Now showing items 1-20 of 115

    • A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform 

      Liu, Yi; Sakamoto, Shinji; Matsuo, Keita; Ikeda, Makoto; Barolli, Leonard; Xhafa Xhafa, Fatos (Springer, 2016-07-01)
      Article
      Open Access
      The reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ...
    • A framework for the definition of metrics for actor-dependency models 

      Franch Gutiérrez, Javier; Grau Colom, Gemma; Quer, Carme (Institute of Electrical and Electronics Engineers (IEEE), 2004)
      Conference report
      Open Access
      The authors define actor-dependency models as a restricted class of goal-oriented models in which we focus on the actors and dependencies that exist in a system. An example of actor-dependency models are i* strategic ...
    • A low area probing detector for security IC's 

      Weiner, Michael; Manich Bou, Salvador; Sigl, Georg (2014)
      Conference report
      Restricted access - publisher's policy
      In this paper, a low cost, Low Area Probing Detector (LAPD) is presented. Probing or microprobing is an attack technique against integrated circuits implementing security functions, such as OTP tokens or smartcards. It ...
    • A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs 

      García Villegas, Eduard; Afaqui, Muhammad Shahwaiz; López Aguilera, M. Elena (2015-07-05)
      Article
      Open Access
      The proliferation of IEEE 802.11 networks has made them an easy and attractive target for malicious devices/adversaries which intend to misuse the available network. In this paper, we introduce a novel malicious entity ...
    • A pull-based Wireguard control plane 

      Barcia González, Alejandro (Universitat Politècnica de Catalunya, 2020-05-04)
      Master thesis
      Open Access
      This thesis is based on IP security, Internet Protocol (IP) was developed without security or mobility. Later with the time, IPsec was implemented, a secure IP protocol which is complicated, weighty and doesn?t include ...
    • A security framework for JXTA-overlay 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Conference report
      Open Access
      At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ...
    • A survey on the recent efforts of the Internet standardization body for securing inter-domain routing 

      Siddiqui, Muhammad Shuaib; Montero Banegas, Diego Teodoro; Serral Gracià, René; Masip Bruin, Xavier; Yannuzzi, Marcelo (2015-04-07)
      Article
      Open Access
      The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol in the Internet, thus it plays a crucial role in current communications. Unfortunately, it was conceived without any internal security mechanism, ...
    • Adding security and privacy to genomic information representation 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia; Naro, Daniel (2019)
      Article
      Open Access
      Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ...
    • Adding security and privacy to genomic information representation 

      Delgado Mercè, Jaime; Llorente Viejo, Silvia; Naro, Daniel (IOS Press, 2019)
      Conference lecture
      Open Access
      Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are ...
    • Adding X-security to Carrel: security for agent-based healthcare applications 

      Cabanillas Barbacil, David Conrado; Willmott, Steven; Cortés García, Claudio Ulises (2003-06)
      External research report
      Open Access
      The high growth of Multi-Agent Systems (MAS) in Open Networks with initiatives such as Agentcities1 requires development in many different areas such as scalable and secure agent platforms, location services, directory ...
    • Agenda para gente mayor en Android 

      Diaz Vazquez, Rafael (Universitat Politècnica de Catalunya, 2014-06-10)
      Master thesis (pre-Bologna period)
      Restricted access - confidentiality agreement
    • An Architecture for Programming Distributed Applications on Fog to Cloud Systems 

      Lordan Gomis, Francesc-Josep; Lezzi, Daniele; Ejarque, Jorge; Badia Sala, Rosa Maria (Springer, 2018-02-08)
      Conference lecture
      Open Access
      This paper presents a framework to develop and execute applications in distributed and highly dynamic computing systems composed of cloud resources and fog devices such as mobile phones, cloudlets, and micro-clouds. The ...
    • An efficient PHR service system supporting fuzzy keyword search and fine-grained access control 

      Xhafa Xhafa, Fatos; Wang, Jianfeng; Chen, Xiaofeng; Liu, Joseph K.; Li, Jin; Krause, Paul (Springer, 2014-09)
      Article
      Open Access
      Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers. As ...
    • An SDN-based architecture for security provisioning in Fog-to-Cloud (F2C) computing systems 

      Kahvazadeh, Sarang; Souza, Vitor Barbosa; Masip Bruin, Xavier; Marín Tordera, Eva; García Almiñana, Jordi; Diaz, Rodrigo (The Science and Information (SAI) Organization, 2017)
      Conference report
      Open Access
      The unstoppable adoption of cloud and fog computing is paving the way to developing innovative services, some requiring features not yet covered by either fog or cloud computing. Simultaneously, nowadays technology evolution ...
    • Aplicació web per a la monitorització de vulnerabilitats de productes software 

      González Garrido, Víctor (Universitat Politécnica de Catalunya, 2018-01-18)
      Bachelor thesis
      Open Access
      Eina de monitorització dels productes software d'una organització i notificacions d'aquests productes si presenten alguna vulnerabilitat. Aquest servei inclou una base de dades de vulnerabilitats actualitzada diàriament i ...
    • Aplicación de la tecnología de radio cognitiva en redes de área corporal 

      Nuevo Boo, Ruben (Universitat Politècnica de Catalunya, 2017-01-17)
      Bachelor thesis
      Open Access
      For the past few years, a number of new wireless technologies have emerged, allowing users to access the Internet and a myriad of services through mobile devices such as smartphones, tablets, wearables..., Among others, ...
    • Application of JXTA-overlay platform for secure robot control 

      Spaho, Evjola; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos; Arnedo Moreno, Joan; Kolici, Vladi (2010)
      Article
      Open Access
      In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform. We used secure primitives and functions of JXTA-Overlay for ...
    • Approaching the rights management interoperability problem using intelligent brokerage mechanisms 

      Serrão, Carlos; Rodríguez Luna, Eva; Delgado Mercè, Jaime (2011-02-15)
      Article
      Restricted access - publisher's policy
      The digital content industry is facing significant challenges. One of the most significant challenges is the Intellectual Property protection. This challenge has been addressed technologically by using Digital Rights ...
    • Artificial Intelligence for obstacles detection using IR camera images 

      Mercade Laborda, Sergi (Universitat Politècnica de Catalunya, 2019-06)
      Bachelor thesis
      Restricted access - author's decision
    • Backside polishing detector: a new protection against backside attacks 

      Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David (2015)
      Conference report
      Open Access
      Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this ...