- Access Control and Trust
- Social Sciences and Policies
- Organizational Management and Innovation
- Cryptography and Data Security
- Advertising and Communication Studies
- Employment, Labor, and Gender Studies
- Media and Digital Communication
- Service-Oriented Architecture and Web Services
- Opportunistic and Delay-Tolerant Networks
- Logic, Reasoning, and Knowledge
- Green IT and Sustainability
- Privacy, Security, and Data Protection
- Mobile Agent-Based Network Management
- Internet Traffic Analysis and Secure E-voting
- Media, Journalism, and Communication History
- Educational theories and practices
- Comparative International Legal Studies
- User Authentication and Security Systems
- Distributed and Parallel Computing Systems
- Peer-to-Peer Network Technologies
- Digital Rights Management and Security
- Advanced Data Storage Technologies
- Distributed systems and fault tolerance
- Spanish Literature and Culture Studies
- Administrative Law and Governance
Universidad de Málaga
2005-2024
Hospital Universitari de Girona Doctor Josep Trueta
2024
Universidad Autónoma de Chiriquí
2014
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, grid computing, company networks, above all eCommerce applications. Products concepts vary in architecture, security features, target group, usability containing different strengths weaknesses. In addition needs changed communication business processes. Security on Internet is no longer defined as only measures an...
A challenging task in security engineering concerns the specification and integration of with other requirements at top level engineering. Empirical studies show that it is common end users are able to express their needs business process level. Since many originate this level, natural try capture them within context models where feel most comfortable they conceptually belong. In paper, we develop these views, present an ongoing work intended create a UML-based process-driven framework for...
Green computing is a growing trend in computing, pursuing the goal of helping software developers to be more aware and produce energy-efficient software. This especially relevant for battery-powered mobile applications, where minimal energy consumption desired both mitigate greenhouse effect extend battery lifetime. In this paper, we analyze execution time cryptographic primitives Android devices. Our ultimate help application developers, those who are not experts security, choose most...
The combined use of authorization and authentication infrastructures has led to AAIs (authorization infrastructures). These new supply identification services a distributed environment There are many possibilities linkages get AAIs; one them is include the PMI (privilege management infrastructure) as infrastructure an that can be PKI (public key or kerberos. This symbiosis gives service applications servers. However, in physical environments where presence individual required, it necessary...
The extraordinary growth of the information society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well systems underpin them, become highly critical, since their disruption would lead to economical, material and, sometimes, human loss. As consequence, protection these critical infrastructures becoming major objective for governments and companies. In this paper, we give an overview main challenges open research...
In ubiquitous computing, the main security challenges arise from network heterogeneity and a dynamic population of nomadic users limited devices. For these environments, infrastructures based on traditional PKIs present number major drawbacks: scalability reconfigurability, static vision trust, high administrative costs. Besides, are not well adapted to authorisation, lack delegation capabilities. this paper, we an enhanced PKI for networks which solves issues by providing flexible...
In this manuscript, we present EventGeoScout, an innovative framework for collaborative geographic information management, tailored to meet the needs of dynamically changing landscape data integration and quality enhancement. EventGeoScout enables seamless fusion open from different sources provides users with tools refine improve quality. A distinctive feature our is its commitment platform-agnostic ensuring that processed datasets are accessible via standard Geographic Information System...
Abstract Introduction and objectives Left bundle branch area pacing (LBBAP), is a novel modality of physiologic that requires an adequate assessment the endocardium as well body-surface electrocardiographic signals for successful pacing-lead implantation. We aimed to assess if LBBAP criteria(1), specifically left ventricular septal (LVSP) (LBBP) criteria, can be satisfactory measured using resulting from different cardiac analyzers (PSAs) by comparing them ‘conventional’ obtained...
Green computing has become a growing trend in computing, pursuing the goal of helping software developers to pay more attention produce energy-effiency software. This is specially relevant for battery-powered mobile applications, where minimizing energy consumption required both mitigate greenhouse effect and extend battery lifetime. In this paper we analyze cryptographic primitives Android devices. Our ultimate help application developers, especially those who are not experts on security,...