Arias-Cabarcos, Patricia; Almenárez, Florina; Trapero, Rubén; Díaz-Sánchez, Daniel; Marín, Andrés Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Abstract | Links | BibTeX | Tags: blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security García-Rubio, Carlos; Familiar, Miguel; Martínez, Jose; Corredor, Ivan Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective Journal Article In: COMPUTER NETWORKS, vol. 56, iss. 4, pp. 1303-1328, 2012, ISSN: 1389-1286. Abstract | Links | BibTeX | Tags: battery, location tracking, middleware, Pervasive computing, wireless sensor Cortés, Alberto; García-Rubio, Carlos; Campo-Vázquez, Celeste; García-Lozano, Estrella; Rodriguez-Carrion, Alicia Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. Abstract | Links | BibTeX | Tags: EasyWireless, iteaeasywireless, network interface, Pervasive computing García-Rubio, Carlos; Campo-Vázquez, Celeste The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective Book Chapter In: pp. 315-332, NOVA SCIENCE PUBLISHERS INC , 2008, ISBN: 978-1-60456-680-2. BibTeX | Tags: Pervasive computing Almenarez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7. Abstract | Links | BibTeX | Tags: anotacionsemantica, middleware, peer to peer computing, Pervasive computing Díaz-Sánchez, Daniel; Marín-López, Andrés; Almenárez-Mendoza, Florina; Campo-Vázquez, Celeste; García-Rubio, Carlos Context awareness in network selection for dynamic environments Journal Article In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451. Abstract | Links | BibTeX | Tags: Context-awareness, everyware, Mobile devices, Network selection, Pervasive computing, Sistema tele-educacion integrado Marín, Andrés; Mueller, Wolfgang; Schaefer, Robbie; Almenarez, Florina; Diaz, Daniel; Ziegler, Max Middleware for Secure Home Access and Control Proceedings Article In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Institute of Electrical and Electronics Engineers (IEEE), 2007, ISBN: 0-7695-2788-4. Abstract | Links | BibTeX | Tags: adaptative systems, middleware, Pervasive computing Almenarez, Florina; Marin, Andrés; Diaz, Daniel; Sanchez, Juan Developing a model for trust management in pervasive devices Proceedings Article In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), Institute of Electrical and Electronics Engineers (IEEE), 2006, ISBN: 0-7695-2520-2. Abstract | Links | BibTeX | Tags: mathematical model, peer to peer computing, Pervasive computing, Protection, Ubisec2015
@article{ariascabarcos002,
title = {Blended Identity: Pervasive IdM for Continuous Authentication},
author = {Patricia Arias-Cabarcos and Florina Almenárez and Rubén Trapero and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7118079},
doi = {https://doi.org/10.1109/MSP.2015.62},
issn = {1540-7993},
year = {2015},
date = {2015-06-04},
urldate = {2015-06-04},
journal = {IEEE Xplore},
volume = {13},
issue = {3},
pages = {32-39},
abstract = {A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.},
keywords = {blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security},
pubstate = {published},
tppubtype = {article}
}
2012
@article{garciarubio005,
title = {Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective},
author = {Carlos García-Rubio and Miguel Familiar and Jose Martínez and Ivan Corredor},
doi = {https://doi.org/10.1016/j.comnet.2011.12.005},
issn = {1389-1286},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
journal = {COMPUTER NETWORKS},
volume = {56},
issue = {4},
pages = {1303-1328},
publisher = {Computer Network},
abstract = {The increase in physical resources for the next-generation of embedded computing devices, as well as in the efforts carried out by the scientific and research communities, is paving the way for Smart Infrastructures based on Wireless Sensor Networks. In such manner, not only open and formally defined Service-Oriented Frameworks are required, but also efficient middleware technologies that ease the development of new sensor-based services. From the cornerstone analysis of pervasive computing principles applied to Smart Spaces creation, this article presents the μSMS (micro Subscription Management System) middleware. This approach specifies and develops the notion of virtual sensor services created for Smart Environments over sensor networks from tiny in-network services based on agent technology. In the framework of the μSWN European Research Project, this architecture has been validated in a Smart Hospital real-world scenario using a healthcare virtual sensor service. Considering such purpose, medical status monitoring, location tracking and perimeter surveillance agent-based services have been developed. This study is concluded by a comparative analysis of the system considering memory overhead, packet delivery ratio, average end-to-end delay and battery lifetime as evaluation metrics. The results show a lightweight middleware implementation with good overall system and network performance.},
keywords = {battery, location tracking, middleware, Pervasive computing, wireless sensor},
pubstate = {published},
tppubtype = {article}
}
2011
@conference{campo025,
title = {Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices},
author = {Alberto Cortés and Carlos García-Rubio and Celeste Campo-Vázquez and Estrella García-Lozano and Alicia Rodriguez-Carrion },
doi = {https://doi.org/10.1109/PERCOMW.2011.5766876},
isbn = {978-1-61284-938-6},
year = {2011},
date = {2011-05-12},
urldate = {2011-05-12},
booktitle = {International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011)},
pages = {239-244},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Many modern devices come with several, heterogeneous, network interface cards (NICs). However, simple operations like transferring data flows to the cheapest NIC or to one with enough Quality of Service (QoS) are awkward tasks on most Operating Systems. In this paper, we discuss the criteria to select the proper NIC for a given data flow. We also present a new Operating System service, called netqos, to publish data and figures of merit for these criteria. The main objective of netqos is providing relevant information to applications and middleware about NIC selection criteria, isolating them from the idiosyncrasies of the many QoS gathering tools and allowing to choose the proper NIC to fit their needs. We have built this new service as a synthetic file system for the Linux kernel. We describe our experiences in using it in a real-world scenario and the practical and inherent limitations of this approach.},
keywords = {EasyWireless, iteaeasywireless, network interface, Pervasive computing},
pubstate = {published},
tppubtype = {conference}
}
2008
@inbook{garciarubio007,
title = {The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective },
author = {Carlos García-Rubio and Celeste Campo-Vázquez },
isbn = {978-1-60456-680-2},
year = {2008},
date = {2008-10-01},
urldate = {2008-10-01},
pages = {315-332},
publisher = {NOVA SCIENCE PUBLISHERS INC },
keywords = {Pervasive computing},
pubstate = {published},
tppubtype = {inbook}
}
@inproceedings{pa042,
title = {A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications},
author = {Florina Almenarez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://ieeexplore.ieee.org/document/4517451},
doi = {https://doi.org/10.1109/PERCOM.2008.95},
isbn = {978-0-7695-3113-7},
year = {2008},
date = {2008-05-12},
urldate = {2008-05-12},
booktitle = {2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Trust has emerged as an important facet of inter-domain relationships. Trust management in fixed networks is not functional in ad hoc P2P networks, because these require an autonomous, user-centric and non-static trust management. The trust model is the basis of any security infrastructure. In this paper, we propose a trust-based middleware for secure digital content sharing between pervasive devices. Such middleware allows to enhance security support of pervasive devices. Likewise, we propose a suitable and efficient secure file exchange protocol, WSFEP, for content sharing. Both middleware and file sharing application have been successfuly integrated and tested on PDAs.},
keywords = {anotacionsemantica, middleware, peer to peer computing, Pervasive computing},
pubstate = {published},
tppubtype = {inproceedings}
}
2007
@article{diazsanchez003,
title = {Context awareness in network selection for dynamic environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Almenárez-Mendoza and Celeste Campo-Vázquez and Carlos García-Rubio },
url = {https://link.springer.com/article/10.1007/s11235-007-9058-9},
doi = {https://doi.org/10.1007/s11235-007-9058-9},
issn = {1572-9451},
year = {2007},
date = {2007-11-17},
urldate = {2007-11-17},
journal = {Telecommunication Systems},
volume = {36},
issue = {1},
pages = {49-60},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.},
keywords = {Context-awareness, everyware, Mobile devices, Network selection, Pervasive computing, Sistema tele-educacion integrado},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa048,
title = {Middleware for Secure Home Access and Control},
author = {Andrés Marín and Wolfgang Mueller and Robbie Schaefer and Florina Almenarez and Daniel Diaz and Max Ziegler},
url = {https://ieeexplore.ieee.org/document/4144884},
doi = {https://doi.org/10.1109/PERCOMW.2007.80},
isbn = {0-7695-2788-4},
year = {2007},
date = {2007-04-02},
urldate = {2007-04-02},
booktitle = {Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combination with flexible device access and control. However, managing those data poses severe privacy problems both legally and from a trust perspective. Therefore we propose a home automation middleware for secure management of user and context data that gives access to services just for the authorized users and devices. The middleware has been successfully tested at the ambient computing (AC-LAB) at the University of Paderborn},
keywords = {adaptative systems, middleware, Pervasive computing},
pubstate = {published},
tppubtype = {inproceedings}
}
2006
@inproceedings{pa052,
title = {Developing a model for trust management in pervasive devices},
author = {Florina Almenarez and Andrés Marin and Daniel Diaz and Juan Sanchez},
url = {https://ieeexplore.ieee.org/document/1598984},
doi = {https://doi.org/10.1109/PERCOMW.2006.41},
isbn = {0-7695-2520-2},
year = {2006},
date = {2006-03-27},
urldate = {2006-03-27},
booktitle = {Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. Trust is fundamental to establish communication with other users, because the identity is often uncertain and on one's own does not provide trust information, for instance, could an unknown user be trustworthy? Nowadays, these devices have a so limited security support. So, we propose a simple trust management model to enhance such support, allowing them interact in ad hoc networks and peer-to-peer applications in a secure way. In this paper, our main contribution is a mathematical and a probabilistic model, as well as demonstrating the model feasibility, since it has been assessed through the prototype implementation, which has been tested in a Pocket PC},
keywords = {mathematical model, peer to peer computing, Pervasive computing, Protection, Ubisec},
pubstate = {published},
tppubtype = {inproceedings}
}
Publications
Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective Journal Article In: COMPUTER NETWORKS, vol. 56, iss. 4, pp. 1303-1328, 2012, ISSN: 1389-1286. Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. The Role of Service Discovery in Context-Aware, Pervasive Computing Applications. In: Personalization of Interactive Multimedia Services: A Research and Development Perspective Book Chapter In: pp. 315-332, NOVA SCIENCE PUBLISHERS INC , 2008, ISBN: 978-1-60456-680-2. A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications Proceedings Article In: 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Institute of Electrical and Electronics Engineers (IEEE), 2008, ISBN: 978-0-7695-3113-7. Context awareness in network selection for dynamic environments Journal Article In: Telecommunication Systems, vol. 36, iss. 1, pp. 49-60, 2007, ISSN: 1572-9451. Middleware for Secure Home Access and Control Proceedings Article In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Institute of Electrical and Electronics Engineers (IEEE), 2007, ISBN: 0-7695-2788-4. Developing a model for trust management in pervasive devices Proceedings Article In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), Institute of Electrical and Electronics Engineers (IEEE), 2006, ISBN: 0-7695-2520-2.2015
2012
2011
2008
2007
2006