Pérez-Díaz, Jaime; Almenares-Mendoza, Florina Authorisation models for IoT environments: A survey Journal Article In: www.elsevier.com/locate/iot, 2024, ISSN: 2542-6605. Abstract | Links | BibTeX | Tags: ABAC, compromise, DAC, I-Shaper, IoT, MAC, Models, Platforms, Qursa, RBAC, Security Seoane-Merida, Victor; García-Rubio, Carlos; Almenares-Mendoza, Florina; Campo-Vázquez, Celeste Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286. Abstract | Links | BibTeX | Tags: coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security Gutierrez-Portela, Fernando; Almenares-Mendoza, Florina; Calderon-Benavides, Liliana; Romero-Riaño, Efren Security perspective of wireless sensor networks = Prospectiva de seguridad de las redes de sensores inalámbricos Proceedings Article In: pp. 189-201, UIS-Ingeniería , 2021, ISSN: 1657-4583. Abstract | Links | BibTeX | Tags: inteligencia artificial, redes de sensores inalambricos, Security, tecnicas no supervisadas, tecnicas supervisadas, wsn Chica-Manjarrez, Sergio; Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenares-Mendoza, Florina On the Automation of Auditing in Power Grid Companies Proceedings Article In: Actas de congreso internacional, Citas Google 2, CORE C, pp. 331 - 340, 2020, ISBN: ISSN/ISBN) 978-1-4503-5988-7. Abstract | Links | BibTeX | Tags: auditing, containers, cynamon, inteligenciafuentesabiertas, privacy, scalability, Security Arias-Cabarcos, Patricia; Marín, Andrés; Palacios, Diego; Almenárez, Florina; Díaz-Sánchez, Daniel Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. Abstract | Links | BibTeX | Tags: cybersecurity, emadrid2, inrisco, password managers, Security, usability Marín-López, Andrés; Almenáres-Mendoza, Florina; Arias-Cabarcos, Patricia; Díaz-Sánchez, Daniel Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. Abstract | Links | BibTeX | Tags: Protocols, Security, usability Díaz-Sánchez, Daniel; Sherratt, Simon; Almenares, Florina; Arias, Patricia; López, Andrés Marín- Distributed access control and privacy for the internet of me Proceedings Article In: 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2016, ISSN: 2158-4001. Abstract | Links | BibTeX | Tags: information flow control, Security Arias-Cabarcos, Patricia; Almenárez, Florina; Trapero, Rubén; Díaz-Sánchez, Daniel; Marín, Andrés Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. Abstract | Links | BibTeX | Tags: blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security Almenares, Florina; Arias, Patricia; Marín-López, Andrés; Díaz-Sánchez, Daniel; Sánchez, Rosa How costly are secure transactions on handheld devices? Proceedings Article In: IEEE, 2013, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Ciphers, Security, security protocols Sánchez-Guerrero, Rosa; Almenárez, Florina; Díaz-Sánchez, Daniel; Arias, Patricia; Marín, Andrés A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. Abstract | Links | BibTeX | Tags: privacy, Protocols, Security Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Sánchez-Guerrero, Rosa; Marín-López, Andrés; Díaz-Sánchez, Daniel SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml Marín-López, Andrés; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Sanvido, Fabio Private cloud and media privacy in social networks Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2012, ISSN: 2166-6814. Abstract | Links | BibTeX | Tags: Cloud computing, privacy, Security Sanvido, F.; Díaz-Sánchez, D.; Sánchez-Guerrero, R.; Almenares, F.; Arias, P. Privacy enhanced cloud services home aggregator Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Cloud computing, emadrid, privacy, Protocols, Security Sánchez-Guerrero, Rosa; Arias-Cabarcos, Patricia; Almenares-Mendoza, Florina; Díaz-Sanchez, Daniel Trust-aware federated IdM in consumer cloud computing Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: Cloud computing, privacy, Security Bernabé-Sánchez, Iván; Díaz-Sánchez, Daniel; Muñoz-Organero, Mario Optimizing resources on gateways using OSGi Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: p2p network, raudo2, Security, software Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenares-Mendoza, Florina; López, Andrés Marín-; Arias-Cabarcos, Patricia; Proserpio, Davide An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Abstract | Links | BibTeX | Tags: authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX Sánchez-Guerrero, Rosa; Díaz-Sánchez, Daniel; Almenarez, Florina; Arias, Patricia; Proserpio, Davide; Marín, Andrés Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. Abstract | Links | BibTeX | Tags: authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX Sanvido, Fabio; Díaz-Sánchez, Daniel; Almenárez-Mendoza, Florina; Marín-López, Andrés A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Abstract | BibTeX | Tags: Cloud computing, future internet, identity management, raudo2, Security, trust Arias-Cabarcos, Patricia; Sánchez-Guerrero, Rosa; Almenárez-Mendoza, Florina; Díaz-Sánchez, Daniel Presence-aware personalized television Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. Abstract | Links | BibTeX | Tags: bluetooth, Security, tv broadcasting Diaz-Sanchez, Daniel; Sanvido, Fabio; Proserpio, Davide; Marin, Andres DLNA, DVB-CA and DVB-CPCM integration for commercial content management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 79-87, 2010, ISSN: 0098-3063. Abstract | Links | BibTeX | Tags: anotacionsemantica, Conditional Access System, Consumer electronics, content protection, copy management, home network, Security, Telematics, User-generated content Schaefer, Robbie; Mueller, Wolfgang; Marín-López, Andrés; Díaz-Sánchez, Daniel Device Independent User Interfaces for Smart Cards Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 9781595938190. Abstract | Links | BibTeX | Tags: abstract user interface, device independence, Security, smart cards Schaefer, Robbie; Mueller, Wolfgang; Marín-López, Andrés; Díaz-Sánchez, Daniel Using smart cards for secure and device independent user interfaces Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 978-1-59593-819-0. Abstract | Links | BibTeX | Tags: abstract user interface, device independence, MEDEA+ A306, Security, Smart Card Campo, Celeste; Almenárez, Florina; Díaz, Daniel; García-Rubio, Carlos; Marín-López, Andrés Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X. Abstract | Links | BibTeX | Tags: ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec2024
@article{almenarez018,
title = {Authorisation models for IoT environments: A survey},
author = {Jaime Pérez-Díaz and Florina Almenares-Mendoza},
url = {https://www.sciencedirect.com/science/article/pii/S2542660524003718?via%3Dihub#d1e3887},
doi = {https://doi.org/10.1016/j.iot.2024.101430},
issn = {2542-6605},
year = {2024},
date = {2024-11-23},
urldate = {2024-11-23},
journal = { www.elsevier.com/locate/iot},
abstract = {Authorization models are pivotal in the Internet of Things (IoT) ecosystem, ensuring secure management of data access and communication. These models function after authentication, determining the specific actions that a device is allowed to perform. This paper aims to provide a comprehensive and comparative analysis of authorization solutions within IoT contexts, based on the requirements identified from the existing literature. We critically assess the functionalities and capabilities of various authorization solutions, particularly those designed for IoT cloud platforms and distributed architectures. Our findings highlight the urgent need for further development of authorization models optimized for the unique demands of IoT environments. Consequently, we address both the persistent challenges and the gaps within this domain. As IoT continues to reshape the technological landscape, the refinement and adaptation of authorization models remain imperative ongoing pursuits.},
keywords = {ABAC, compromise, DAC, I-Shaper, IoT, MAC, Models, Platforms, Qursa, RBAC, Security},
pubstate = {published},
tppubtype = {article}
}
2021
@article{campos004,
title = {Performance evaluation of CoAP and MQTT with security support for IoT environments},
author = {Victor Seoane-Merida and Carlos García-Rubio and Florina Almenares-Mendoza and Celeste Campo-Vázquez},
url = {http://hdl.handle.net/10016/33795},
doi = {https://doi.org/10.1016/j.comnet.2021.108338},
issn = {1389-1286},
year = {2021},
date = {2021-10-04},
urldate = {2021-10-04},
journal = {COMPUTER NETWORKS},
volume = {197},
issue = {108338},
pages = {1-22},
abstract = {World is living an overwhelming explosion of smart devices: electronic gadgets, appliances, meters, cars, sensors, camera and even traffic lights, that are connected to the Internet to extend their capabilities, constituting what is known as Internet of Things (IoT). In these environments, the application layer is decisive for the quality of the connection, which has dependencies to the transport layer, mainly when secure communications are used. This paper analyses the performance offered by these two most popular protocols for the application layer: Constrained Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT). This analysis aims to examine the features and capabilities of the two protocols and to determine their feasibility to operate under constrained devices taking into account security support and diverse network conditions, unlike the previous works. Since IoT devices typically show battery constraints, the analysis is focused on bandwidth and CPU use, using realistic network scenarios, since this use translates to power consumption.},
keywords = {coap, cynamon, Internet of Things, magos, mqtt, Performance evaluation, Security},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{almenarez008,
title = {Security perspective of wireless sensor networks = Prospectiva de seguridad de las redes de sensores inalámbricos},
author = {Fernando Gutierrez-Portela and Florina Almenares-Mendoza and Liliana Calderon-Benavides and Efren Romero-Riaño},
url = {http://hdl.handle.net/10016/37285},
doi = {https://doi.org/10.18273/revuin.v20n3-2021014},
issn = {1657-4583},
year = {2021},
date = {2021-06-07},
urldate = {2021-06-07},
volume = {21},
issue = {3},
pages = {189-201},
publisher = {UIS-Ingeniería },
abstract = {En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizan los trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación. Desde el punto de vista metodológico, este análisis se muestra a través de la visualización y estudio de trabajos indexados en bases de datos como IEEE, ACM, Scopus y Springer, con un rango de 7 años como ventana de observación, desde 2013 hasta 2019. Se obtuvieron un total de 4.728 publicaciones, con un alto índice de colaboración entre China e India. La investigación planteó desarrollos, como avances en los principios de seguridad y mecanismos de defensa, que han llevado al diseño de contramedidas en la detección de intrusiones. Por último, los resultados muestran el interés de la comunidad científica y empresarial por el uso de la inteligencia artificial y el aprendizaje automático (ML) para optimizar las medidas de rendimiento.},
keywords = {inteligencia artificial, redes de sensores inalambricos, Security, tecnicas no supervisadas, tecnicas supervisadas, wsn},
pubstate = {published},
tppubtype = {inproceedings}
}
2020
@inproceedings{pa054,
title = {On the Automation of Auditing in Power Grid Companies},
author = {Sergio Chica-Manjarrez and Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenares-Mendoza},
doi = {10.3233/AISE200057},
isbn = {ISSN/ISBN) 978-1-4503-5988-7},
year = {2020},
date = {2020-07-23},
urldate = {2020-07-23},
booktitle = {Actas de congreso internacional, Citas Google 2, CORE C},
pages = {331 - 340},
abstract = {Auditing is a common task required to secure networks. This becomes of utter importance in power grid companies, the authorities of electricity supply. An increasing number of connected devices makes the use of semi automatic or fully automated auditing imperative. The inventory system has to incorporate the auditing results and subsequently integrate them in the security assessment of the company. The risk metrics incorporate the severity of exposures and facilitate the selection of vulnerabilities that have to be mitigated, according to the risk appetite of the company. This automatic approach has to address scale and privacy issues of large companies. In addition, connections from foreign domains that carry out the auditing involve additional risks that must be considered to effectively test the likelihood and depth of the found vulnerabilities.
In this paper we discuss the requirements of an automatic auditing system and present AUTOAUDITOR, a highly configurable module which allow companies to automatically perform pentesting in specific assets.},
keywords = {auditing, containers, cynamon, inteligenciafuentesabiertas, privacy, scalability, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper we discuss the requirements of an automatic auditing system and present AUTOAUDITOR, a highly configurable module which allow companies to automatically perform pentesting in specific assets.2016
@article{7579116,
title = {Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication},
author = {Patricia Arias-Cabarcos and Andrés Marín and Diego Palacios and Florina Almenárez and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7579116
https://doi.org/10.1109/MITP.2016.81
/download/ComparingPasswordManagementSoftware.pdf},
doi = {10.1109/MITP.2016.81},
issn = {1941-045X},
year = {2016},
date = {2016-09-01},
urldate = {2016-09-01},
journal = {IT Professional},
volume = {18},
issue = {5},
pages = {34-40},
abstract = {In today's corporate IT systems, employees routinely repeat an undeniable pattern: accessing a huge number of password-protected services. In this regard, although deploying a strong enterprise password policy can increase security against online breaches and data leaks, it also imposes a significant usability burden on users. To alleviate this problem, password managers (PMs) are considered user-friendly tools that automate password generation and login processes. But how secure and usable are these tools? The authors analyze the four most popular PMs with free versions from both security and usability perspectives. The comparison leads to recommendations on enterprise PM selection, as well as to the identification of new lines of research and development on usable authentication.},
keywords = {cybersecurity, emadrid2, inrisco, password managers, Security, usability},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa002,
title = {Wi-Fi Direct: Lessons learned},
author = {Andrés Marín-López and Florina Almenáres-Mendoza and Patricia Arias-Cabarcos and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/7528493
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7528493},
doi = {10.1109/MedHocNet.2016.7528493},
isbn = {978-1-5090-1984-7},
year = {2016},
date = {2016-08-04},
urldate = {2016-08-04},
booktitle = {2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Adhoc networking was initially designed for military application area. But adhoc networks have been found also appealing for autonomous computing. The adhoc mode of IEEE 802.11 (Independent Basic Service Set (IBSS) has not been successful due to several reasons. Within this article we explore and compare two alternatives for adhoc network formation in heterogeneous environments: Wi-Fi P2P also known as Wi-Fi Direct, and Wi-Fi Hotspot. The comparison shows that there are usability, security and performance reasons to favor Hotspot for application development.},
keywords = {Protocols, Security, usability},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa003,
title = {Distributed access control and privacy for the internet of me},
author = {Daniel Díaz-Sánchez and Simon Sherratt and Florina Almenares and Patricia Arias and Andrés Marín- López},
url = {https://ieeexplore.ieee.org/document/7430506},
doi = {10.1109/ICCE.2016.7430506},
issn = {2158-4001},
year = {2016},
date = {2016-03-14},
booktitle = {2016 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {IEEE},
abstract = {This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.},
keywords = {information flow control, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
2015
@article{ariascabarcos002,
title = {Blended Identity: Pervasive IdM for Continuous Authentication},
author = {Patricia Arias-Cabarcos and Florina Almenárez and Rubén Trapero and Daniel Díaz-Sánchez and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/7118079},
doi = {https://doi.org/10.1109/MSP.2015.62},
issn = {1540-7993},
year = {2015},
date = {2015-06-04},
urldate = {2015-06-04},
journal = {IEEE Xplore},
volume = {13},
issue = {3},
pages = {32-39},
abstract = {A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.},
keywords = {blended identity, emrisco, identity management, IdM, Pervasive computing, Protocols, risk assessment, Security},
pubstate = {published},
tppubtype = {article}
}
2013
@inproceedings{pa010,
title = {How costly are secure transactions on handheld devices?},
author = {Florina Almenares and Patricia Arias and Andrés Marín-López and Daniel Díaz-Sánchez and Rosa Sánchez},
url = {https://ieeexplore.ieee.org/document/6486865},
doi = {https://doi.org/10.1109/ICCE.2013.6486865},
issn = {2158-3994},
year = {2013},
date = {2013-03-08},
publisher = {IEEE},
abstract = {Handheld devices are more and more powerful allowing to do most things people do on a desktop. Nevertheless, mobile device security follows being an open issue. We have performed the first study of the security support between native and OpenSSL-based libraries, in terms of energy consumption and time, about secure communication performance.},
keywords = {Ciphers, Security, security protocols},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa020,
title = {A model for dimensioning a secure event-driven health care system},
author = {Rosa Sánchez-Guerrero and Florina Almenárez and Daniel Díaz-Sánchez and Patricia Arias and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6416152},
doi = {https://doi.org/10.1109/WMNC.2012.6416152},
isbn = {978-1-4673-2993-4},
year = {2013},
date = {2013-01-24},
urldate = {2013-01-24},
booktitle = {2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Privacy is close to the user information and thus, present in any ubiquitous computing scenario. In this sense, privacy in identity management is gaining more importance, since IdM systems deal with services that requires sharing attributes belonging to users' identity with different entities across security domains. However, the effective revocation consent -considered as a privacy rule in sensitive scenarios- has not been fully addressed. This article builds on the flexible event-based user consent-revocation mechanism defined in [4] for health care scenarios. In this article we analyze the network dimensioning to calculate the overhead of activating/deactivating attributes and privileges, as subscription and notification event messages exchanged. We consider two main simulation scenarios: a large hospital, and a small-medium hospital.},
keywords = {privacy, Protocols, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
@article{ariascabarcos004,
title = {SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices},
author = {Patricia Arias-Cabarcos and Florina Almenárez-Mendoza and Rosa Sánchez-Guerrero and Andrés Marín-López and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/6415016
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6415016},
doi = {https://doi.org/10.1109/TCE.2012.6415016},
issn = {0098-3063},
year = {2012},
date = {2012-11-01},
urldate = {2012-11-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {58},
issue = {4},
pages = {1425-1433},
abstract = {The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers. However, service continuity when moving across different terminals is still a major challenge. This paper proposes SuSSo, a novel middleware architecture that allows sessions initiated from one device to be seamlessly transferred to a second one, as might be desirable in the enjoyment of long running media.},
keywords = {Cloud computing, Computer architecture, context, middleware, Performance evaluation, personal multimedia devices, raudo2, Security, service continuity, sessionhandoff, xml},
pubstate = {published},
tppubtype = {article}
}
@inproceedings{pa011,
title = {Private cloud and media privacy in social networks},
author = {Andrés Marín-López and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Fabio Sanvido},
url = {https://ieeexplore.ieee.org/document/6336476},
doi = {https://doi.org/10.1109/ICCE-Berlin.2012.6336476},
issn = {2166-6814},
year = {2012},
date = {2012-10-22},
booktitle = {2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin)},
publisher = {IEEE},
abstract = {Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.},
keywords = {Cloud computing, privacy, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa014,
title = {Privacy enhanced cloud services home aggregator},
author = {F. Sanvido and D. Díaz-Sánchez and R. Sánchez-Guerrero and F. Almenares and P. Arias},
url = {https://ieeexplore.ieee.org/document/6162012},
doi = {https://doi.org/10.1109/ICCE.2012.6162012},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {During the past years we have assisted to the huge diffusion of Cloud based Services, but security and privacy are still an issue in the Cloud due to a problem of trust endemic in the Cloud paradigm; users who have subscribed some kind of Cloud service must fully trust their providers. In this paper we propose a new, yet simple way to guarantee privacy for end user's data and operations. We propose to use an application inside an STB as single point of concentration for user's Cloud services accounts. Thus, a higher degree of privacy could be achieved by splitting user's data and operations over multiple identities and even over multiple providers' networks. In this article we depict, as example, the case of on-line storage and synchronization service.},
keywords = {Cloud computing, emadrid, privacy, Protocols, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa015,
title = {Trust-aware federated IdM in consumer cloud computing},
author = {Rosa Sánchez-Guerrero and Patricia Arias-Cabarcos and Florina Almenares-Mendoza and Daniel Díaz-Sanchez},
url = {https://ieeexplore.ieee.org/document/6161734},
doi = {https://doi.org/10.1109/ICCE.2012.6161734},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Cloud computing paradigm has emerged as the natural evolution and integration of advances in several areas including distributed computing and consumer electronics. In this complex ecosystem, security and identity management challenges have arisen, given their dynamism and heterogeneity. As a direct consequence, dynamic federated identity management has arisen as an indispensable mechanism to enable the global scalability that is required for the successful implantation of Cloud technologies. With this requirement in mind, we present a trust-aware IdM architecture based on privacy and reputation extensions compliant with the SAMLv2 standard media.},
keywords = {Cloud computing, privacy, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa016,
title = {Optimizing resources on gateways using OSGi},
author = {Iván Bernabé-Sánchez and Daniel Díaz-Sánchez and Mario Muñoz-Organero},
url = {https://ieeexplore.ieee.org/document/6161957},
doi = {https://doi.org/10.1109/ICCE.2012.6161957},
issn = {2158-3994},
year = {2012},
date = {2012-03-01},
urldate = {2012-03-01},
booktitle = {2012 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {There are lots of devices and services inside a home which have to be managed. OSGi platforms alleviate this management by installing some services on a gateway located at home. A service provider might manage those services as part of a package of services. In general, OSGi platforms are connected to centralized repositories facilitating the maintenance by service providers. However, when various service providers work on a given gateway the number of services and components installed in it increases. This sometimes leads to inconsistencies as duplicate components that might cause performance problems or service interruptions. This paper presents a system for analyzing and automatically optimizing the components deployed on a OSGi home gateway.},
keywords = {p2p network, raudo2, Security, software},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
@inproceedings{pa034,
title = {An identity aware wimax personalization for pervasive computing services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenares-Mendoza and Andrés Marín- López and Patricia Arias-Cabarcos and Davide Proserpio },
url = {http://hdl.handle.net/10016/13098
https://e-archivo.uc3m.es/bitstreams/685697a7-32a6-45e9-b60c-913dad70d44e/download},
isbn = {978-84-694-9677-0},
year = {2011},
date = {2011-12-27},
urldate = {2011-12-27},
booktitle = {Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico.},
publisher = {UCAMI},
abstract = {Mobile Internet access is becoming more and more pervasive in the new 4G scenarios, where WiMAX is to play a crucial role. WiMax has advantages when considering both energy consumption and bandwidth, when compared with HSDPA and LTE. However, we have found some limitations in IEEE 802.16 security support, which may limit authentication and authorization mechanisms for ubiquitous service development. In this article we analyze weaknesses and vulnerabilities we have found in WiMAX security. WiMax, with the adequate identity management support, could be invaluable for developing new pervasive computing services. We propose the introduction of identity management in WiMAX, as a pervious step to the definition of identity aware WiMax personalization of pervasive computing services.},
keywords = {authentication, desarrollodespliegue, identity management, IEEE 802.16, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa022,
title = {Introducing identity management in WiMAX to enable secure and personalized services},
author = {Rosa Sánchez-Guerrero and Daniel Díaz-Sánchez and Florina Almenarez and Patricia Arias and Davide Proserpio and Andrés Marín},
url = {https://ieeexplore.ieee.org/document/6097228},
doi = {https://doi.org/10.1109/WMNC.2011.6097228},
isbn = {978-1-4577-1192-3},
year = {2011},
date = {2011-12-12},
urldate = {2011-12-12},
booktitle = {2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.},
keywords = {authentication, identity management, IEEE 802.16, netlab, personalization, Security, WiMAX},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa028,
title = {A Survey on Security in Future Internet and Cloud},
author = {Fabio Sanvido and Daniel Díaz-Sánchez and Florina Almenárez-Mendoza and Andrés Marín-López},
isbn = {978-1-61208-148-9},
year = {2011},
date = {2011-08-27},
urldate = {2011-08-27},
booktitle = {International Conference on Advances in Future Internet (UBICOMM 2011)},
abstract = {https://personales.upv.es/thinkmind/dl/conferences/afin/afin_2011/afin_2011_2_30_70129.pdf},
keywords = {Cloud computing, future internet, identity management, raudo2, Security, trust},
pubstate = {published},
tppubtype = {inproceedings}
}
@inproceedings{pa030,
title = {Presence-aware personalized television},
author = {Patricia Arias-Cabarcos and Rosa Sánchez-Guerrero and Florina Almenárez-Mendoza and Daniel Díaz-Sánchez},
url = {https://ieeexplore.ieee.org/document/5722854},
doi = {https://doi.org/10.1109/ICCE.2011.5722854},
issn = {2158-3994},
year = {2011},
date = {2011-03-03},
urldate = {2011-03-03},
booktitle = {2011 IEEE International Conference on Consumer Electronics (ICCE)},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Since the advent of the digital era, the traditional TV scenario has rapidly evolved towards an ecosystem comprised of a myriad of services, applications, channels, and contents. As a direct consequence, the amount of available information and configuration options targeted at today's end consumers have become unmanageable. Thus, personalization and usability emerge as indispensable elements to improve our content-overloaded digital homes. With these requirements in mind, we present a way to combine content adaptation paradigms together with presence detection in order to allow a seamless and personalized entertainment experience when watching TV.},
keywords = {bluetooth, Security, tv broadcasting},
pubstate = {published},
tppubtype = {inproceedings}
}
2010
@article{diazsanchez006,
title = {DLNA, DVB-CA and DVB-CPCM integration for commercial content management},
author = {Daniel Diaz-Sanchez and Fabio Sanvido and Davide Proserpio and Andres Marin},
url = {https://ieeexplore.ieee.org/document/5439129
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5439129},
doi = {https://doi.org/10.1109/TCE.2010.5439129},
issn = {0098-3063},
year = {2010},
date = {2010-02-01},
urldate = {2010-02-01},
journal = {IEEE TRANSACTIONS ON CONSUMER ELECTRONICS},
volume = {56},
issue = {1},
pages = {79-87},
abstract = {DLNA can be considered as a good candidate for sharing user-generated contents among household networked consumer electronics. However, commercial content sharing requires a high degree of device protection that DLNA does not provides. We propose a solution supporting acquisition and post acquisition content protection by the integration of DLNA with DVB Conditional Access and DVB Content Protection & Copy Management. This article shows the design and implementation of a solution to improve commercial content management over DLNA.},
keywords = {anotacionsemantica, Conditional Access System, Consumer electronics, content protection, copy management, home network, Security, Telematics, User-generated content},
pubstate = {published},
tppubtype = {article}
}
2007
@inproceedings{pa047,
title = {Device Independent User Interfaces for Smart Cards},
author = {Robbie Schaefer and Wolfgang Mueller and Andrés Marín-López and Daniel Díaz-Sánchez},
doi = {https://dl.acm.org/doi/10.1145/1378063.1378189},
isbn = {9781595938190},
year = {2007},
date = {2007-09-28},
urldate = {2007-09-28},
booktitle = {Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology},
pages = {743 - 750},
abstract = {Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In
this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support different interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.},
keywords = {abstract user interface, device independence, Security, smart cards},
pubstate = {published},
tppubtype = {inproceedings}
}
this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support different interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.@inproceedings{pa046,
title = {Using smart cards for secure and device independent user interfaces},
author = {Robbie Schaefer and Wolfgang Mueller and Andrés Marín-López and Daniel Díaz-Sánchez
},
url = {https://dl.acm.org/doi/10.1145/1378063.1378189},
doi = {https://doi.org/10.1145/1378063.1378189},
isbn = {978-1-59593-819-0},
year = {2007},
date = {2007-09-10},
urldate = {2007-09-10},
booktitle = {Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology},
pages = {743 - 750},
abstract = {Smart Cards are becoming a ubiquitous means for securing a wide range of interactive applications. However in many cases its use is limited for authentication purposes only. In this paper we extend the use of smart cards for carrying abstract user interface descriptions which can be rendered on different and potentially remote clients that in addition can support varying interaction modalities. This adds on the one hand to the security since a backend application cannot be used without the UI description, and on the other hand to the versatility of applications, since all devices with a respective renderer for certain modalities can be utilized.},
keywords = {abstract user interface, device independence, MEDEA+ A306, Security, Smart Card},
pubstate = {published},
tppubtype = {inproceedings}
}
2006
@article{campo001,
title = {Secure Service Discovery based on Trust Management for ad-hoc Networks},
author = {Celeste Campo and Florina Almenárez and Daniel Díaz and Carlos García-Rubio and Andrés Marín-López},
url = {https://www.jucs.org/jucs_12_3/secure_service_discovery_based.html
https://lib.jucs.org/article/28594/},
doi = {http://dx.doi.org/10.3217/jucs-012-03-0340},
issn = {0948-695X},
year = {2006},
date = {2006-03-28},
urldate = {2006-03-28},
journal = {Journal of Universal Computer Science},
volume = {12},
number = {3},
pages = {340-356},
abstract = {In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.},
keywords = {ad-hoc networks, everyware, iteaeasywireless, Security, service discovery protocol, trust, Ubisec},
pubstate = {published},
tppubtype = {article}
}
discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised
management, and dynamic network topology, among others. Legacy solutions fail in
addressing these requirements.
In this paper, we propose a service discovery protocol with security features, the Secure
Pervasive Discovery Protocol. SPDP is a fully distributed protocol in which services
offered by devices can be discovered by others, without a central server. It is based on an
anarchy trust model, which provides location of trusted services, as well as protection
of confidential information, secure communications, or access control.
Publications
Authorisation models for IoT environments: A survey Journal Article In: www.elsevier.com/locate/iot, 2024, ISSN: 2542-6605. Performance evaluation of CoAP and MQTT with security support for IoT environments Journal Article In: COMPUTER NETWORKS, vol. 197, iss. 108338, pp. 1-22, 2021, ISSN: 1389-1286. Security perspective of wireless sensor networks = Prospectiva de seguridad de las redes de sensores inalámbricos Proceedings Article In: pp. 189-201, UIS-Ingeniería , 2021, ISSN: 1657-4583. On the Automation of Auditing in Power Grid Companies Proceedings Article In: Actas de congreso internacional, Citas Google 2, CORE C, pp. 331 - 340, 2020, ISBN: ISSN/ISBN) 978-1-4503-5988-7. Comparing Password Management Software: Toward Usable and Secure Enterprise Authentication Journal Article In: IT Professional, vol. 18, iss. 5, pp. 34-40, 2016, ISSN: 1941-045X. Wi-Fi Direct: Lessons learned Proceedings Article In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Institute of Electrical and Electronics Engineers (IEEE), 2016, ISBN: 978-1-5090-1984-7. Distributed access control and privacy for the internet of me Proceedings Article In: 2016 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2016, ISSN: 2158-4001. Blended Identity: Pervasive IdM for Continuous Authentication Journal Article In: IEEE Xplore, vol. 13, iss. 3, pp. 32-39, 2015, ISSN: 1540-7993. How costly are secure transactions on handheld devices? Proceedings Article In: IEEE, 2013, ISSN: 2158-3994. A model for dimensioning a secure event-driven health care system Proceedings Article In: 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), Institute of Electrical and Electronics Engineers (IEEE), 2013, ISBN: 978-1-4673-2993-4. SuSSo: Seamless and Ubiquitous Single Sign-on for Cloud Service Continuity across devices Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 58, iss. 4, pp. 1425-1433, 2012, ISSN: 0098-3063. Private cloud and media privacy in social networks Proceedings Article In: 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), IEEE, 2012, ISSN: 2166-6814. Privacy enhanced cloud services home aggregator Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Trust-aware federated IdM in consumer cloud computing Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. Optimizing resources on gateways using OSGi Proceedings Article In: 2012 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2012, ISSN: 2158-3994. An identity aware wimax personalization for pervasive computing services Proceedings Article In: Proceedings of the 5th International Symposium of Ubiquitous Computing and Ambient Intelligence (UCAMI 2011), December 5-9th, 2011, Riviera Maya, Mexico., UCAMI, 2011, ISBN: 978-84-694-9677-0. Introducing identity management in WiMAX to enable secure and personalized services Proceedings Article In: 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISBN: 978-1-4577-1192-3. A Survey on Security in Future Internet and Cloud Proceedings Article In: International Conference on Advances in Future Internet (UBICOMM 2011), 2011, ISBN: 978-1-61208-148-9. Presence-aware personalized television Proceedings Article In: 2011 IEEE International Conference on Consumer Electronics (ICCE), Institute of Electrical and Electronics Engineers (IEEE), 2011, ISSN: 2158-3994. DLNA, DVB-CA and DVB-CPCM integration for commercial content management Journal Article In: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 56, iss. 1, pp. 79-87, 2010, ISSN: 0098-3063. Device Independent User Interfaces for Smart Cards Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 9781595938190. Using smart cards for secure and device independent user interfaces Proceedings Article In: Mobility '07: Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, pp. 743 - 750, 2007, ISBN: 978-1-59593-819-0. Secure Service Discovery based on Trust Management for ad-hoc Networks Journal Article In: Journal of Universal Computer Science, vol. 12, no. 3, pp. 340-356, 2006, ISSN: 0948-695X.2024
2021
2020
2016
2015
2013
2012
2011
2010
2007
2006