Graphic summary
  • Show / hide key
  • Information


Scientific and technological production
  •  

1 to 50 of 193 results
  • Trustworthy communications in Vehicular Ad Hoc NETworks

     Serna Olvera, Jetzabel Maritza; Morales Pacheco, Roberto Antonio; Medina Llinas, Manuel; Luna Garcia, Jesus
    IEEE World Forum on Internet of Things
    p. 247-252
    DOI: 10.1109/WF-IoT.2014.6803167
    Presentation's date: 2014-03-06
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Vehicular Ad-Hoc NETworks (VANETs), a pillar for the Internet of Vehicles, aim to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of safety and infotainment applications, there remain a number of security and privacy challenges, such as, user profiling and vehicle tracking, which, must be addressed. This paper contributes with a framework to address security and privacy issues in VANETs. The proposed framework consists of i) an inter-domain authentication system able to provide a near realtime certificate status service, ii) a mechanism to quantitatively evaluate the trust level of a CA and establish a on-the-fly interoperability relationship, and iii) a privacy enhancing model that addresses privacy in terms of linkability. © 2014 IEEE.

    Vehicular Ad-Hoc NETworks (VANETs), a pillar for the Internet of Vehicles, aim to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of safety and infotainment applications, there remain a number of security and privacy challenges, such as, user profiling and vehicle tracking, which, must be addressed. This paper contributes with a framework to address security and privacy issues in VANETs. The proposed framework consists of i) an inter-domain authentication system able to provide a near realtime certificate status service, ii) a mechanism to quantitatively evaluate the trust level of a CA and establish a on-the-fly interoperability relationship, and iii) a privacy enhancing model that addresses privacy in terms of linkability. © 2014 IEEE.

  • A Trust-driven Privacy Architecture for Vehicular Ad-Hoc Networks  Open access

     Serna Olvera, Jetzabel Maritza
    Department of Computer Architecture, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Las redes vehiculares ad-hoc por sus siglas en inglés (VANETs) son una tecnología emergente que tiene como objetivo mejorar la seguridad vial mediante la prevención y la reducción de accidentes de tráfico. Mientras las VANETs prometen una gran variedad de aplicaciones relacionadas con la seguridad, la información y el entretenimiento, presentan a su vez una serie de desafíos en seguridad y privacidad de la información, que deben ser cuidadosamente abordados.Un enfoque común para mitigar los desafíos de seguridad, el cual ha sido ampliamente adoptado en VANETs, es el uso de infraestructuras de clave pública (PKI) y certificados digitales. Este enfoque garantiza los servicios de autenticación, autorización y confidencialidad. Sin embargo, las soluciones para VANETs basadas en PKI suelen depender de un gran conjunto de autoridades de certificación (CA) regionales. Es decir, que a pesar de las ventajas que ofrece la PKI, su implementación conlleva dos principales problemas: i) la interoperabilidad segura entre las diferentes (por lo general desconocidas) CAs, y ii) que el uso exclusivo de PKI en un entorno VANET no puede prevenir los ataques de privacidad relacionados, tales como, la vinculación de un vehículo con un identificador, la monitorización automática de vehículos y de perfiles de usuario (escenario big brother). Además, dado que los vehículos en las VANETs serán capaces de almacenar grandes cantidades de información, incluida la información privada, el acceso no autorizado a dicha información también debe ser considerado. Esta tesis aborda los problemas de autenticación y la interoperabilidad en las comunicaciones vehiculares, considerando un escenario inter-regional donde se requiere autenticación mutua entre los diferentes nodos. Para proporcionar interoperabilidad entre los vehículos y servicios entre diferentes dominios, se propone un Sistema de Autenticación (AS) entre dominios.El AS provee a los vehículos con un conjunto de credenciales de autenticación. La validación se lleva a cabo mediante la implementación de un servicio que devuelve estado de un certificado (en casi en tiempo real). El AS también implementa un mecanismo para evaluar cuantitativamente el nivel de confianza de una CA, con el fin de decidir si la relación de interoperabilidad puede crearse.Este trabajo de investigación contribuye también con un Modelo de Mejora de Privacidad (PEM) para hacer frente a los problemas de privacidad antes mencionados. El PEM consta de dos protocolos de privacidad basados en PKI: i) un protocolo de Privacidad Basada en Atributos (ABP), y ii) un protocolo de Recuperación de Información de forma Anónima (AIR). El ABP introduce el concepto de Credenciales Basadas en Atributos (ABC) para proporcionar anonimicidad condicional y garantizar la mínima divulgación de información. En particular el PEM aborda los problemas relacionados con linkability (la vinculación de un vehículo con un identificador) y el escenario big brother. Por otro lado el protocolo AIR previene la generación automática de perfiles de usuario, garantizando la privacidad de las consultas de estos hacia los proveedores de servicios (SP). Este protocolo se basa en la colaboración de usuarios, básicamente falsificación y permutación de consultas. El protocolo AIR asume que ni los participantes ni los nodos SP son completamente confiables.

    Vehicular Ad-Hoc NETworks (VANETs) are an emerging technology which aims to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of promising applications, such as, safety-related and infotainment applications, they remain a number of security and privacy related research challenges that must be addressed. A common approach to security issues widely adopted in VANETs is the use of Public Key Infrastructures (PKI) and digital certificates in order to enable authentication, authorization and confidentiality. These approaches usually rely on a large set of regional Certification Authorities (CAs). Despite the advantages of PKI-based approaches, there are two main problems that arise, i) the secure interoperability among the different and usually unknown- issuing CAs, and ii) the sole use of PKI in a VANET environment cannot prevent privacy related attacks, such as, linking a vehicle with an identifier, tracking vehicles ¿big brother scenario" and user profiling. Additionally, since vehicles in VANETs will be able to store great amounts of information including private information, unauthorized access to such information should be carefully considered. This thesis addresses authentication and interoperability issues in vehicular communications, considering an inter-regional scenario where mutual authentication between nodes is needed. To provide interoperability between vehicles and services among different domains, an Inter-domain Authentication System (AS) is proposed. The AS supplies vehicles with a trusted set of authentication credentials by implementing a near real-time certificate status service. The proposed AS also implements a mechanism to quantitatively evaluate the trust level of a CA, in order to decide on-the-y if an interoperability relationship can be created. This research work also contributes with a Privacy Enhancing Model (PEM) to deal with important privacy issues in VANETs. The PEM consists of two PKI-based privacy protocols: i) the Attribute-Based Privacy (ABP) protocol, and ii) the Anonymous Information Retrieval (AIR) protocol. The ABP introduces Attribute-Based Credentials (ABC) to provide conditional anonymity and minimal information disclosure, which overcome with the privacy issues related to linkability (linking a vehicle with an identifier) and vehicle tracking (big brother scenario). The AIR protocol addresses user profiling when querying Service Providers (SPs), by relying in a user collaboration privacy protocol based on query forgery and permutation; and assuming that neither participant nodes nor SPs could be completely trusted. Finally, the Trust Validation Model (TVM) is proposed. The TVM supports decision making by evaluating entities trust based on context information, in order to provide i) access control to driver and vehicle's private information, and ii) public information trust validation.

  • Distributed detection of anomalous Internet sessions  Open access

     Garcia-cervigon Gutierrez, Manuel
    Department of Computer Architecture, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to browsers and banking sites. The use of highly dangerous malware has become the most significant threat and traditional signature-detection methods are nowadays easily circumvented due to the amount of new samples and the use of sophisticated evasion techniques. Antivirus vendors and malware experts are pushed to seek for new methodologies to improve the identification and understanding of malicious applications behavior and their targets. Financial institutions are now playing an important role by deploying their own detection tools against malware that specifically affect their customers. However, most detection approaches tend to base on sequence of bytes in order to create new signatures. This thesis approach is based on new sources of information: the web logs generated from each banking session, the normal browser execution and customers mobile phone behavior. The thesis can be divided in four parts: The first part involves the introduction of the thesis along with the presentation of the problems and the methodology used to perform the experimentation. The second part describes our contributions to the research, which are based in two areas: *Server side: Weblogs analysis. We first focus on the real time detection of anomalies through the analysis of web logs and the challenges introduced due to the amount of information generated daily. We propose different techniques to detect multiple threats by deploying per user and global models in a graph based environment that will allow increase performance of a set of highly related data. *Customer side: Browser analysis. We deal with the detection of malicious behaviors from the other side of a banking session: the browser. Malware samples must interact with the browser in order to retrieve or add information. Such relation interferes with the normal behavior of the browser. We propose to develop models capable of detecting unusual patterns of function calls in order to detect if a given sample is targeting an specific financial entity. In the third part, we propose to adapt our approaches to mobile phones and Critical Infrastructures environments. The latest online banking attack techniques circumvent protection schemes such password verification systems send via SMS. Man in the Mobile attacks are capable of compromising mobile devices and gaining access to SMS traffic. Once the Transaction Authentication Number is obtained, criminals are free to make fraudulent transfers. We propose to model the behavior of the applications related messaging services to automatically detect suspicious actions. Real time detection of unwanted SMS forwarding can improve the effectiveness of second channel authentication and build on detection techniques applied to browsers and Web servers. Finally, we describe possible adaptations of our techniques to another area outside the scope of online banking: critical infrastructures, an environment with similar features since the applications involved can also be profiled. Just as financial entities, critical infrastructures are experiencing an increase in the number of cyber attacks, but the sophistication of the malware samples utilized forces to new detection approaches. The aim of the last proposal is to demonstrate the validity of out approach in different scenarios. Conclusions. Finally, we conclude with a summary of our findings and the directions for future work.

  • Resource sharing in collaborative environments: performance considerations

     Morales Pacheco, Roberto Antonio; Candolfi, Norma; Serna Olvera, Jetzabel Maritza; Mejia, David A.; Villegas, José María; Nieto, Juan I; Medina Llinas, Manuel
    International Symposium on Distributed Computing and Artificial Intelligence
    p. 141-149
    DOI: 10.1007/978-3-642-19934-9_18
    Presentation's date: 2011-06
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • An Interoperability System for Authentication and Authorization in VANETs

     Casola, Valentina; Luna García, Jesús; Mazzeo, Antonino; Medina Llinas, Manuel; Rak, Massimiliano; Serna Olvera, Jetzabel Maritza
    International journal of atonomous and adaptive communications systems
    Vol. 3, num. 2, p. 115-135
    DOI: 10.1504/IJAACS.2010.031087
    Date of publication: 2010
    Journal article

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • SecureCloud 2010

     Medina Llinas, Manuel
    Date: 2010-03-16
    Report

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • PPP emergency and Terrorist incident Risk Assesment. P3TRA

     Medina Llinas, Manuel
    Competitive project

     Share

  • CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments

     Morales Pacheco, Roberto Antonio; Serna Olvera, Jetzabel Maritza; Medina Llinas, Manuel; Luna García, Jesús
    International Conference on Information Assurance and Security
    p. 234-239
    DOI: 10.1109/ISIAS.2010.5604070
    Presentation's date: 2010-08-25
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    The ever increasing diversity and mobility of devices have originated a marked rise in ubiquitous resources; a great number of collaborative applications could be exploited just by employing an efficient ubiquitous resource management mechanism. The CARM (Composable-Adaptive Resource Management) middleware-based architecture provides a flexible infrastructure where personal devices create seamlessly on demand interconnections links to share ubiquitous resources. In this article we address CARM's security challenges and to overcome these we propose the CARM Authorization (CARMA) module; in CARMA each user acts as an Attribute Authority (AA) responsible of issuing Attribute Certificates (ACs) and defining for each resource a set of policy-based authorization decisions; CARMA's Alerting System (AS) allows users to work in a collaborative mode by warning others of malicious nodes even when no infrastructure is available. This research mainly describes ongoing work towards a proof-of-concept implementation in the given scenarios. Our proposal enforces security considering the bandwidth efficiency and therefore enhancing the dynamic resource management experience in ubiquitous environments.

  • A policy-based authorization scheme for resource sharing in pervasive environments

     Morales Pacheco, Roberto Antonio; Serna Olvera, Jetzabel Maritza; Medina Llinas, Manuel
    Securing Electronic Business Processes
    p. 1-9
    DOI: 10.1007/978-3-8348-9788-6
    Presentation's date: 2010-12-01
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Redacciones Integradas

     Medina Llinas, Manuel
    Competitive project

     Share

  • Transport Hub Intelligent video System

     Medina Llinas, Manuel
    Competitive project

     Share

  • recerca anti frau financer

     Medina Llinas, Manuel
    Competitive project

     Share

  • The knowledge triangle

     Medina Llinas, Manuel
    The Fourth European Security Research Conference
    Presentation's date: 2009-09-29
    Presentation of work at congresses

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Coordination Improvement by Best Practices

     Medina Llinas, Manuel
    Competitive project

     Share

  • E-01050

     Medina Llinas, Manuel
    Competitive project

     Share

  • La xarxa Internet com a xarxa social

     Medina Llinas, Manuel
    Date of publication: 2009-12-01
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • Access to the full text
    8. Working Group: Identififi cation of People and Assets  Open access

     Medina Llinas, Manuel
    Date of publication: 2009-12-01
    Book chapter

    Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

  • Web sessions anomaly detection in dynamic environments

     Garcia-cervigon Gutierrez, Manuel; Vázquez Pongilupi, Juan; Medina Llinas, Manuel
    Securing Electronic Business Processes
    p. 216-220
    Presentation's date: 2009
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Risc a la xarxa

     Medina Llinas, Manuel
    Date of publication: 2008-11-01
    Book chapter

    View View Open in new window  Share Reference managers Reference managers Open in new window

  • A Dynamic Validation Infrastructure for Interoperable Grid Services  Open access

     LUNA GARCIA, JESUS
    Department of Computer Architecture, Universitat Politècnica de Catalunya
    Theses

    Read the abstract Read the abstract Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

    Los encargados de recursos Grid pueden autorizar el acceso a sus elementos de cómputo por medio de procedimientos bien establecidos para los clientes, regularmente a través del uso de credenciales criptográficas que en su mayoría tienen un tiempo de vida definido.A pesar que la adopción de Autoridades de Certificación -AC- ha parcialmente resuelto el problema de identificación y autenticación entre entidades y, la tecnología PKI (Infraestructuras de Clave Pública) es bastante madura, no es posible hacer los mismos supuestos cuando existen dominios que no confían entre si. En los últimos años han proliferado las Organizaciones Virtuales -VOs- dentro del Grid, cada una instalando su propia Autoridad de Certificación y dando lugar a un gran número de diferentes dominios de seguridad, que efectivamente no confían entre si. Esto da lugar a un complejo escenario de interoperabilidad en Grid, que requiere mecanismos capaces de determinar si una credencial cliente puede ser confiada en un momento dado. Este proceso (llamado "validacion") ha sido tradicionalmente tratado via Listas de Revocación de Certificados (CRLs). Sin embargo, esta solución es ineficiente tanto para la ACs como para las aplicaciones Grid. En consecuencia son requeridos mecanismos mas eficientes que permitan conocer el estado de un certificado en tiempo real. Entre estas soluciones, el Online Certificate Status Protocol (OCSP) sobresale para los Grids. A pesar de su importancia para la seguridad, OCSP conlleva considerables retos para el Grid y de momento es incapaz para garantizar un grado seguro de interoperabilidad entre las ACs que participan en dicho ambiente.De momento la comunidad Grid ha resuelto el problema de interoperabilidad mediante el uso de "Policy Management Authorities" (PMAs), las cuales representan "Federaciones de Grid-PKIs" cuyas ACs miembros cumplen con niveles mínimos de seguridad. Estos requisitos mínimos forman el llamado "Perfil de Autenticación de la PMA". Actualmente el cumplimiento con el perfil de una cierta PMA se lleva a cabo a través de un proceso bien definido, pero manual, que se realiza una sola ocasión cuando una AC desea ser parte de dicha PMA. Esto se denomina "Proceso de Acreditación".Cualquier cliente invocando una operación de un servicio Grid, activa un proceso de autenticación que valida su certificado digital de acuerdo a un proceso llamado "Path Validation".Cuando las ACs participantes interoperan gracias a acuerdos explícitos de confianza, solamente se require un "Path Validation Básico": verificación criptográfica y chequeo del estado del certificado. Software Grid como el Globus Toolkit, provee mecanismos estáticos para dicho proceso. Esto sin embargo resulta inapropiado para VOs actuales.Asi pues, a pesar de la importancia que un proceso automático y "Extendido" de "Path Validation" tendría para construir relaciones de confianza dinámicamente en Grid-PKIs, a la fecha no existe ningún mecanismo para hacerlo.Esta tesis presenta una arquitectura novedosa para llevar a cabo el proceso "Extendido de Path Validation" en ambientes Grid para ACs que pertenecen a la misma PMA, gracias al uso de una Infraestructura de Validación basada en el Grid-OCSP y, una metodología de evaluación de políticas que compara las Políticas de Certificación de las ACs involucradas para asegurarse que cumplen con un Perfil de Autenticación y, que por lo tanto pueden interoperar entre ellas. La metodología de evaluación de políticas está basada en una propuesta de investigación de la "Universidad de Nápoles, Federico II" y la "Segunda Universidad de Nápoles". Un prototipo de la Infraestructura de Validación ha sido desarrollado durante nuestra investigación, y es ampliamente explicado en esta tesis.

    Grid Resource owners can authorize access to their computing elements by means of well established Authentication and Authorization processes for End-entities, through the use of cryptographic credentials that in most of the cases have a defined lifetime. Nevertheless, despite the fact that the adoption of Certification Authorities -CAs- has partially solved the problem of identification and authentication between the involved parties, and that Public Key Infrastructure -PKI- technologies are mature enough, we cannot make the same assumptions when untrusted domains are involved. In the last years a lot of Grid Virtual Organizations -VOs- have been proliferating, each one usually installing its own Certificate Authority and thus giving birth to a large set of different and possibly untrusted security domains. This brings a quite complex Grid interoperability scenario requiring mechanisms able to determine whether a particular end-entity's credential can be trusted at a given moment. This process is commonly named validation and traditionally it is performed via Certificate Revocation Lists (CRL). However this solution tends to be cumbersome for both, the CA and the application. In consequence, more efficient mechanisms to allow for the provision of real time certificate status information are required. Among these solutions, the Online Certificate Status Protocol (OCSP) stands out in the Grid community. Despite its importance for security, OCSP not only faces considerable challenges in the computational Grid but also, in its current form, this protocol is unable to guarantee a secure degree of interoperability among all the involved Grid-Certification Authorities. At the state of the art, the Grid community is circumventing the interoperability problem with the "Policy Management Authorities (PMAs)", which represent "Federations of Grid PKIs" whose CA members accomplish minimum levels of security. These minimum requirements comprise the PMA's Authentication Profile. In the case of the existing Grid PMAs, compliance with their respective authentication profile is given through a well-defined, but manual process involving a careful analysis of the applicant PKI's Certification Policy -CP-, performed just once, when a new CA wishes to be part of an existing PMA. This is known as the PMA's accreditation process.Any end-entity invoking a Grid Service's operation from the server, activates an authentication process that validates the end-entity's digital certificate according to the traditional path validation procedure.When involved CAs interoperate thanks to explicit trust agreements, only basic path validation is required: cryptographic verifications and status' checks over the involved certificates. State of the art Grid software like the Globus Toolkit, provides static mechanisms for the basic path validation. This is a cumbersome process in nowadays Virtual Organizations.Therefore, despite the importance that an automated and extended path validation process has got in order to build dynamic trust relationships among Grid PKI's, to date there is no mechanism to automatically obtain this information.This thesis presents a novel architecture for enabling extended path validation in Grid environments for CAs that are part of the same PMA, thanks to the use of a Validation Infrastructure based on a Grid-enabled Online Certificate Status Protocol and, a policy evaluation methodology that compares the involved CAs' Certificate Policies to assert that they fulfil with a particular Authentication Profile and that they can therefore interoperate among them. The policy evaluation technique is based on a formal methodology originally proposed by researchers of the "Università di Napoli, Federico II" and the "Seconda Università di Napoli". A working prototype of the proposed Validation Infrastructure was also developed during our research, and is widely explained along this thesis.

  • Trust Management and Privacy for Vehicular Ad-Hoc Networks

     Serna Olvera, Jetzabel Maritza; Jesus, Luna; Medina Llinas, Manuel
    Date: 2008-06
    Report

     Share Reference managers Reference managers Open in new window

  • Trust management and privacy for vehicular ad-hoc networks

     Serna Olvera, Jetzabel Maritza; Luna García, Jesús; Medina Llinas, Manuel
    Jornadas de Paralelismo
    p. 680-685
    Presentation's date: 2008-09
    Presentation of work at congresses

    Read the abstract Read the abstract View View Open in new window  Share Reference managers Reference managers Open in new window

    Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Recently, security in VANETs has appealed special interest in the research community. In this paper we present the main concepts, issues and threats to VANET’s security and conclude that privacy of users is fundamental. In consequence a set of requirements for VANET’s privacy are established and studied, towards establishing a trustworthy architecture model capable of managing them. In articular our work demonstrates that there are still several challenges concerning privacy which solution is feasible to be extrapolated from highly-demanding environments like eHealth. Also in this paper we describe the basis of a privacy mechanism, compliant with the use of pseudonyms, that uses a new authorization paradigm based on access levels and user’s consent to overcome privacy and trust issues.

  • CENIT INTEGRA

     Medina Llinas, Manuel
    Competitive project

     Share

  • Identity Management inOpen Environments  Open access

     Medina Llinas, Manuel; Delgado, Estíbaliz; Fernández, Diego
    Information Sytems Security Europe 2008
    Presentation of work at congresses

    Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

  • Best practices in federated identity scenarios

     Medina Llinas, Manuel
    International Conference on Ehtics and Human Values in Engineering.
    Presentation's date: 2008-03-05
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • GIDRE: Grid-based Detection Intrusion and Response Environment

     Olguin, Olimpia; Medina Llinas, Manuel
    Information Sytems Security Europe 2008
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • GILDDA.

     Medina Llinas, Manuel
    Competitive project

     Share

  • Using OGRO to implement OCSP certificate validation in the Globus Toolkit 4

     Medina Llinas, Manuel
    22nd APAN Meeting on Grid Middleware
    Presentation's date: 2007-01-22
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Interoperable Grid PKIs among Untrusted Domains: An Architectural Proposal

     Valentina, Casola; Jesus, Luna; Oscar, Manso; Mazzocca, Nicola; Medina Llinas, Manuel; Massimilliano, Rak
    Grid and Pervasive Computing
    p. 1
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • La seguridad de la empresa es la de sus datos

     Medina Llinas, Manuel
    ISMS Forum: Seguridad de la información: una cuestión de Responsabilidad Social Corporativa
    Presentation's date: 2007-11-20
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • L'assignatura Seguretat en Xarxes de Computadors

     Medina Llinas, Manuel; Cruellas Ibarz, Juan Carlos
    Jornades de Docència del Departament d'Arquitectura de Computadors. 10 Anys de Jornades
    p. 1-10
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Interoperable Grid PKIs among Untrusted Domains: An Architectural Proposal

     Medina Llinas, Manuel
    Grid and Pervasive Computing
    Presentation's date: 2007-05-02
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Interoperable Grid PKIs among Untrusted Domains: An Architectural Proposal

     Manso Cortes, Oscar; Medina Llinas, Manuel
    Lecture notes in computer science (Online)
    Vol. 4459/2007, p. 39-51
    Date of publication: 2007-06
    Journal article

     Share Reference managers Reference managers Open in new window

  • Using OGRO and CertiVeR to improve OCSP validation for Grids

     Manso Cortes, Oscar; Medina Llinas, Manuel; Luna, J
    Journal of supercomputing
    Vol. 42, num. 3, p. 253-266
    Date of publication: 2007-12
    Journal article

     Share Reference managers Reference managers Open in new window

  • FIDELITY - Security protocols evaluation

     Serna, J; Colomer, M; Medina Llinas, Manuel
    Date: 2007-11
    Report

     Share Reference managers Reference managers Open in new window

  • Static evaluation of Certificate Policies for GRID PKIs interoperability

     Manso Cortes, Oscar; Medina Llinas, Manuel
    The Second International Conference on Availability, Reliability and Security
    p. 391-399
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Using OGRO and CertiVeR to improve OCSP validation for Grids

     Medina Llinas, Manuel; Manso Cortes, Oscar; Luna, J
    Date of publication: 2006-05
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Fidelity: Sistema de Gestión Federada de la Identidad Digital basado en Liberty Alliance

     Medina Llinas, Manuel; García, S
    Date of publication: 2006-06
    Book chapter

     Share Reference managers Reference managers Open in new window

  • Best Practices in Federated identity scenarios

     Medina Llinas, Manuel; Quinto, De F
    Date of publication: 2006-10
    Book chapter

     Share Reference managers Reference managers Open in new window

  • FIT-360503-2006-3 SEGURIDAD 2020. GESTIÓN DE LA IDENTIDAD DIGITAL EN LOS TERRITORIOS DIGITALES

     Hernando Pericas, Francisco Javier; Medina Llinas, Manuel
    Competitive project

     Share

  • OCSP for Grids: Comparing Prevalidation versus Caching

     Jesus, Luna; Oscar, Manso; Medina Llinas, Manuel
    ACM/IEEE International Conference on Grid Computing
    p. 202-209
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Best Practices in Federated Identity Management  Open access

     Medina Llinas, Manuel; de Quinto Zumárraga, Francisco
    eChallenges
    p. 107-114
    Presentation's date: 2006-10-11
    Presentation of work at congresses

    Access to the full text Access to the full text Open in new window  Share Reference managers Reference managers Open in new window

  • Fidelity: Sistema de Gestión Federada de la Identidad Digital basado en Liberty Alliance

     Medina Llinas, Manuel
    Internet Global Congress. 2006. Innovació i coneixement a la Societat Digital
    Presentation's date: 2006-05-29
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Best Practices in Federated identity scenarios

     Medina Llinas, Manuel
    The eChallenges e-2006 Conference
    Presentation's date: 2006-10-25
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Security aspects of the Fidelity

     Medina Llinas, Manuel; Colomer, M; Garcia, S; Poorter, A de
    Information Security Solutions Europe
    p. 1-10
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Fidelity: Sistema de Gestion Federada de la Identidad Digital basado en Liberty Alliance

     Sandra, Garcia; Antoine, de Poorter; Medina Llinas, Manuel
    Internet Global Congress. 2006. Innovació i coneixement a la Societat Digital
    p. 1
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Fidelity: Sistema de Gestión Federada de la Identidad Digital basado en Liberty Alliance

     Medina Llinas, Manuel
    II Congreso IberoAmericano sobre Computación Ubicua (CICU'06)
    Presentation's date: 2006-06-07
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Security aspects of the Fidelity project

     Medina Llinas, Manuel
    Information Security Solutions Europe
    Presentation's date: 2006-10-10
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • GIDRE: Entorno de detección y respuesta basado en Grid

     Olimpia, Olguin; Cervigon, Manuel Garcia; Galvan, Elena; Medina Llinas, Manuel
    Jornadas de Paralelismo
    p. 271-276
    Presentation of work at congresses

     Share Reference managers Reference managers Open in new window

  • Using OGRO and CertiVER to Improve OCSP Validation for Grids

     Luna, J; Medina Llinas, Manuel; Manso, O
    Lecture notes in computer science
    Vol. 3947/2006, num. 1, p. 12-21
    Date of publication: 2006-05
    Journal article

     Share Reference managers Reference managers Open in new window