- Access Control and Trust
- Network Security and Intrusion Detection
- Security and Verification in Computing
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Business Process Modeling and Analysis
- Semantic Web and Ontologies
- Advanced Malware Detection Techniques
- Flexible and Reconfigurable Manufacturing Systems
- Reliability and Maintenance Optimization
- Radiation Effects in Electronics
- Wireless Body Area Networks
- Safety Systems Engineering in Autonomy
- Collaboration in agile enterprises
- Network Time Synchronization Technologies
- Information and Cyber Security
- Advanced Photonic Communication Systems
- IPv6, Mobility, Handover, Networks, Security
- Privacy-Preserving Technologies in Data
- Spam and Phishing Detection
- Cryptography and Data Security
- IoT Networks and Protocols
Donostia International Physics Center
2023
Euskadiko Parke Teknologikoa
2013-2018
Ingeteam (Spain)
2014-2017
The main drivers for the mobile core network evolution is to serve future challenges and set way 5G networks with need high capacity low latency. Different technologies such as Network Functions Virtualization (NFV) Software Defined Networking (SDN) are being considered address needs of networks. However, applications Internet Things (IoT), video services others still unveiled will have different requirements, which emphasize dynamic scalability functionality. means efficient resource...
5G constitutes the next revolution in mobile communications. It is expected to deliver ultra-fast, ultra-reliable network access supporting a massive increase of data traffic and connected nodes. Different technologies are emerging address requirements future networks, such as Software Defined Networking (SDN), Network Function Virtualization (NFV) cloud computing concepts. In this paper, we introduce security challenges these new facing, inherent telecommunication paradigm. We also present...
Traffic volumes in mobile networks are rising and end-user needs rapidly changing. Mobile network operators need more flexibility, lower operating costs, faster service roll-out cycles, new revenue sources. The 5th Generation (5G) future aim to deliver ultra-fast ultra-reliable access capable of supporting the anticipated surge data traffic connected nodes years come. Several technologies have been developed meet these emergent demands networks, among software defined networking, function...
Abstract With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop intruders from obtaining private data. Despite efforts made by Cybersecurity experts, shortage skillful security teams and usage intelligent attacks slowed down enhancement defense mechanisms. Furthermore, pandemic in 2020 forced organizations work remote environments with poor security, leading increased cyberattacks. One possible solution for these problems is implementation Recommender Systems...
Collaborative networked organizations represent an important paradigm to help manufacturing companies cope with the challenges of market turbulence. However, although are increasingly aiming implement mobile collaboration models, there still some barriers that prevent manufacturers from effectively sharing big data leveraged in particular by use Internet Things technologies. These basically related lack security controls and lightweight management enablers would guarantee protection...
Upcoming smart scenarios enabled by the Internet of Things envision objects that expose services can adapt to user behavior or be managed with goal achieving higher productivity, often in multi-stakeholder applications. In such environments, things are cheap sensors (and actuators) and, therefore, constrained devices. However, they also critical components because importance provided information. Therefore, strong security is a must. Nevertheless, existing feasible approaches do not cope...
Software Defined Network (SDN) is an advanced approach to designing dynamic, manageable, cost-effective, and adaptable network architectures. SDN will play a key role as enabler for 5G future networks. Transferring monitoring functions software entity working in conjunction with configurable hardware accelerators through scheme called Monitoring (SDM) one promising way attain the dynamism necessary of next generation-networks. In this paper, we propose novel SDM architecture mobile backhual...
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will properly secured. At deployment time, the company provides security policy describing its requirements through set of properties. Once deployed, assured this is applied and enforced. But enforcing properties getting strong evidences complex task. To address issue, in [1], we have proposed language can used express both assurance distributed...
Linked Data offers easy extensibility and interoperability of information spaces. This provides a great potential for industrial companies allowing to share with partners in virtual enterprise. Hence, together they can become faster more flexible which results an advantage the market. However, there is still barrier protect own fine grain. Access control graphs are approach this issue. Information put into different views by executing infer mechanisms on role-based policy rules. Afterwards...
Current knowledge and assets that support organizations competitiveness must be protected. This protection is highly dependent on a proper access control management. Unfortunately, traditional management approaches are rigid isolated, constrained by proprietary requirements not easily interoperable. In this article, the ACIO framework presented described. It provides flexible, open, fluid collaborative middleware for building systems, based Sensing Enabled Access Control (SEAC) concept....
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision objects that provide services can adapt to user behavior or be managed achieve greater productivity. In such environments, things are inexpensive and, therefore, constrained devices. However, they also critical components because importance information provide. Given this, strong security is a requirement, but not all mechanisms in general and access control models particular feasible. this paper, we present...
In the incoming internet of things (IoT) applications, smart sensors expose services to interact with them, be parameterised, managed and maintained. Therefore, fine-grained end-to-end access control enforcement is mandatory tackle derived security requirements. However, it still not feasible in very constrained devices. There an innovative model that conveys expressive policy language optimised codification for tight flexible Such tightness enabled by expressiveness leads detailed instances...