration Protocol for Wireless Networks Interworking},
author = {Daniel Díaz-Sánchez and Davide Proserpio and Andrés Marín-López and Florina Almenárez-Mendoza and Peter Weik },
url = {https://link.springer.com/chapter/10.1007/978-3-642-03841-9_4
https://link.springer.com/content/pdf/10.1007/978-3-642-03841-9.pdf},
doi = {https://doi.org/10.1007/978-3-642-03841-9_4},
isbn = {978-3-642-03840-2},
year = {2009},
date = {2009-01-08},
urldate = {2009-01-08},
booktitle = {Wireless and Mobile Networking},
volume = {308},
pages = {32 - 43},
publisher = {Springer Berlin Heidelberg},
abstract = {One of the most critical tasks when accessing services through the IP Multimedia Subsystem is the registration process. The process involves two registrations, the first with the access network, the second with IMS. This leads to an overhead authentication that introduces a big delay. This article proposes an improvement for IMS registration protocol able to relate IMS registration to an access network registration by cryptographically binding both of them. This approach provides a general solution, saves time during registration and avoids several attacks.
},
keywords = {authentication protocol, catedranokia, extensible authentication protocol, home network, integracionvertical, pseudo ramdon function, session initiation protocol},
pubstate = {published},
tppubtype = {inbook}
}
@inbook{bc003,
title = {Enabling SAML for Dynamic Identity Federation Management},
author = {Patricia Arias-Cabarcos and Florina Almenárez-Mendoza and Andrés Marín-López and Daniel Díaz-Sánchez },
url = {https://link.springer.com/chapter/10.1007/978-3-642-03841-9_16
https://link.springer.com/content/pdf/10.1007/978-3-642-03841-9.pdf},
doi = {https://doi.org/10.1007/978-3-642-03841-9_16},
isbn = {978-3-642-03840-2},
year = {2009},
date = {2009-01-07},
urldate = {2009-01-07},
volume = {308},
pages = {173 - 184},
publisher = {Springer Berlin Heidelberg},
abstract = {Federation in identity management has emerged as a key concept for reducing complexity in the companies and offering an improved user experience when accessing services. In this sense, the process of trust establishment is fundamental to allow rapid and seamless interaction between different trust domains. However, the problem of establishing identity federations in dynamic and open environments that form part of Next Generation Networks (NGNs), where it is desirable to speed up the processes of service provisioning and deprovisioning, has not been fully addressed. This paper analyzes the underlying trust mechanisms of the existing frameworks for federated identity management and its suitability to be applied in the mentioned environments. This analysis is mainly focused on the Single Sign On (SSO) profile. We propose a generic extension for the SAML standard in order to facilitate the creation of federation relationships in a dynamic way between prior unknown parties. Finally, we give some details of implementation and compatibility issues.},
keywords = {identity provider, reputation score, trust decision, trust establishment, Trust Relationship, UICC-NFC},
pubstate = {published},
tppubtype = {inbook}
}
@inbook{bc004,
title = {Interoperability of IP Multimedia Subsystems: The NetLab Approach},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Francisco Rodríguez-García and Joaquín López-Rizaldos and Alfonso Cubero-Vega and Itziar Ormaetxea and Juan Luis-Lopez and Sergio Fernández and Fernando Ortigosa and Ivan Kotuliak and Eugen Mikoczy and Timo Lahnalampi and Timo Koski and Sussana Avessta },
url = {https://link.springer.com/chapter/10.1007/978-3-642-03841-9_3
https://link.springer.com/content/pdf/10.1007/978-3-642-03841-9.pdf},
doi = {https://doi.org/10.1007/978-3-642-03841-9_3},
isbn = {978-3-642-03840-2},
year = {2009},
date = {2009-01-07},
urldate = {2009-01-07},
booktitle = {IFIP Advances in Information and Communication Technology},
volume = {308},
pages = {20 - 31},
publisher = {Springer Berlin Heidelberg},
abstract = {Standardization bodies have spent lots of efforts and have extensively defined IP Multimedia Subsystem interfaces. While Telcos have started its deployment, IMS-based applications boosting user needs are still to come. Such applications must not suffer from interoperability issues caused by different vendors and different administrative domains. NetLab project aims at exploring such interoperability issues by interconnecting together testbeds at three different countries. Use cases will be defined to find out about interoperability, and also to search for a user appealing application in collaboration with the LivingLabs community. This paper introduces the project vision on the architectural, security, QoS, and interoperability issues, together with new services illustrating the interconnection of testbeds.
},
keywords = {authentication and QoS in IMS, IMS interoperability, living labs, netlab},
pubstate = {published},
tppubtype = {inbook}
}
2008
@article{cortes001,
title = {Decoupling path failure detection from congestion control to improve SCTP failovers},
author = {Alberto Cortes and Carlos Garcia-Rubio and Celeste Campo and Andres Marin and Florina Almenarez and Daniel Díaz},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4685978},
doi = {https://doi.org/10.1109/LCOMM.2008.080884},
issn = {1089-7798},
year = {2008},
date = {2008-11-11},
urldate = {2008-11-11},
journal = {IEEE COMMUNICATIONS LETTERS},
volume = {12},
number = {11},
pages = {858-860},
abstract = {SCTP handover is too slow to be useful as a mobility solution for most applications. With quicker handovers, SCTP will be an interesting solution to mobility. SCTP uses retransmissions as probes for path failure detection. Congestion control forces slow paced retransmissions but quick failovers need fast paced probes. Our solution is to stop using retransmissions as probes. Instead, we propose active path monitoring using unreliable heartbeats. Applications can tune this algorithm to meet their own requirements. We show data from a simple experiment in a real environment.},
keywords = {computer network reliability, congestion control, recursoseducativos, Transport protocols},
pubstate = {published},
tppubtype = {article}
}
@inbook{garciarubio007,
title = {The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective },
author = {Carlos García-Rubio and Celeste Campo-Vázquez },
isbn = {978-1-60456-680-2},
year = {2008},
date = {2008-10-01},
urldate = {2008-10-01},
pages = {315-332},
publisher = {NOVA SCIENCE PUBLISHERS INC },
keywords = {Pervasive computing},
pubstate = {published},
tppubtype = {inbook}
}
@inproceedings{pa044,
title = {DVB-H Key Management System for UMTS Capable Devices},
author = {Daniel Diaz-Sánchez and Andrés Marín and Florina Almenárez and Alberto Cortes},
url = {https://ieeexplore.ieee.org/document/4588098},
doi = {https://doi.org/10.1109/ICCE.2008.4588098},
issn = {2158-3994},
year = {2008},
date = {2008-08-05},
urldate = {2008-08-05},
booktitle = {2008 Digest of Technical Papers - International Conference on Consumer Electronics},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {In this paper we present a system to enable pay-per- view services in mobile handhelds which takes benefits of both DVB-H and UMTS networks. DVB-H infrastructure provides a more appropriate content delivery framework that UMTS. Despite this fact, UMTS can play an important role for charging and key distribution for pay-per-view applications by means of the provider SIM smart card.},
keywords = {3G, cryptography, Digital video broadcasting, Protection, visualizacioncontenidosTDT},
pubstate = {published},
tppubtype = {inproceedings}
}
@conference{campo027,
title = {Descubrimiento de servicios en redes MANET con y sin soporte multicast },
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés },
year = {2008},
date = {2008-05-13},
urldate = {2008-05-13},
booktitle = {VII Jornadas de ingeniería telemática (JITEL 2008)},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
@inproceedings{pa042,
title = {A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications},
author = {Florina Almenarez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517451},
doi = {https://doi.org/10.1109/PERCOM.2008.95},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Trust has emerged as an important facet of inter-domain relationships. Trust management in fixed networks is not functional in ad hoc P2P networks, because these require an autonomous, user-centric and non-static trust management. The trust model is the basis of any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such middleware allows to enhance security support of pervasive devices. Likewise, we propose a suitable and efficient secure file exchange protocol, WSFEP, for content sharing. Both middleware and file sharing application have been successfuly integrated and tested on PDAs.},
keywords = {anotacionsemantica, middleware, peer to peer computing, Pervasive computing},
pubstate = {published},
tppubtype = {inproceedings}
}
Publications
Multi-device Single Sign-on for cloud service continuity Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Optimizing resources on gateways using OSGi Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective Journal Article In: COMPUTER NETWORKS, vol. 56, iss. 4, pp. 1303-1328, 2012, ISSN: 1389-1286. Enhancing privacy and dynamic federation in IdM for consumer cloud computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 1, pp. 95-103, 2012, ISSN: 0098-3063. Recommendations on the Move. In: Recommender Systems for the Social Web Book Chapter In: pp. 179-193, Springer International Publishing, Recommender Systems for the Social Web, 2012, ISBN: 978-3-642-25693-6. Augmenting Mobile Search Engines to Leverage Context Awareness Journal Article In: IEEE Internet Computing, vol. 16, iss. 2, pp. 17-25, 2012, ISSN: 1089-7801. Improving privacy in identity management systems for health care scenarios Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-8th, 2011, Riviera Maya, Mexico, UCAMI, 2011, ISBN: 978-84-694-9677-0. An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Analysis of Location Prediction Performance of LZ Algorithms using GSM Cell-based Location Data Conference 5th International Symposium on Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), UCAMI, 2011. Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures Proceedings Article In: UBICOMM 2011 : The Fifth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 165 - 168, 2011, ISBN: 978-1-61208-171-7 . Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. A privacy aware media gateway for connecting private multimedia clouds to limited devices Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. Family Personalization Service Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), pp. 145-149, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. Consumer electronics for social video services Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2166-6814. A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Using XMPP to Federate Multimedia UPnP Devices Proceedings Article In: XIII Jornadas de ARCA.: Sistemas cualitativos y sus aplicaciones en Diagnosis, Robótica e Inteligencia Ambiental, pp. 62-67, 2011, ISBN: 978-84-615-5513-0. Supporting L3 Femtocell Mobility Using the MOBIKE Protocol Conference Second International Conference on Access Network (ACCESS 2011), IARIA XPS, 2011, ISBN: 978-1-61208-142-7. Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. Achieving IPTV Service Portability through Delegation Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 492 - 498, 2011, ISSN: 0098-3063. Media Cloud: An Open Cloud Computing Middleware for Content Management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 970 - 978, 2011, ISSN: 0098-3063. fedTV: Personal Networks Federation for IdM in Mobile DTV Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 2, pp. 499 - 506, 2011, ISSN: 0098-3063. IPTV meets delegation: Achieving IPTV service portability Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Presence-aware personalized television Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Personal networks federation in mobile DTV Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Media Cloud: Sharing contents in the large Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. FamTV: An Architecture for Presence-Aware Personalized Television Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 57, iss. 1, pp. 6-13, 2011, ISSN: 0098-3063. Introducing Infocards in NGN to Enable User-Centric Identity Management Proceedings Article In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 1930-529X. An Identity Management Infrastructure for Secure Personalized IPTV Services Book Chapter In: vol. 46, pp. 668 - 683, Springer Berlin Heidelberg, 2011, ISBN: 978-3-642-17850-4. Trust management for multimedia P2P applications in autonomic networking Journal Article In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705. Performance Evaluation of LZ-Based Location Prediction Algorithms in Cellular Networks Journal Article In: IEEE COMMUNICATIONS LETTERS, vol. 14, iss. 8, pp. 707-709, 2010, ISSN: 1089-7798. Introducing a cross federation identity solution for converged network environments Proceedings Article In: IPTComm '10: Principles, Systems and Applications of IP Telecommunications, pp. 1-12, 2010, ISSN: 1868-2634. An Identity Management Infrastructure for Secure Personalized IPTV Services Proceedings Article In: TRIDENTCOM 2010: International ICST Conference on Testbeds and Research Infrastructures for the
Development of Networks and Communities, pp. 1 - 10, Springer Berlin Heidelberg, 2010, ISBN: 3-642-17850-2. Socializing electronics: Secure interactions in social networks Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994. Extended DLNA protocol: Sharing protected pay TV contents Proceedings Article In: 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2010, ISSN: 2158-3994. Social applications in the home network Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 220-225, 2010, ISSN: 0098-3063. DLNA, DVB-CA and DVB-CPCM integration for commercial content management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 79-87, 2010, ISSN: 0098-3063. An Improved IMS Authentication Mechanism and its Cost Analysis Proceedings Article In: EUNICE 2009: Eunice International Workshop, The Internet of the Future, 2009. Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Towards dynamic trust establishment for identity federation Proceedings Article In: EATIS '09: Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, pp. 1-4, 2009, ISBN: 9781605583983. Sharing Conditional Access Modules through the home network Proceedings Article In: 2009 Digest of Technical Papers International Conference on Consumer Electronics, Institute of Electrical and Electronics Engineers (IEEE), 2009, ISSN: 2158-3994. Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones Conference Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008, SPRINGER, 2009, ISBN: 978-3-540-85866-9. Sharing conditional access modules through the home network for pay TV access Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 55, iss. 1, no. 1, pp. 88-96, 2009, ISSN: 0098-3063. A General IMS Registration Protocol for Wireless Networks Interworking Book Chapter In: Wireless and Mobile Networking, vol. 308, pp. 32 - 43, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Enabling SAML for Dynamic Identity Federation Management Book Chapter In: vol. 308, pp. 173 - 184, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Interoperability of IP Multimedia Subsystems: The NetLab Approach Book Chapter In: IFIP Advances in Information and Communication Technology, vol. 308, pp. 20 - 31, Springer Berlin Heidelberg, 2009, ISBN: 978-3-642-03840-2. Decoupling path failure detection from congestion control to improve SCTP failovers Journal Article In: IEEE COMMUNICATIONS LETTERS, vol. 12, no. 11, pp. 858-860, 2008, ISSN: 1089-7798. The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective Book Chapter In: pp. 315-332, NOVA SCIENCE PUBLISHERS INC , 2008, ISBN: 978-1-60456-680-2. DVB-H Key Management System for UMTS Capable Devices Proceedings Article In: 2008 Digest of Technical Papers - International Conference on Consumer Electronics, Institute of Electrical and Electronics Engineers (IEEE), 2008, ISSN: 2158-3994. Descubrimiento de servicios en redes MANET con y sin soporte multicast Conference VII Jornadas de ingeniería telemática (JITEL 2008), 2008. A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7.2012
2011
2010
2009
2008