Díaz-Sánchez, Daniel; Guerrero, Rosa Sánchez; López, Andrés Marín; Almenares, Florina; Arias, Patricia A H.264 SVC distributed content protection system with flexible key stream generation Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2022, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: Cloud computing, cryptography, multimedia, servicioseguridad Almenares, Florina; Arias, Patricia; Marín, Andrés; Díaz-Sánchez, Daniel; Sánchez, Rosa Overhead of using Secure Wireless Communications in Mobile Computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 59, iss. 2, pp. 335-342, 2013, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Browsers, Ciphers, Energy and time performance, Energy consumption, Handheld devices, Secure wireless communications, servicioseguridad, SSL/TLS, Wireless communication Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Marín-López, Andrés; Díaz-Sánchez, Daniel; Sánchez-Guerrero, Rosa A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management Journal Article In: Journal of Network and Systems Management, vol. 20, iss. 4, pp. 513-533, 2012, ISSN: 1573-7705. Abstract | Links | BibTeX | Tags: Cloud computing, consequence, federation, risk assessment, SAML, servicioseguridad, Trust management Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Marín, Andrés; Arias, Patricia; Sanvido, Fabio An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health Journal Article In: Sensors , vol. 12, iss. 5, pp. 6129-6154, 2012, ISSN: 1424-8220. Abstract | Links | BibTeX | Tags: delegation, event, federation, health care, identity management, privacy, revocation consent, servicioseguridad, theory queue, user-centric2022
@inproceedings{PA012,
title = {A H.264 SVC distributed content protection system with flexible key stream generation},
author = {Daniel Díaz-Sánchez and Rosa Sánchez Guerrero and Andrés Marín López and Florina Almenares and Patricia Arias},
url = {https://ieeexplore.ieee.org/document/6336520},
doi = {https://doi.org/10.1109/ICCE-Berlin.2012.6336520},
issn = {2166-6814},
year = {2022},
date = {2022-10-22},
urldate = {2022-10-22},
booktitle = {2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin)},
publisher = {IEEE},
abstract = {Modern scalable coding techniques, as H264 SVC, are adequate to save processing power and bandwidth. Moreover, if the enhancements of a SVC encoded content are protected, it is possible to enable pay-per-quality systems. Transcoding and protection entail huge doses of processing power at provider side and should be distributed. Moreover, processing key streams to decrypt enhancements that were encrypted separately can increase the complexity at receiver side. This abstract describes a distributed system for content encoding and protection that generates a flexible key stream that simplifies the receiver.},
keywords = {Cloud computing, cryptography, multimedia, servicioseguridad},
pubstate = {published},
tppubtype = {inproceedings}
}
2013
@article{almenarez004,
title = {Overhead of using Secure Wireless Communications in Mobile Computing},
author = {Florina Almenares and Patricia Arias and Andrés Marín and Daniel Díaz-Sánchez and Rosa Sánchez
},
url = {https://ieeexplore.ieee.org/document/6531115
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6531115},
doi = {https://doi.org/10.1109/TCE.2013.6531115},
issn = {0098-3063},
year = {2013},
date = {2013-05-06},
urldate = {2013-05-06},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {59},
issue = {2},
pages = {335-342},
abstract = {Secure wireless communications are fundamental in any interaction in order to avoid security and privacy breaches, especially from mobile devices. The use of this kind of communications is far more frequent and the number of users increases day after day. This paper shows and analyzes the support, performance and consumption of cryptographic algorithms and cipher suites in terms of time and energy when secure communications (i.e., using SSL) are established according to different security levels. This study has been performed in distinct operating systems, and using different browsers and libraries.},
keywords = {Browsers, Ciphers, Energy and time performance, Energy consumption, Handheld devices, Secure wireless communications, servicioseguridad, SSL/TLS, Wireless communication},
pubstate = {published},
tppubtype = {article}
}
2012
@article{ariascabarcos001,
title = {A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management},
author = {Patricia Arias-Cabarcos and Florina Almenárez-Mendoza and Andrés Marín-López and Daniel Díaz-Sánchez and Rosa Sánchez-Guerrero },
url = {https://link.springer.com/article/10.1007/s10922-012-9244-2},
doi = {https://doi.org/10.1007/s10922-012-9244-2},
issn = {1573-7705},
year = {2012},
date = {2012-07-04},
urldate = {2012-07-04},
journal = {Journal of Network and Systems Management},
volume = {20},
issue = {4},
pages = {513-533},
abstract = {The cloud computing paradigm is set to become the next explosive revolution on the Internet, but its adoption is still hindered by security problems. One of the fundamental issues is the need for better access control and identity management systems. In this context, Federated Identity Management (FIM) is identified by researchers and experts as an important security enabler, since it will play a vital role in allowing the global scalability that is required for the successful implantation of cloud technologies. However, current FIM frameworks are limited by the complexity of the underlying trust models that need to be put in place before inter-domain cooperation. Thus, the establishment of dynamic federations between the different cloud actors is still a major research challenge that remains unsolved. Here we show that risk evaluation must be considered as a key enabler in evidence-based trust management to foster collaboration between cloud providers that belong to unknown administrative domains in a secure manner. In this paper, we analyze the Federated Identity Management process and propose a taxonomy that helps in the classification of the involved risks in order to mitigate vulnerabilities and threats when decisions about collaboration are made. Moreover, a set of new metrics is defined to allow a novel form of risk quantification in these environments. Other contributions of the paper include the definition of a generic hierarchical risk aggregation system, and a descriptive use-case where the risk computation framework is applied to enhance cloud-based service provisioning.
},
keywords = {Cloud computing, consequence, federation, risk assessment, SAML, servicioseguridad, Trust management},
pubstate = {published},
tppubtype = {article}
}
@article{sanchezguerrero001,
title = {An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health},
author = {Rosa Sánchez-Guerrero and Florina Almenárez and Daniel Díaz-Sánchez and Andrés Marín and Patricia Arias and Fabio Sanvido
},
url = {https://www.mdpi.com/1424-8220/12/5/6129
https://www.mdpi.com/1424-8220/12/5/6129/pdf?version=1403317529},
doi = {https://doi.org/10.3390/s120506129},
issn = {1424-8220},
year = {2012},
date = {2012-05-10},
urldate = {2012-05-10},
journal = {Sensors },
volume = {12},
issue = {5},
pages = {6129-6154},
abstract = {Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent—considered as a privacy rule in sensitive scenarios—has not been fully addressed. This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.},
keywords = {delegation, event, federation, health care, identity management, privacy, revocation consent, servicioseguridad, theory queue, user-centric},
pubstate = {published},
tppubtype = {article}
}
Publications
A H.264 SVC distributed content protection system with flexible key stream generation Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2022, ISSN: 2166-6814. Overhead of using Secure Wireless Communications in Mobile Computing Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 59, iss. 2, pp. 335-342, 2013, ISSN: 0098-3063. A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management Journal Article In: Journal of Network and Systems Management, vol. 20, iss. 4, pp. 513-533, 2012, ISSN: 1573-7705. An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health Journal Article In: Sensors , vol. 12, iss. 5, pp. 6129-6154, 2012, ISSN: 1424-8220.2022
2013
2012