Interconnection framework for mHealth and remote monitoring based on the internet of things
AJ Jara, MA Zamora-Izquierdo… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
Communication and information access defines the basis to reach a personalized health
end-to-end framework. Personalized health capability is limited to the available data from …
end-to-end framework. Personalized health capability is limited to the available data from …
Knowledge acquisition and management architecture for mobile and personal health environments based on the internet of things
Personalized health capability is limited to the available data from the patient, which is
usually dynamic and incomplete. Therefore, it is presenting a critical issue for knowledge …
usually dynamic and incomplete. Therefore, it is presenting a critical issue for knowledge …
STORK: a real, heterogeneous, large-scale eID management system
Verifying who someone is on the Internet is a prerequisite for online services that process
sensitive or valuable information. While this has been solved with national or sectorial …
sensitive or valuable information. While this has been solved with national or sectorial …
Performance guarantee for cluster-based internet services
C Li, G Peng, K Gopalan… - … Conference on Parallel …, 2002 - ieeexplore.ieee.org
As Web-based transactions become an essential element of everyday corporate and
commerce activity, it becomes increasingly important for the performance of Web application …
commerce activity, it becomes increasingly important for the performance of Web application …
Using identities to achieve enhanced privacy in future content delivery networks
P Martinez-Julia, AF Gomez-Skarmeta - Computers & Electrical …, 2012 - Elsevier
In this paper we show how to bring enhanced privacy to future content delivery network
architectures, with special attention to Content-Centric Networking (CCN). This objective is …
architectures, with special attention to Content-Centric Networking (CCN). This objective is …
Deductive policies with XACML
M Lischka, Y Endo, M Sánchez Cuenca - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
SaaS technology might comprise of a bundle of different services provided by different
entities. Thus monolithic access policies are not feasible as each of the service partners and …
entities. Thus monolithic access policies are not feasible as each of the service partners and …
Security and privacy enablers for future identity management systems
In recent years, Identity Management (IdM) has gained a lot of attention in industry,
standardisation and academia. In particular, a couple of research projects, like Daidalos or …
standardisation and academia. In particular, a couple of research projects, like Daidalos or …
Formal description of the SWIFT identity management framework
This work presents both a formal description and a security analysis of the advanced SWIFT
identity framework, covering topics such as identity aggregation, cross-layer and …
identity framework, covering topics such as identity aggregation, cross-layer and …
[PDF][PDF] A Novel Identity-based Network Architecture for Next Generation Internet.
P Martinez-Julia, AF Gómez-Skarmeta - J. Univers. Comput. Sci., 2012 - Citeseer
In this paper we show a network architecture for Next Generation Internet (NGI) that prevents
operation traceability and protects the privacy of communication parties while raising their …
operation traceability and protects the privacy of communication parties while raising their …
[图书][B] Smart phone based authentication and authorization protocol for SPACS
Nowadays smart-phone is becoming multi-purpose device because it has more processing
power at affordable cost. The usage of smart-phone is growing and being used for various …
power at affordable cost. The usage of smart-phone is growing and being used for various …