Almenárez, Florina; Marín, Andrés; Díaz, Daniel; Cortés, Alberto; Campo, Celeste; García-Rubio, Carlos Trust management for multimedia P2P applications in autonomic networking Journal Article In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705. Abstract | Links | BibTeX | Tags: anotacionsemantica, Autonomic networking, ITACA, Multimedia P2P applications, Trust attacks, Trust management Forné, Jordi; Hinarejos, Francisca; Marín, Andrés; Almenárez, Florina; Lopez, Javier; Montenegro, Jose A.; Lacoste, Marc; Díaz, Daniel Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Abstract | Links | BibTeX | Tags: authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec Campo-Vázquez, Celeste; García-Rubio, Carlos; Cortés, Alberto Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones Conference Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008, SPRINGER, 2009, ISBN: 978-3-540-85866-9. Abstract | Links | BibTeX | Tags: camera smart phones, image processing, ITACA, J2ME, Symbian2010
@article{almenarez001,
title = {Trust management for multimedia P2P applications in autonomic networking},
author = {Florina Almenárez and Andrés Marín and Daniel Díaz and Alberto Cortés and Celeste Campo and Carlos García-Rubio},
url = {https://doi.org/10.1016/j.adhoc.2010.09.005
https://www.sciencedirect.com/science/article/abs/pii/S1570870510001459?via%3Dihub
https://www.sciencedirect.com/science/article/pii/S1570870510001459/pdfft?md5=57c716d20dd2bb1db25f81c4cc063ebb&pid=1-s2.0-S1570870510001459-main.pdf},
doi = {https://doi.org/10.1016/j.adhoc.2010.09.005},
issn = {1570-8705},
year = {2010},
date = {2010-10-01},
urldate = {2010-10-01},
journal = {Ad Hoc Networks},
volume = {9},
issue = {4},
pages = {687-697},
abstract = {In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities’ behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.},
keywords = {anotacionsemantica, Autonomic networking, ITACA, Multimedia P2P applications, Trust attacks, Trust management},
pubstate = {published},
tppubtype = {article}
}
2009
@article{marin001,
title = {Pervasive authentication and authorization infrastructures for mobile users},
author = {Jordi Forné and Francisca Hinarejos and Andrés Marín and Florina Almenárez and Javier Lopez and Jose A. Montenegro and Marc Lacoste and Daniel Díaz},
url = {https://www.sciencedirect.com/science/article/pii/S0167404809000911?via%3Dihub},
doi = {https://doi.org/10.1016/j.cose.2009.09.001},
issn = {0167-4048},
year = {2009},
date = {2009-09-25},
urldate = {2009-09-25},
journal = {COMPUTERS & SECURITY},
volume = {29},
issue = {4},
pages = {501-514},
abstract = {Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities.},
keywords = {authentication, Authorization, ITACA, security architecture, trust, Ubiquitous computing, Ubisec},
pubstate = {published},
tppubtype = {article}
}
@conference{campo0028,
title = {Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones},
author = {Celeste Campo-Vázquez and Carlos García-Rubio and Alberto Cortés },
doi = {https://doi.org/10.1007/978-3-540-85867-6_6},
isbn = {978-3-540-85866-9},
year = {2009},
date = {2009-03-10},
urldate = {2009-03-10},
booktitle = {Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008},
pages = {48-56},
publisher = {SPRINGER},
abstract = {Nowadays, many smart phones have a built-in camera that is often used as a conventional digital camera. With some image processing in the mobile phone, new applications can be offered to the user, such as augmented reality games or helper applications for visually impaired people. However, image processing applications may require high processor speed and massive dynamic memory, which are scarce resources in smart phones. Image processing algorithms usually consists of long loops iterating some operations. In this paper we evaluate the performance of smart phones executing these operations. We consider both native and J2ME applications. The results we present can help to decide what we can and we cannot do in a mobile phone, and to quantify the performance penalty when using J2ME.},
keywords = {camera smart phones, image processing, ITACA, J2ME, Symbian},
pubstate = {published},
tppubtype = {conference}
}
Publications
Trust management for multimedia P2P applications in autonomic networking Journal Article In: Ad Hoc Networks, vol. 9, iss. 4, pp. 687-697, 2010, ISSN: 1570-8705. Pervasive authentication and authorization infrastructures for mobile users Journal Article In: COMPUTERS & SECURITY, vol. 29, iss. 4, pp. 501-514, 2009, ISSN: 0167-4048. Performance Evaluation of J2ME and Symbian Applications in Smart Camera Phones Conference Symposium of Ubiquitous Computing and Ambient Intelligence UCAmI 2008, SPRINGER, 2009, ISBN: 978-3-540-85866-9.2010
2009