Cortés, Alberto; García-Rubio, Carlos; Campo-Vázquez, Celeste; García-Lozano, Estrella; Rodriguez-Carrion, Alicia Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. Abstract | Links | BibTeX | Tags: EasyWireless, iteaeasywireless, network interface, Pervasive computing Díaz-Sánchez, Daniel; Marín-López, Andrés; Alménarez, Florina Securing interactions in emerging environments Proceedings Article In: pp. 1-13, 2006, ISBN: 84-6901744-6. BibTeX | Tags: iteaeasywireless Campo, Celeste; Almenárez, Florina; Díaz, Daniel; García-Rubio, Carlos; Marín-López, Andrés Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Abstract | Links | BibTeX | Tags: ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec2011
@conference{campo025,
title = {Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices},
author = {Alberto Cortés and Carlos García-Rubio and Celeste Campo-Vázquez and Estrella García-Lozano and Alicia Rodriguez-Carrion },
doi = {https://doi.org/10.1109/PERCOMW.2011.5766876},
isbn = {978-1-61284-938-6},
year = {2011},
date = {2011-05-12},
urldate = {2011-05-12},
booktitle = {International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011)},
pages = {239-244},
publisher = {IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC },
abstract = {Many modern devices come with several, heterogeneous, network interface cards (NICs). However, simple operations like transferring data flows to the cheapest NIC or to one with enough Quality of Service (QoS) are awkward tasks on most Operating Systems. In this paper, we discuss the criteria to select the proper NIC for a given data flow. We also present a new Operating System service, called netqos, to publish data and figures of merit for these criteria. The main objective of netqos is providing relevant information to applications and middleware about NIC selection criteria, isolating them from the idiosyncrasies of the many QoS gathering tools and allowing to choose the proper NIC to fit their needs. We have built this new service as a synthetic file system for the Linux kernel. We describe our experiences in using it in a real-world scenario and the practical and inherent limitations of this approach.},
keywords = {EasyWireless, iteaeasywireless, network interface, Pervasive computing},
pubstate = {published},
tppubtype = {conference}
}
2006
@inproceedings{accn004,
title = {Securing interactions in emerging environments},
author = {Daniel Díaz-Sánchez and Andrés Marín-López and Florina Alménarez},
isbn = {84-6901744-6},
year = {2006},
date = {2006-11-28},
urldate = {2006-11-28},
pages = {1-13},
keywords = {iteaeasywireless},
pubstate = {published},
tppubtype = {inproceedings}
}
@article{campo001,
title = {Secure Service Discovery based on Trust Management for ad-hoc Networks},
author = {Celeste Campo and Florina Almenárez and Daniel Díaz and Carlos García-Rubio and Andrés Marín-López},
url = {https://www.jucs.org/jucs_12_3/secure_service_discovery_based.html
https://lib.jucs.org/article/28594/},
doi = {http://dx.doi.org/10.3217/jucs-012-03-0340},
issn = {0948-695X},
year = {2006},
date = {2006-03-28},
urldate = {2006-03-28},
journal = {Journal of Universal Computer Science},
volume = {12},
number = {3},
pages = {340-356},
abstract = {In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.},
keywords = {ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec},
pubstate = {published},
tppubtype = {article}
}
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.
Publications
Selection and Publication of Network Interface Cards in Multihomed Pervasive Computing Devices Conference International IEEE Workshop on Middleware and System Support for Pervasive Computing (PERWARE 2011), IEEE - THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, INC , 2011, ISBN: 978-1-61284-938-6. Securing interactions in emerging environments Proceedings Article In: pp. 1-13, 2006, ISBN: 84-6901744-6. Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X.2011
2006