Almenarez, Florina; Marín, Andres; Diaz, Daniel; Cortes, Alberto; Campo, Celeste; García-Rubio, Carlos Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7. Abstract | Links | BibTeX | Tags: certificate validation, open toolkit, prototipomiddleware, X.509 certificates Díaz-Sánchez, Daniel; Marín, Andrés; Almenarez, Florina; Campo, Celeste; Cortés, Alberto; García-Rubio, Carlos Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment Book Chapter In: IFIP International Federation for Information Processing, vol. 284, pp. 271 - 282, Springer US, 2008, ISBN: 978-0-387-84838-9. Abstract | Links | BibTeX | Tags: international telecommunication union, message authentication code, Mutual Authentication, protocol message, recursosteleeducacion, transport layer security Diaz-Sanchez, Daniel; Marin, Andres; Almenarez, Florina Access Control Agnostic Trust Negotiation Decision Engine Proceedings Article In: 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Institute of Electrical and Electronics Engineers (IEEE), 2007, ISSN: 2166-9570. Abstract | Links | BibTeX | Tags: Access control, anotacionsemantica, data mining, engines, information security Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos Context awareness in network selection for dynamic environments Journal Article In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451. Abstract | Links | BibTeX | Tags: Context-awareness, everyware, Mobile devices, Network selection, Pervasive computing, Sistema tele-educacion integrado Schaefer, Robbie; Mueller, Wolfgang; Marín-López, Andrés; Díaz-Sánchez, Daniel Device Independent User Interfaces for Smart Cards Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 9781595938190. Abstract | Links | BibTeX | Tags: abstract user interface, device independence, Security, smart cards Díaz-Sánchez, Daniel; Marín-López, Andrés; Alménarez-Mendoza, Florina Mecanismo de selección de red sensible al contexto para entornos dinámicos Proceedings Article In: pp. 1-5, 2007. BibTeX | Tags: MEDEA+ A12 Díaz-Sánchez, Daniel; Marín, Andrés; Alménarez, Florina; Campo, Celeste; García-Rubio, Carlos Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza Proceedings Article In: pp. 1-8, 2007, ISBN: 978-84-9732-605-6. BibTeX | Tags: Schaefer, Robbie; Mueller, Wolfgang; Marín-López, Andrés; Díaz-Sánchez, Daniel Using smart cards for secure and device independent user interfaces Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 978-1-59593-819-0. Abstract | Links | BibTeX | Tags: abstract user interface, device independence, MEDEA+ A306, Security, Smart Card Marín, Andrés; Mueller, Wolfgang; Schaefer, Robbie; Almenarez, Florina; Diaz, Daniel; Ziegler, Max Middleware for Secure Home Access and Control Proceedings Article In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Institute of Electrical and Electronics Engineers (IEEE), 2007, ISBN: 0-7695-2788-4. Abstract | Links | BibTeX | Tags: adaptative systems, middleware, Pervasive computing Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste Smart card-based agents for fair non-repudiation Journal Article In: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol. 51, iss. 9, pp. 2288-2298, 2007, ISSN: 0346-251X. Abstract | Links | BibTeX | Tags: Ad hoc mode, Electronic transactions, everyware, Fairness, Non-repudiation protocol, Smart Card, Unreliable channels Díaz-Sánchez, Daniel; Marín, Andrés; Almenárez, Florina Enhancing access control for mobile devices with an agnostic trust negotiation decision engine Bachelor Thesis 2007, ISBN: 978-0-387-74158-1. Abstract | Links | BibTeX | Tags: Access control, anotacionsemantica, flexible, trust negotiation Díaz-Sánchez, Daniel; Marín-López, Andrés; Alménarez, Florina Securing interactions in emerging environments Proceedings Article In: pp. 1-13, 2006, ISBN: 84-6901744-6. BibTeX | Tags: iteaeasywireless Díaz-Sánchez, Daniel; Marín, Andrés; Almenarez, Florina; García-Rubio, Carlos; Campo, Celeste Interaction Distance determination with PervsIM Proceedings Article In: 15th IST Mobile And Wireless Communication Summit, pp. 1-8, 2006. Díaz-Sánchez, Daniel; Marín-Lopez, Andrés; Almenárez-Mendoza, Florina A Smart Card Solution for Access Control and Trust Management for Nomadic Users Proceedings Article In: Smart Card Research and Advanced Applications, pp. 62 - 77, 2006, ISSN: 0302-9743. Abstract | Links | BibTeX | Tags: Access control, cryptographic operation, MEDEA+ A306, physical store, Smart Card, Trust management Campo, Celeste; Almenárez, Florina; Díaz, Daniel; García-Rubio, Carlos; Marín-López, Andrés Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Abstract | Links | BibTeX | Tags: ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec Almenarez, Florina; Marin, Andrés; Diaz, Daniel; Sanchez, Juan Developing a model for trust management in pervasive devices Proceedings Article In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), Institute of Electrical and Electronics Engineers (IEEE), 2006, ISBN: 0-7695-2520-2. Abstract | Links | BibTeX | Tags: mathematical model, peer to peer computing, Pervasive computing, Protection, Ubisec Sánchez-Sánchez, Juan; Díaz-Sánchez, Daniel; Vigo-Segura, José; Martínez-Madrid, Natividad; Seepold, Ralf Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards Book Chapter In: Smart Card Research and Advanced Applications, vol. 3928, pp. 78 - 90, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-33311-1. Abstract | Links | BibTeX | Tags: automation network, java virtual machine, MEDEA+ A306, open service gateway initiative, service platform, Smart Card Díaz, Daniel; Marín, Andrés; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste Context Awareness in Network Selection for Dynamic Environments Book Chapter In: Personal Wireless Communications, vol. 4217, pp. 216 - 227, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-45174-7. Abstract | Links | BibTeX | Tags: Access control, context, Network selection, trust Díaz-Sánchez, Daniel; Marín-Lopez, Andrés; Almenárez-Mendoza, Florina A Smart Card Solution for Access Control and Trust Management for Nomadic Users Book Chapter In: Smart Card Research and Advanced Applications, vol. 3928, pp. 62 - 77, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-33311-1. Abstract | Links | BibTeX | Tags: Access control, cryptographic operation, physical store, Smart Card, Trust management Díaz-Sánchez, Daniel; Marín, Andrés; Alménarez, Florina A framework for authorization and delegation in ubiquitous computing Proceedings Article In: UCAMI 2005: Ubiquitous Computing and Ambient Intelligence. Congreso Español De Informatica, pp. 1-10, 2005, ISBN: 84-9732-442-0. BibTeX | Tags: MEDEA+ A12 Almenarez, Florina; Díaz, Daniel; Marín, Andrés Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security Journal Article In: Lecture Notes In Computer Sciences, vol. 3184, pp. 90-99, 2004, ISSN: 0302-9743. Abstract | Links | BibTeX | Tags: EasyWireless, everyware, Mutual Authentication, Smart Card, Trust Degree, Trust Relationship, Trusted Third Party, Ubisec2008
@inproceedings{pa043,
title = {Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services},
author = {Florina Almenarez and Andres Marín and Daniel Diaz and Alberto Cortes and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517456},
doi = {https://doi.org/10.1109/PERCOM.2008.97},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile devices can both consume and provide services. They act indeed as a peer, according to the OMA mobile Web services specification. It is a move from simple data sharing to full deliver of application services down to mobile devices. The use of digital certificates to ensure the provision of services is suitable because devices can belong to different trust domains without having previously an established relationship. Besides, by interoperability issues, the use of PKI continues to grow and move into diverse environments. However, applications making use of such certificates are burdened with the overhead of constructing and validating the certification paths. These processes can become more complex and costly than fixed-infrastructure networks due to the wireless communications and restricted processing and power capabilities. The IETF PKIX WG has specified different mechanisms for delegating the certificate validation and making lighter the status information obtaining. However, these are not supported currently by mobile devices. For these reasons, we propose to develop an open toolkit for X.509 public key certificate validating based on OpenSSL. This toolkit is being developed and tested successfully in PDAs.},
keywords = {certificate validation, open toolkit, prototipomiddleware, X.509 certificates},
pubstate = {published},
tppubtype = {inproceedings}
}
@inbook{bc005,
title = {Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenarez and Celeste Campo and Alberto Cortés and Carlos García-Rubio },
url = {https://link.springer.com/chapter/10.1007/978-0-387-84839-6_22
https://link.springer.com/content/pdf/10.1007/978-0-387-84839-6.pdf},
doi = {https://doi.org/10.1007/978-0-387-84839-6_22},
isbn = {978-0-387-84838-9},
year = {2008},
date = {2008-01-09},
urldate = {2008-01-09},
booktitle = {IFIP International Federation for Information Processing},
volume = {284},
pages = {271 - 282},
publisher = {Springer US},
abstract = {User-centric services might enforce requirements difficult to be endorsed by visited networks unless tight coupled trust relations are previously established among providers. Maintaining those fixed trust relations is costly and unmanageable if the number of providers increases. Moreover, it requires providers to use a common security model, credentials, policies…Trust Negotiation can be the solution to this problem since allows to negotiate gradually a security state enabling multiple factor authentication and authorization even for “strangers” by exchanging various credentials. However, there are still two problems to solve, the first one is the delay introduced by the trust negotiation messages if used as bootstrapping in every interaction; the second one is the lack of protocol support. In this article we address those problems by presenting an extension to TLS that enables trust negotiation and credential issuing (to speed-up following interactions) over a secure channel.
},
keywords = {international telecommunication union, message authentication code, Mutual Authentication, protocol message, recursosteleeducacion, transport layer security},
pubstate = {published},
tppubtype = {inbook}
}
2007
@inproceedings{pa045,
title = {Access Control Agnostic Trust Negotiation Decision Engine},
author = {Daniel Diaz-Sanchez and Andres Marin and Florina Almenarez},
url = {https://ieeexplore.ieee.org/document/4394694},
doi = {https://doi.org/10.1109/PIMRC.2007.4394694},
issn = {2166-9570},
year = {2007},
date = {2007-12-04},
urldate = {2007-12-04},
booktitle = {2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Dynamic open environments demand trust negotiation systems for unknown entities willing to communicate. A security context have to be negotiated gradually in a fair peer to peer basis. Trust negotiation engines are driven by decision engines that lack of flexibility: they depend on the implementation, policies languages or credentials types to be used. In this paper we present a trust negotiation engine agnostic regarding policies and rules. The engine is based on iterative weighted Multidimensional Scaling to assist a mobile device during a trust negotiation.},
keywords = {Access control, anotacionsemantica, data mining, engines, information security},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{diazsanchez003,
title = {Context awareness in network selection for dynamic environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio },
url = {https://link.springer.com/article/10.1007/s11235-007-9058-9},
doi = {https://doi.org/10.1007/s11235-007-9058-9},
issn = {1572-9451},
year = {2007},
date = {2007-11-17},
urldate = {2007-11-17},
journal = {Telecommunication Systems},
volume = {36},
issue = {1},
pages = {49-60},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.},
keywords = {Context-awareness, everyware, Mobile devices, Network selection, Pervasive computing, Sistema tele-educacion integrado},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa047,
title = {Device Independent User Interfaces for Smart Cards},
author = {Robbie Schaefer and Wolfgang Mueller and Andrés Marín-López and Daniel Díaz-Sánchez},
doi = {https://dl.acm.org/doi/10.1145/1378063.1378189},
isbn = {9781595938190},
year = {2007},
date = {2007-09-28},
urldate = {2007-09-28},
booktitle = {Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology},
pages = {743 - 750},
abstract = {Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In
this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support different interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.},
keywords = {abstract user interface, device independence, Security, smart cards},
pubstate = {published},
tppubtype = {inproceedings}
}
this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support different interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.@inproceedings{accn002,
title = {Mecanismo de selección de red sensible al contexto para entornos dinámicos},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Alménarez-Mendoza},
year = {2007},
date = {2007-09-28},
urldate = {2007-09-28},
pages = {1-5},
keywords = {MEDEA+ A12},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{accn003,
title = {Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Alménarez and Celeste Campo and Carlos García-Rubio},
isbn = {978-84-9732-605-6},
year = {2007},
date = {2007-09-27},
pages = {1-8},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa046,
title = {Using smart cards for secure and device independent user interfaces},
author = {Robbie Schaefer and Wolfgang Mueller and Andrés Marín-López and Daniel Díaz-Sánchez
},
url = {https://dl.acm.org/doi/10.1145/1378063.1378189},
doi = {https://doi.org/10.1145/1378063.1378189},
isbn = {978-1-59593-819-0},
year = {2007},
date = {2007-09-10},
urldate = {2007-09-10},
booktitle = {Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology},
pages = {743 - 750},
abstract = {Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support varying interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.},
keywords = {abstract user interface, device independence, MEDEA+ A306, Security, Smart Card},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa048,
title = {Middleware for Secure Home Access and Control},
author = {Andrés Marín and Wolfgang Mueller and Robbie Schaefer and Florina Almenarez and Daniel Diaz and Max Ziegler},
url = {https://ieeexplore.ieee.org/document/4144884},
doi = {https://doi.org/10.1109/PERCOMW.2007.80},
isbn = {0-7695-2788-4},
year = {2007},
date = {2007-04-02},
urldate = {2007-04-02},
booktitle = {Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combination with flexible device access and control. However, managing those data poses severe privacy problems both legally and from a trust perspective. Therefore we propose a home automation middleware for secure management of user and context data that gives access to services just for the authorized users and devices. The middleware has been successfully tested at the ambient computing (AC-LAB) at the University of Paderborn},
keywords = {adaptative systems, middleware, Pervasive computing},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{marin003,
title = {Smart card-based agents for fair non-repudiation},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez and Carlos García-Rubio and Celeste Campo},
url = {https://www.sciencedirect.com/science/article/pii/S1389128607000278?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1389128607000278/pdfft?md5=96ecfc2c235f0f03fd85b40c499ffdad&pid=1-s2.0-S1389128607000278-main.pdf},
doi = {https://doi.org/10.1016/j.comnet.2007.01.014},
issn = {0346-251X},
year = {2007},
date = {2007-01-31},
urldate = {2007-01-31},
journal = {COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING},
volume = {51},
issue = {9},
pages = {2288-2298},
abstract = {Non-repudiation protocols are of great importance for electronic interactions. Different protocols have been proposed in this field, progressively relaxing the requirements on the computing power of both parties, and on the load and involvement of a trusted third party (TTP). Besides, there is a need to provide mobile users with a protocol adequate for ad hoc scenarios, where only unreliable channels can be guaranteed, and where the CA may not be reachable. In this paper we propose a new version of the fair non-repudiation protocol proposed by Gürgens et al. in [Sigrid Gürgens, Carsten Rudolph, Holger Vogt, On the security of fair non-repudiation protocols, in: Colin Boyd, Wenbo Mao (Eds.), ISC, Lecture Notes in Computer Science, vol. 2851, Springer, 2003, pp. 193–207]. We show unfair scenarios that can appear if one party controls the communication among the TTP and the other party. We introduce notary agents, which play the TTP role, and run our fair non-repudiation protocol. Notary agents execute inside the smart card, and sign the protocol messages with the user’s private key on his behalf. Our approach enables the protocol to run on unreliable channels, disconnected from the CA.},
keywords = {Ad hoc mode, Electronic transactions, everyware, Fairness, Non-repudiation protocol, Smart Card, Unreliable channels},
pubstate = {published},
tppubtype = {article}
}
@bachelorthesis{bc007,
title = {Enhancing access control for mobile devices with an agnostic trust negotiation decision engine},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenárez },
url = {https://link.springer.com/chapter/10.1007/978-0-387-74159-8_29
https://link.springer.com/content/pdf/10.1007/978-0-387-74159-8.pdf},
doi = {https://doi.org/10.1007/978-0-387-74159-8_29},
isbn = {978-0-387-74158-1},
year = {2007},
date = {2007-01-10},
urldate = {2007-01-10},
booktitle = {Personal Wireless Communications},
volume = {245},
pages = {304 - 315},
publisher = {Springer US},
abstract = {Dynamic open environments demand trust negotiation systems for unknown entities willing to communicate. A security context has to be negotiated gradually in a fair peer to peer basis depending on the security level demanded by the application. Trust negotiation engines are driven by decision engines that lack of flexibility: depend on the implementation, policies languages or credentials types to be used. In this paper we present an agnostic engine able to combine all that information despite its origin or language allowing to select policies or requirements, credentials and resources to disclose, according to user preferences and context using iterative weighted Multidimensional Scaling to assist a mobile device during a trust negotiation.
},
keywords = {Access control, anotacionsemantica, flexible, trust negotiation},
pubstate = {published},
tppubtype = {bachelorthesis}
}
2006
@inproceedings{accn004,
title = {Securing interactions in emerging environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Alménarez},
isbn = {84-6901744-6},
year = {2006},
date = {2006-11-28},
urldate = {2006-11-28},
pages = {1-13},
keywords = {iteaeasywireless},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa051,
title = {Interaction Distance determination with PervsIM},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Almenarez and Carlos García-Rubio and Celeste Campo},
year = {2006},
date = {2006-06-30},
urldate = {2006-06-30},
booktitle = {15th IST Mobile And Wireless Communication Summit},
pages = {1-8},
keywords = {Ubisec},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa049,
title = {A Smart Card Solution for Access Control and Trust Management for Nomadic Users},
author = {Daniel Díaz-Sánchez and Andrés Marín-Lopez and Florina Almenárez-Mendoza },
url = {https://link.springer.com/chapter/10.1007/11733447_5},
doi = {https://doi.org/10.1007/11733447_5},
issn = {0302-9743},
year = {2006},
date = {2006-04-28},
urldate = {2006-04-28},
booktitle = {Smart Card Research and Advanced Applications},
volume = {3928},
pages = {62 - 77},
abstract = {Increasing efforts are placed on security solutions for nomadic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security. Nevertheless, such solutions concentrate only on offering the cryptographical capabilities of the smart card, together with key and user certificate storage. Advanced trust management and access control are not addressed. In this article, we propose a scheme to include trust management and attribute certificates for authorization in two widely used cryptographic APIs: Microsoft CryptoAPI and RSA labs PKCS#11.},
keywords = {Access control, cryptographic operation, MEDEA+ A306, physical store, Smart Card, Trust management},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{campo001,
title = {Secure Service Discovery based on Trust Management for ad-hoc Networks},
author = {Celeste Campo and Florina Almenárez and Daniel Díaz and Carlos García-Rubio and Andrés Marín-López},
url = {https://www.jucs.org/jucs_12_3/secure_service_discovery_based.html
https://lib.jucs.org/article/28594/},
doi = {http://dx.doi.org/10.3217/jucs-012-03-0340},
issn = {0948-695X},
year = {2006},
date = {2006-03-28},
urldate = {2006-03-28},
journal = {Journal of Universal Computer Science},
volume = {12},
number = {3},
pages = {340-356},
abstract = {In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.},
keywords = {ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec},
pubstate = {published},
tppubtype = {article}
}
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.@inproceedings{pa052,
title = {Developing a model for trust management in pervasive devices},
author = {Florina Almenarez and Andrés Marin and Daniel Diaz and Juan Sanchez},
url = {https://ieeexplore.ieee.org/document/1598984},
doi = {https://doi.org/10.1109/PERCOMW.2006.41},
isbn = {0-7695-2520-2},
year = {2006},
date = {2006-03-27},
urldate = {2006-03-27},
booktitle = {Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. Trust is fundamental to establish communication with other users, because the identity is often uncertain and on one's own does not provide trust information, for instance, could an unknown user be trustworthy? Nowadays, these devices have a so limited security support. So, we propose a simple trust management model to enhance such support, allowing them interact in ad hoc networks and peer-to-peer applications in a secure way. In this paper, our main contribution is a mathematical and a probabilistic model, as well as demonstrating the model feasibility, since it has been assessed through the prototype implementation, which has been tested in a Pocket PC},
keywords = {mathematical model, peer to peer computing, Pervasive computing, Protection, Ubisec},
pubstate = {published},
tppubtype = {inproceedings}
}
@inbook{bc010,
title = {Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards},
author = {Juan Sánchez-Sánchez and Daniel Díaz-Sánchez and José Vigo-Segura and Natividad Martínez-Madrid and Ralf Seepold },
url = {https://link.springer.com/chapter/10.1007/11733447_6
https://link.springer.com/content/pdf/10.1007/11733447.pdf},
doi = {https://doi.org/10.1007/11733447_6},
isbn = {978-3-540-33311-1},
year = {2006},
date = {2006-01-11},
urldate = {2006-01-11},
booktitle = {Smart Card Research and Advanced Applications},
volume = {3928},
pages = {78 - 90},
publisher = {Springer Berlin Heidelberg},
abstract = {This article proposes an integration of Smart Cards into an environment controlled by a Residential Gateway. In a common scenario, the Residential Gateway offers services with different characteristics. Some services belong to profiles of a user and thus these services have a mobile behavior. As a consequence, these profile-related and thus user-specific services are configured via a Smart Card. The Smart Card serves as a medium easy to transport but it added more features to the scenario like the possibility of cryptographic services, secure payments for example for pay-per-view or environment’s customization. The core of this work has been carried out in order to achieve an integration between two existing technologies: OSGi (Open Service Gateway Initiative) and Java Card.
},
keywords = {automation network, java virtual machine, MEDEA+ A306, open service gateway initiative, service platform, Smart Card},
pubstate = {published},
tppubtype = {inbook}
}
@inbook{bc009,
title = {Context Awareness in Network Selection for Dynamic Environments},
author = {Daniel Díaz and Andrés Marín and Florina Almenárez and Carlos García-Rubio and Celeste Campo },
url = {https://link.springer.com/chapter/10.1007/11872153_19
https://link.springer.com/content/pdf/10.1007/11872153.pdf},
doi = {https://doi.org/10.1007/11872153_19},
isbn = {978-3-540-45174-7},
year = {2006},
date = {2006-01-11},
urldate = {2006-01-11},
booktitle = {Personal Wireless Communications},
volume = {4217},
pages = {216 - 227},
publisher = {Springer Berlin Heidelberg},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed PervsIM, a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.
},
keywords = {Access control, context, Network selection, trust},
pubstate = {published},
tppubtype = {inbook}
}
@inbook{bc008,
title = {A Smart Card Solution for Access Control and Trust Management for Nomadic Users},
author = {Daniel Díaz-Sánchez and Andrés Marín-Lopez and Florina Almenárez-Mendoza },
url = {https://link.springer.com/chapter/10.1007/11733447_5
https://link.springer.com/content/pdf/10.1007/11733447.pdf},
doi = {https://doi.org/10.1007/11733447_5},
isbn = {978-3-540-33311-1},
year = {2006},
date = {2006-01-05},
urldate = {2006-01-05},
booktitle = {Smart Card Research and Advanced Applications},
volume = {3928},
pages = {62 - 77},
publisher = {Springer Berlin Heidelberg},
abstract = {Increasing efforts are placed on security solutions for nomadic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security. Nevertheless, such solutions concentrate only on offering the cryptographical capabilities of the smart card, together with key and user certificate storage. Advanced trust management and access control are not addressed. In this article, we propose a scheme to include trust management and attribute certificates for authorization in two widely used cryptographic APIs: Microsoft CryptoAPI and RSA labs PKCS#11.},
keywords = {Access control, cryptographic operation, physical store, Smart Card, Trust management},
pubstate = {published},
tppubtype = {inbook}
}
2005
@inproceedings{accn05,
title = {A framework for authorization and delegation in ubiquitous computing},
author = {Daniel Díaz-Sánchez and Andrés Marín and Florina Alménarez},
isbn = {84-9732-442-0},
year = {2005},
date = {2005-09-16},
urldate = {2005-09-16},
booktitle = {UCAMI 2005: Ubiquitous Computing and Ambient Intelligence. Congreso Español De Informatica},
pages = {1-10},
keywords = {MEDEA+ A12},
pubstate = {published},
tppubtype = {inproceedings}
}
2004
@article{10.1007/978-3-540-30079-3_10,
title = {Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security},
author = {Florina Almenarez and Daniel Díaz and Andrés Marín},
editor = {Sokratis Katsikas and Javier Lopez and Günther Pernul},
url = {https://link.springer.com/chapter/10.1007/978-3-540-30079-3_10
https://doi.org/10.1007/978-3-540-30079-3_10},
doi = {10.1007/978-3-540-30079-3_10},
issn = {0302-9743},
year = {2004},
date = {2004-01-01},
urldate = {2004-01-01},
journal = {Lecture Notes In Computer Sciences},
volume = {3184},
pages = {90-99},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
abstract = {Nowadays we can perform business transactions with remote servers interconnected to Internet using our personal devices. These transactions can also be possible without any infrastructure in pure ad-hoc networks. In both cases, interacting parts are often unknown, therefore, they require some mechanism to establish ad-hoc trust relationships and perform secure transactions. Operating systems for mobile platforms support secure communication and authentication, but this support is based on hierarchical PKI. For wireless communications, they use the (in)secure protocol WEP. This paper presents a WCE security enhanced architecture allowing secure transactions, mutual authentication, and access control based on dynamic management of the trusted certificate list. We have successfully implemented our own CSP to support the new certificate management and data ciphering.},
keywords = {EasyWireless, everyware, Mutual Authentication, Smart Card, Trust Degree, Trust Relationship, Trusted Third Party, Ubisec},
pubstate = {published},
tppubtype = {article}
}
Publications
Building an Open Toolkit of Digital Certificate Validation for Mobile Web Services Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7. Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment Book Chapter In: IFIP International Federation for Information Processing, vol. 284, pp. 271 - 282, Springer US, 2008, ISBN: 978-0-387-84838-9. Access Control Agnostic Trust Negotiation Decision Engine Proceedings Article In: 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Institute of Electrical and Electronics Engineers (IEEE), 2007, ISSN: 2166-9570. Context awareness in network selection for dynamic environments Journal Article In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451. Device Independent User Interfaces for Smart Cards Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 9781595938190. Mecanismo de selección de red sensible al contexto para entornos dinámicos Proceedings Article In: pp. 1-5, 2007. Mejorando el control de acceso para dispositivos móviles con un motor de decisión agnóstico para negociación de confianza Proceedings Article In: pp. 1-8, 2007, ISBN: 978-84-9732-605-6. Using smart cards for secure and device independent user interfaces Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 978-1-59593-819-0. Middleware for Secure Home Access and Control Proceedings Article In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Institute of Electrical and Electronics Engineers (IEEE), 2007, ISBN: 0-7695-2788-4. Smart card-based agents for fair non-repudiation Journal Article In: COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol. 51, iss. 9, pp. 2288-2298, 2007, ISSN: 0346-251X. Enhancing access control for mobile devices with an agnostic trust negotiation decision engine Bachelor Thesis 2007, ISBN: 978-0-387-74158-1. Securing interactions in emerging environments Proceedings Article In: pp. 1-13, 2006, ISBN: 84-6901744-6. Interaction Distance determination with PervsIM Proceedings Article In: 15th IST Mobile And Wireless Communication Summit, pp. 1-8, 2006. A Smart Card Solution for Access Control and Trust Management for Nomadic Users Proceedings Article In: Smart Card Research and Advanced Applications, pp. 62 - 77, 2006, ISSN: 0302-9743. Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Developing a model for trust management in pervasive devices Proceedings Article In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), Institute of Electrical and Electronics Engineers (IEEE), 2006, ISBN: 0-7695-2520-2. Smart Cards and Residential Gateways: Improving OSGi Services with Java Cards Book Chapter In: Smart Card Research and Advanced Applications, vol. 3928, pp. 78 - 90, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-33311-1. Context Awareness in Network Selection for Dynamic Environments Book Chapter In: Personal Wireless Communications, vol. 4217, pp. 216 - 227, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-45174-7. A Smart Card Solution for Access Control and Trust Management for Nomadic Users Book Chapter In: Smart Card Research and Advanced Applications, vol. 3928, pp. 62 - 77, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-33311-1. A framework for authorization and delegation in ubiquitous computing Proceedings Article In: UCAMI 2005: Ubiquitous Computing and Ambient Intelligence. Congreso Español De Informatica, pp. 1-10, 2005, ISBN: 84-9732-442-0. Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security Journal Article In: Lecture Notes In Computer Sciences, vol. 3184, pp. 90-99, 2004, ISSN: 0302-9743.2008
2007
2006
2005
2004