Author image not provided
 Javier Lopez

 homepage
 jlmatlcc.uma.es

  Affiliation history
Bibliometrics: publication history
Average citations per article3.83
Citation Count533
Publication count139
Publication years1999-2016
Available for download11
Average downloads per article434.55
Downloads (cumulative)4,780
Downloads (12 Months)152
Downloads (6 Weeks)13
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


139 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 139
Result page: 1 2 3 4 5 6 7

Sort by:

1
July 2016 Journal of Network and Computer Applications: Volume 69 Issue C, July 2016
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 0

The ever-increasing complex, dynamic and distributed nature of current systems demands model-driven techniques that allow working with abstractions and self-adaptive software in order to cope with unforeseeable changes. [email protected] is a promising model-driven approach that supports the runtime adaptation of distributed, heterogeneous systems. Yet, frameworks that accommodate this paradigm have ...
Keywords: Model-driven Engineering, Reputation, Trust, Self-adaptation

2
January 2016 Journal of Network and Computer Applications: Volume 59 Issue C, January 2016
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 1

Interoperability of distributed systems in charge of monitoring and maintaining the different critical domains belonging to Smart Grid scenarios comprise the central topic of this paper. Transparency in control transactions under a secure and reliable architecture is the aim of the policy enforcement system proposed here. The approach is based ...
Keywords: Access control, Controllability, Policy enforcement, Smart Grid, Distributed control systems, Interoperability

3
November 2015 Computers and Security: Volume 55 Issue C, November 2015
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 1

We analyze the special requirements and constraints of critical control systems.We determine the requirements imposed to IDS solutions by critical environments.We establish satisficing techniques that help the IDS fulfill the requirements.We identify useful metrics to help quantify the suitability of the IDS for the CCS.This analysis is done inspired on ...
Keywords: Control systems, Requirements, Critical infrastructures, Satisficing techniques, Metrics

4
October 2015 Computers and Electrical Engineering: Volume 47 Issue C, October 2015
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0

We study IDPRS solutions for CIP, considering their components and constraints.We design a methodological framework for IDPRS solutions within critical scenarios.ICS need automated intelligent solutions for early detection and protection.Current IDPRS solutions for CIP lack automatic active reaction mechanisms.We give recommendations for adaptation or development of IDPRS solutions for CIP. ...
Keywords: Control systems, Countermeasures, Intrusion detection and response systems, Critical infrastructure protection

5
September 2015 Computer Communications: Volume 68 Issue C, September 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

We explain the motivation for using CPRM in UC.We extend the definition of CPRM.We define the requirements for a CPRM-based compliant tool.We implement the Security and QoS Tradeoff (SQT) tool.We test our approach with a use case based on WSN. The lack of abstraction in a growing semantic, virtual and ...
Keywords: Security, QoS, Tradeoff, Context

6
May 2015 Telecommunications Systems: Volume 59 Issue 1, May 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 2

In this article, we present relay selection policies in applications with secrecy requirements which are of interest in the fifth generation (5G) of wireless networks. More specifically, we provide a classification of relays based on their distinct communication attributes, such as processing, multiple antennas, storage, channel estimation, density and security ...
Keywords: 5G relays, Relay selection, Security, Delay-critical, Power-efficient communications

7 published by ACM
April 2015 ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 50,   Downloads (Overall): 224

Full text available: PDFPDF
The use of alternative foundations for constructing more secure and efficient cryptographic schemes is a topic worth exploring. In the case of proxy re-encryption, the vast majority of schemes are based on number theoretic problems such as the discrete logarithm. In this paper we present NTRUReEncrypt, a new bidirectional and ...
Keywords: lattice-based cryptography, ntru, proxy re-encryption

8 published by ACM
September 2014 Q2SWinet '14: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 39

Full text available: PDFPDF
Context-based Parametric Relationship Models (CPRM) define complex dependencies between different types of parameters. In particular, Security and QoS relationships, that may occur at different levels of abstraction, are easily iden- tified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, ...
Keywords: context, QoS, security, SQT, tradeoff, CPRM

9
September 2014 Computers and Security: Volume 45, September, 2014
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

This paper introduces a sealed bid and multi-currency auction using secure multiparty computation (SMC). Two Boolean functions, a comparison and multiplication function, have been designed as required to apply SMC. These functions are applied without revealing any information, not even to trusted third parties such as the auctioneer. A type ...
Keywords: Multi-currency auctions, Zero knowledge protocols, Sealed auctions, Certification proofs, Secure multiparty computation

10
June 2014 Computer Standards & Interfaces: Volume 36 Issue 4, June, 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

Trust is an essential feature of any system where entities have to collaborate. Trust can assist entities making decisions before establishing collaborations. It is desirable to simulate the behaviour of users as in social environments where they tend to trust users who have common interests or share some of their ...
Keywords: Trust model, Similarity networks

11
May 2014 ISPEC 2014: Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among these, the most devastating attack is to compromise or destroy the base station since all communications are addressed exclusively to it. Moreover, this feature can be exploited by a passive adversary to determine the location of this ...
Keywords: location privacy, node capture, traffic analysis, Wireless sensor networks

12
March 2014 Computer Standards & Interfaces: Volume 36 Issue 3, March, 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Wide-area situational awareness for critical infrastructure protection has become a topic of interest in recent years. As part of this interest, we propose in this paper a smart mechanism to: control real states of the observed infrastructure from anywhere and at any time, respond to emergency situations and assess the ...
Keywords: Industrial wireless sensor networks, Accuracy, Critical infrastructure protection, Situational awareness, The ISA100.11a standard

13
February 2014 Mobile Networks and Applications: Volume 19 Issue 1, February 2014
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Today, mobile platforms are multimedia devices that provide different types of traffic with the consequent particular performance demands and, besides, security concerns (e.g. privacy). However, Security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the Future Internet makes coexistence even more difficult, ...
Keywords: Dependencies, Relationships, Parameters, Security, QoS, Tradeoff

14
January 2014 Future Generation Computer Systems: Volume 30 Issue C, January 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Control from anywhere and at anytime is nowadays a matter of paramount importance in critical systems. This is the case of the Smart Grid and its domains which should be monitored through intelligent and dynamic mechanisms able to anticipate, detect and respond before disruptions arise within the system. Given this ...
Keywords: Cloud computing, Critical infrastructure protection, Wireless sensor networks, Smart Grid, Wide-area situational awareness

15
January 2014 Future Generation Computer Systems: Volume 30, January, 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Control from anywhere and at anytime is nowadays a matter of paramount importance in critical systems. This is the case of the Smart Grid and its domains which should be monitored through intelligent and dynamic mechanisms able to anticipate, detect and respond before disruptions arise within the system. Given this ...
Keywords: Wide-area situational awareness, Cloud computing, Critical infrastructure protection, Wireless sensor networks, Smart Grid

16
November 2013 Requirements Engineering: Volume 18 Issue 4, November 2013
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 3

Cloud applications entail the provision of a huge amount of heterogeneous, geographically distributed resources managed and shared by many different stakeholders who often do not know each other beforehand. This raises numerous security concerns that, if not addressed carefully, might hinder the adoption of this promising computational model. Appropriately dealing ...
Keywords: Architecture, Social cloud, Framework, Trust and reputation requirements

17
November 2013 Computers and Security: Volume 39, November, 2013
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 2

Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services. ...
Keywords: Continuous authentication, Wearable Wireless Devices, Zero-Interaction Authentication, Privacy, Proximity-based services

18
November 2013 Computers and Security: Volume 39, November, 2013
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate ...
Keywords: Network security, System information security, Covert channels, Intrusion detection, Information warfare

19
October 2013 Computers and Security: Volume 38, October, 2013
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 2

Any deliberate or unsuitable operational action in control tasks of critical infrastructures, such as energy generation, transmission and distribution systems that comprise sub-domains of a Smart Grid, could have a significant impact on the digital economy: without energy, the digital economy cannot live. In addition, the vast majority of these ...
Keywords: Digital economy, Energy control systems, Reputation, Security, Wireless sensor networks, Smart Grids

20
July 2013 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 57 Issue 10, July, 2013
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 39

In the Internet of Things, services can be provisioned using centralized architectures, where central entities acquire, process, and provide information. Alternatively, distributed architectures, where entities at the edge of the network exchange information and collaborate with each other in a dynamic way, can also be used. In order to understand ...
Keywords: Security, Distributed Architectures, Internet of Things



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us