Interconnection framework for mHealth and remote monitoring based on the internet of things

AJ Jara, MA Zamora-Izquierdo… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
Communication and information access defines the basis to reach a personalized health
end-to-end framework. Personalized health capability is limited to the available data from …

Knowledge acquisition and management architecture for mobile and personal health environments based on the internet of things

AJ Jara, MA Zamora… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
Personalized health capability is limited to the available data from the patient, which is
usually dynamic and incomplete. Therefore, it is presenting a critical issue for knowledge …

STORK: a real, heterogeneous, large-scale eID management system

C Ribeiro, H Leitold, S Esposito, D Mitzam - International Journal of …, 2018 - Springer
Verifying who someone is on the Internet is a prerequisite for online services that process
sensitive or valuable information. While this has been solved with national or sectorial …

Performance guarantee for cluster-based internet services

C Li, G Peng, K Gopalan… - … Conference on Parallel …, 2002 - ieeexplore.ieee.org
As Web-based transactions become an essential element of everyday corporate and
commerce activity, it becomes increasingly important for the performance of Web application …

Using identities to achieve enhanced privacy in future content delivery networks

P Martinez-Julia, AF Gomez-Skarmeta - Computers & Electrical …, 2012 - Elsevier
In this paper we show how to bring enhanced privacy to future content delivery network
architectures, with special attention to Content-Centric Networking (CCN). This objective is …

Deductive policies with XACML

M Lischka, Y Endo, M Sánchez Cuenca - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
SaaS technology might comprise of a bundle of different services provided by different
entities. Thus monolithic access policies are not feasible as each of the service partners and …

Security and privacy enablers for future identity management systems

M Barisch, ET Garcia, M Lischka… - 2010 Future Network …, 2010 - ieeexplore.ieee.org
In recent years, Identity Management (IdM) has gained a lot of attention in industry,
standardisation and academia. In particular, a couple of research projects, like Daidalos or …

Formal description of the SWIFT identity management framework

A Pérez, G López, Ó Cánovas… - Future Generation …, 2011 - Elsevier
This work presents both a formal description and a security analysis of the advanced SWIFT
identity framework, covering topics such as identity aggregation, cross-layer and …

[PDF][PDF] A Novel Identity-based Network Architecture for Next Generation Internet.

P Martinez-Julia, AF Gómez-Skarmeta - J. Univers. Comput. Sci., 2012 - Citeseer
In this paper we show a network architecture for Next Generation Internet (NGI) that prevents
operation traceability and protects the privacy of communication parties while raising their …

[图书][B] Smart phone based authentication and authorization protocol for SPACS

FK Bhutta, A Ghafoor, S Sultan - 2012 - ieeexplore.ieee.org
Nowadays smart-phone is becoming multi-purpose device because it has more processing
power at affordable cost. The usage of smart-phone is growing and being used for various …