Sanvido, Fabio; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Marín-López, Andrés A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Abstract | BibTeX | Tags: Cloud computing, future internet, identity management, raudo2, Security, trust Forné, Jordi; Hinarejos, Francisca; Marín, Andrés; Almenárez, Florina; Lopez, Javier; Montenegro, Jose A.; Lacoste, Marc; Díaz, Daniel Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Abstract | Links | BibTeX | Tags: authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec Campo, Celeste; Almenárez, Florina; Díaz, Daniel; García-Rubio, Carlos; Marín-López, Andrés Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Abstract | Links | BibTeX | Tags: ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec Díaz, Daniel; Marín, Andrés; Almenárez, Florina; García-Rubio, Carlos; Campo, Celeste Context Awareness in Network Selection for Dynamic Environments Book Chapter In: Personal Wireless Communications, vol. 4217, pp. 216 - 227, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-45174-7. Abstract | Links | BibTeX | Tags: Access control, context, Network selection, trust2011
@inproceedings{pa028,
title = {A Survey on Security in Future Internet and Cloud},
author = {Fabio Sanvido and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Andrés Marín-López},
isbn = {978-1-61208-148-9},
year = {2011},
date = {2011-08-27},
urldate = {2011-08-27},
booktitle = {International Conference on Advances in Future Internet (UBICOMM 2011)},
abstract = {https://personales.upv.es/thinkmind/dl/conferences/afin/afin_2011/afin_2011_2_30_70129.pdf},
keywords = {Cloud computing, future internet, identity management, raudo2, Security, trust},
pubstate = {published},
tppubtype = {inproceedings}
}
2009
@article{marin001,
title = {Pervasive authentication and authorization infrastructures for mobile users},
author = {Jordi Forné and Francisca Hinarejos and Andrés Marín and Florina Almenárez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Díaz},
url = {https://www.sciencedirect.com/science/article/pii/S0167404809000911?via%3Dihub},
doi = {https://doi.org/10.1016/j.cose.2009.09.001},
issn = {0167-4048},
year = {2009},
date = {2009-09-25},
urldate = {2009-09-25},
journal = {COMPUTERS & SECURITY},
volume = {29},
issue = {4},
pages = {501-514},
abstract = {Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.},
keywords = {authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec},
pubstate = {published},
tppubtype = {article}
}
2006
@article{campo001,
title = {Secure Service Discovery based on Trust Management for ad-hoc Networks},
author = {Celeste Campo and Florina Almenárez and Daniel Díaz and Carlos García-Rubio and Andrés Marín-López},
url = {https://www.jucs.org/jucs_12_3/secure_service_discovery_based.html
https://lib.jucs.org/article/28594/},
doi = {http://dx.doi.org/10.3217/jucs-012-03-0340},
issn = {0948-695X},
year = {2006},
date = {2006-03-28},
urldate = {2006-03-28},
journal = {Journal of Universal Computer Science},
volume = {12},
number = {3},
pages = {340-356},
abstract = {In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.},
keywords = {ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec},
pubstate = {published},
tppubtype = {article}
}
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.@inbook{bc009,
title = {Context Awareness in Network Selection for Dynamic Environments},
author = {Daniel Díaz and Andrés Marín and Florina Almenárez and Carlos García-Rubio and Celeste Campo },
url = {https://link.springer.com/chapter/10.1007/11872153_19
https://link.springer.com/content/pdf/10.1007/11872153.pdf},
doi = {https://doi.org/10.1007/11872153_19},
isbn = {978-3-540-45174-7},
year = {2006},
date = {2006-01-11},
urldate = {2006-01-11},
booktitle = {Personal Wireless Communications},
volume = {4217},
pages = {216 - 227},
publisher = {Springer Berlin Heidelberg},
abstract = {Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed PervsIM, a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today’s mobile devices.
},
keywords = {Access control, context, Network selection, trust},
pubstate = {published},
tppubtype = {inbook}
}
Publications
A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Context Awareness in Network Selection for Dynamic Environments Book Chapter In: Personal Wireless Communications, vol. 4217, pp. 216 - 227, Springer Berlin Heidelberg, 2006, ISBN: 978-3-540-45174-7.2011
2009
2006