Search For:

Displaying 1-11 out of 11 total
Identity Management--In Privacy We Trust: Bridging the Trust Gap in eHealth Environments
Found in: IEEE Security & Privacy
By Gines Dolera Tormo,Felix Gomez Marmol,Joao Girao,Gregorio Martinez Perez
Issue Date:November 2013
pp. 34-41
Healthcare systems are moving to decentralized scenarios, forming a mesh of mobile services and care providers. A rapidly growing number of users aren't shy about using new services on their home computers, mobile phones, and laptops. Identity management s...
 
Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach
Found in: IEEE Internet Computing
By Felix Gomez Marmol,Manuel Gil Perez,Gregorio Martinez Perez
Issue Date:March 2014
pp. 32-40
Social network users can report other users' content as inappropriate by arguing that it encroaches on their privacy rights. Blindly accepting such reports as real evidence of something offensive poses substantial risks; malicious users might report harmle...
 
Towards Software Quality and User Satisfaction through User Interfaces
Found in: Software Testing, Verification, and Validation, 2008 International Conference on
By Pedro Luis Mateo Navarro, Gregorio Martínez Pérez, Diego Sevilla Ruiz
Issue Date:March 2011
pp. 415-418
With this PhD we expect to provide the community and the industry with a solid basis for the development, integration, and deployment of software testing tools. As a solid basis we mean, on one hand, a set of guidelines, recommendations, and clues to bette...
 
Building and Managing Policy-Based Secure Overlay Networks
Found in: Parallel, Distributed, and Network-Based Processing, Euromicro Conference on
By Gregorio Martinez Perez, Felix J. Garcia Clemente, Antonio F. Gomez Skarmeta
Issue Date:February 2008
pp. 597-603
Overlay networks represent a flexible approach for distributed services deployed across different administrative domains to group according to a given criteria without modification of the underlying network. Two key features for such overlays to be effecti...
 
Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Félix J. García Clemente, Gabriel López Millán, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
Issue Date:February 2005
pp. 10-13
Security is considered as a key service in IP networks. This is equally true for IPv4- and IPv6-based networks, and for them the IPsec protocol was defined to provide security at the network layer. IPsec can be used in different scenarios, being the VPN th...
 
Deployment of AAA Infrastructures in IPv6 Networks
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Rafael Marín López, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
Issue Date:February 2005
pp. 26-29
AAA infrastructures based on RADIUS protocol are being widely used in current IPv4 networks in order to control and manage end-users belonging to one administrative domain. In this way, these infrastructures will be a key component to control future IPv6 e...
 
PKI Services for IPv6
Found in: IEEE Internet Computing
By Antonio F. Gómez Skarmeta, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Gabriel López Millán
Issue Date:May 2003
pp. 36-42
<p>A recent European research project provides an ideal opportunity to migrate the Java-based UMU-PKI to IPv6 and build new security services over it.</p>
 
Message from eGSSN Workshop Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Jose M. Alcaraz Calero,Felix Gomez Marmol,Gregorio Martinez Perez
Issue Date:June 2012
pp. xli
No summary available.
   
Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks
Found in: Computer and Information Technology, International Conference on
By Félix Gómez Mármol, Javier G. Marín-Blázquez, Gregorio Martínez Pérez
Issue Date:July 2010
pp. 838-845
Trust is, in some cases, being considered as a requirement in highly distributed communication scenarios. Before accessing a particular service, a trust model is then being used in these scenarios to determine if the service provider can be trusted or not....
 
POSITIF: A Policy-Based Security Management System
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Cataldo Basile, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente, Antonio F. Gomez Skarmeta
Issue Date:June 2007
pp. 280
The POSITIF project [1] -- funded by the EU in FP6 -- has developed a framework and tools to configure in a policybased way the security services of networked systems and applications. This framework has been designed with the following set of interesting ...
   
Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
Issue Date:March 2005
pp. 785-789
There are several reasons to offer PKI (Public Key Infrastructure) services in IPv6 multi-domain scenarios. The first reason is to provide IPv6-only or dual-stack connectivity to those Internet users and entities who want to use certification services, but...
 
 1