64 results on '"Andrés Marín López"'
Search Results
52. A Refinement Calculus for the Synthesis of Verified Hardware Descriptions in VHDL.
- Author
-
Peter T. Breuer, Carlos Delgado Kloos, Andrés Marín López, Natividad Martínez Madrid, and Luis Sánchez Fernández 0001
- Published
- 1997
- Full Text
- View/download PDF
53. VHDL generation from a timed extension of the formal description technique LOTOS within the FORMAT project.
- Author
-
Carlos Delgado Kloos, Tomás Pedro de Miguel Moro, Tomás Robles Valladares, Guadalberto Rabay Filho, and Andrés Marín López
- Published
- 1993
- Full Text
- View/download PDF
54. Mass-Customizing Electronic Journals.
- Author
-
M. Carmen Fernández Panadero, Andrés Marín López, Carlos Delgado Kloos, Carlos García-Rubio, Vicente Luque Centeno, Luis Sánchez Fernández 0001, and Tony Hernández
- Published
- 1999
55. Security Information Sharing in Smart Grids: Persisting Security Audits to the Blockchain
- Author
-
Daniel Diaz-Sanchez, Sergio Chica-Manjarrez, Andrés Marín-López, Florina Almenares-Mendoza, David Arroyo, Comunidad de Madrid, and Ministerio de Ciencia e Innovación (España)
- Subjects
Blockchain ,Computer Networks and Communications ,Computer science ,Permissioned blockchain ,020209 energy ,lcsh:TK7800-8360 ,02 engineering and technology ,Audit ,Computer security ,computer.software_genre ,Digital evidence ,security auditing ,0202 electrical engineering, electronic engineering, information engineering ,Smart grid security ,Electrical and Electronic Engineering ,Adaptation (computer science) ,scalability ,Information exchange ,Telecomunicaciones ,business.industry ,lcsh:Electronics ,Scalability ,020206 networking & telecommunications ,Automation ,Security auditing ,permissioned blockchain ,Smart grid ,Work (electrical) ,Hardware and Architecture ,Control and Systems Engineering ,smart grid security ,Signal Processing ,Accountability ,business ,computer - Abstract
This article belongs to the Special Issue Advanced Cybersecurity Services Design With the transformation in smart grids, power grid companies are becoming increasingly dependent on data networks. Data networks are used to transport information and commands for optimizing power grid operations: Planning, generation, transportation, and distribution. Performing periodic security audits is one of the required tasks for securing networks, and we proposed in a previous work autoauditor, a system to achieve automatic auditing. It was designed according to the specific requirements of power grid companies, such as scaling with the huge number of heterogeneous equipment in power grid companies. Though pentesting and security audits are required for continuous monitoring, collaboration is of utmost importance to fight cyber threats. In this paper we work on the accountability of audit results and explore how the list of audit result records can be included in a blockchain, since blockchains are by design resistant to data modification. Moreover, blockchains endowed with smart contracts functionality boost the automation of both digital evidence gathering, audit, and controlled information exchange. To our knowledge, no such system exists. We perform throughput evaluation to assess the feasibility of the system and show that the system is viable for adaptation to the inventory systems of electrical companies. This work has been supported by National R&D Projects TEC2017-84197-C4-1-R, TIN2017-84844-C2-1-R, by the Comunidad de Madrid project CYNAMON P2018/TCS-4566 and co-financed by European Structural Funds (ESF and FEDER), and by the Consejo Superior de Investigaciones Científicas (CSIC) under the project LINKA20216 ("Advancing in cybersecurity technologies", i-LINK+ program).
- Published
- 2020
- Full Text
- View/download PDF
56. TLS/PKI Challenges and certificate pinning techniques for IoT and M2M secure communications
- Author
-
Florina Almenarez Mendoza, Andrés Marín-López, Patricia Arias Cabarcos, R. Simon Sherratt, Daniel Diaz-Sanchez, Comunidad de Madrid, and Ministerio de Economía y Competitividad (España)
- Subjects
Internet of things ,Software_OPERATINGSYSTEMS ,Machine to machine ,Computer science ,Transport layer security ,02 engineering and technology ,Computer security ,computer.software_genre ,DTLS ,Trusted third party ,0202 electrical engineering, electronic engineering, information engineering ,Public key infrastructure ,Electrical and Electronic Engineering ,Flexibility (engineering) ,Telecomunicaciones ,Authentication ,Transport Layer Security ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020207 software engineering ,Certificate ,The Internet ,Certificate pinning ,business ,computer ,Security parameter ,De facto standard - Abstract
Artículo de acceso abierto (OA). En la plataforma consta como OA, pero el fichero del artículo tiene, erróneamente, copyright de IEEE. Transport layer security (TLS) is becoming the de facto standard to provide end-to-end security in the current Internet. IoT and M2M scenarios are not an exception since TLS is also being adopted there. The ability of TLS for negotiating any security parameter, its flexibility and extensibility are responsible for its wide adoption but also for several attacks. Moreover, as it relies on public key infrastructure (PKI) for authentication, it is also affected by PKI problems. Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential problems that should be addressed. This work was supported in part by Project MAGOS under Grant TEC2017-84197-C4-1-R, in part by Project INRISCO under Grant TEC2014-54335-C4-2-R, and in part by the Comunidad de Madrid (Spain) through the Project CYNAMON cofinanced by European Structural Funds (ESF and FEDER) and the Alexander von Humboldt Post-Doctoral Program under Grant P2018/TCS-4566.
- Published
- 2019
57. Secure Service Discovery based on Trust Management for ad-hoc Networks.
- Author
-
Celeste Campo, Florina Almenárez, Daniel Díaz Sánchez, Carlos García-Rubio, and Andrés Marín López
- Published
- 2006
- Full Text
- View/download PDF
58. Proxy re-encryption schemes for IoT and crowd sensing
- Author
-
Andrés Marín López, Patricia Arias, Daniel Diaz-Sanchez, Florina Almenares, and R. Simon Sherratt
- Subjects
021110 strategic, defence & security studies ,Engineering ,business.industry ,0211 other engineering and technologies ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Proxy re-encryption ,Public-key cryptography ,Security association ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,business ,Internet of Things ,Proxy (statistics) ,computer ,Computer network - Abstract
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.
- Published
- 2016
59. Images of 'madness', 'mental illness' and 'depression' in the city of Seville
- Author
-
Andrés Marín López, Marcelino López, Francisco Javier Saavedra, Margarita Laviana, and Universidad de Sevilla. Departamento de Psicología Experimental
- Subjects
medicine.medical_specialty ,Sociology and Political Science ,Social Psychology ,Mental disorders ,Social representations ,Education ,representaciones sociales ,medicine ,Psychiatry ,Estigma ,actitudes ,Representaciones sociales ,trastornos mentales ,attitudes ,Mental illness ,medicine.disease ,Mental health ,mental disorders ,Actitudes ,Stigma ,Clinical Psychology ,Trastornos mentales ,stigma ,Attitudes ,social representations ,estigma ,Psychology ,Social psychology - Abstract
El artículo presenta los resultados del estudio “Salud mental: imágenes y realidades”, referido a las imágenes sociales asociadas a tres términos relativos a trastornos mentales: “locura”, “enfermedad mental” y “depresión”. A partir de un diseño internacional se entrevistaron en la ciudad de Sevilla 920 personas adultas, según un método de cuotas a partir de las principales variables sociodemográficas y mediante un Cuestionario Socio-antropológico, utilizado en un proyecto multinacional del Centro Colaborador de la OMS en Salud Mental de Lille (Francia). El cuestionario pide a las personas entrevistadas que relacionen determinadas afirmaciones sobre conductas, síntomas, causas y consecuencias a las tres categorías elegidas, explorando con ellos los aspectos cognitivos de las actitudes y representaciones mentales de la población. Los datos obtenidos fueron tratados con estadísticas descriptivas y posteriormente con la técnica de análisis multivariante de los Conglomerados Jerárquicos. En conjunto muestran la existencia de una diversidad de atribuciones que diferencian entre esas tres categorías, relacionando la “locura” con contenidos de violencia, extrañeza e incurabilidad, mezclando esos contenidos con una visión más medica en el caso de la “enfermedad mental” y diferenciando claramente la “depresión” Componentes similares a los encontrados en estudios internacionales y que plantean además cuestiones importantes sobre la dinámica social del estigma y su evolución, en función de la difusión de conocimientos profesionales, que deberá ser explorada en posteriores estudios. The article presents the results of the study “mental health: images and realities” referred to the social images associated with three terms relating to mental disorders: “madness”, “mental illness” and “depression”. They met in the city of Seville, from an international design, 920 adults according to a quota method based on the main demographic variables and using a Socio-anthropological questionnaire, used in a multinational project of the WHO Collaborating Center the Mental Health of Lille (France). The questionnaire asks respondents to relate certain assertions about behaviors, symptoms, causes, and consequences to the three chosen categories, exploring with them the cognitive aspects of attitudes and mental representations of the population. The data obtained were treated with descriptive statistics and later with the technique of multivariate analysis of hierarchical conglomerates. Together they show the existence of a diversity of assertions that differentiate between those three categories, relating the “madness” with contents of violence, strangeness and hopeless, mixing these contents with one more medical vision of “mental disease” and clearly differentiating the “depression”. Components that are similar to those found in international studies and that posed also important issues about the social dynamics of stigma and its evolution, based on the dissemination of professional knowledge, which must be explored in subsequent studies.
- Published
- 2017
- Full Text
- View/download PDF
60. FamTV : an architecture for presence-aware personalized television
- Author
-
Daniel Diaz-Sanchez, Rosa Sanchez Guerrero, Andrés Marín López, Florina Almenarez Mendoza, and Patricia Arias Cabarcos
- Subjects
Telecomunicaciones ,Digital TV ,Multimedia ,Computer science ,business.industry ,Content personalization ,Usability ,Content adaptation ,computer.software_genre ,Presence detection ,Identity management ,Personalization ,Entertainment ,Media Technology ,The Internet ,Digital television ,Electrical and Electronic Engineering ,Architecture ,business ,computer - Abstract
Since the advent of the digital era, the traditional TV scenario has rapidly evolved towards an ecosystem comprised of a myriad of services, applications, channels, and contents. As a direct consequence, the amount of available information and configuration options targeted at today's end consumers have become unmanageable. Thus, personalization and usability emerge as indispensable elements to improve our content-overloaded digital homes. With these requirements in mind, we present a way to combine content adaptation paradigms together with presence detection in order to allow a seamless and personalized entertainment experience when watching TV. This work has been partially supported by the Community of Madrid (CAM), Spain under the contract number S2009/TIC-1650. Publicado
- Published
- 2011
61. Enabling SAML for dynamic identity federation management
- Author
-
Andrés Marín-López, Florina Almenarez Mendoza, Daniel Diaz-Sanchez, and Patricia Arias Cabarcos
- Subjects
Telecomunicaciones ,Process management ,business.industry ,Computer science ,Computer security ,computer.software_genre ,Service provisioning ,Trust relationship ,Identity management ,SAML ,User experience design ,Identity provider ,Next-generation network ,Federated identity management ,Single sign-on ,business ,Federation ,computer - Abstract
Proceedings of: The Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009 Federation in identity management has emerged as a key concept for reducing complexity in the companies and offering an improved user experience when accessing services. In this sense, the process of trust establishment is fundamental to allow rapid and seamless interaction between different trust domains. However, the problem of establishing identity federations in dynamic and open environments that form part of Next Generation Networks (NGNs), where it is desirable to speed up the processes of service provisioning and deprovisioning, has not been fully addressed. This paper analyzes the underlying trust mechanisms of the existing frameworks for federated identity management and its suitability to be applied in the mentioned environments. This analysis is mainly focused on the Single Sign On (SSO) profile. We propose a generic extension for the SAML standard in order to facilitate the creation of federation relationships in a dynamic way between prior unknown parties. Finally, we give some details of implementation and compatibility issues.
- Published
- 2009
62. Generating VHDL Code from LOTOS Descriptions
- Author
-
Tomás Robles Valladares, Carlos Delgado Kloos, Andrés Marín López, and Tomás de Miguel Moro
- Subjects
Finite-state machine ,Computer science ,Programming language ,Substitution (logic) ,computer.software_genre ,Translation (geometry) ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Test execution ,VHDL ,Test suite ,Code (cryptography) ,Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION ,computer ,Hardware_LOGICDESIGN ,computer.programming_language - Abstract
The aim of this chapter is to describe an automatic technique for obtaining synthesizable VHDL code from a T-LOTOS specification. Although the technique is automated, some guidance from the user is always welcome when a better code is required. There are in principle two ways to perform the translation: translation of the T-LOTOS operators into VHDL code or substitution of T-LOTOS processes by corresponding VHDL blocks from a pre-defined T-LOTOS & VHDL library. Both procedures can could be also combined together. In the present chapter only the first approach is developed.
- Published
- 1997
- Full Text
- View/download PDF
63. Synthesis Techniques
- Author
-
Wolf-Dieter Tiedemann, Stefan Lenk, Christian Grobe, Werner Grass, Carlos Delgado Kloos, Andrés Marín López, Tomás de Miguel Moro, and Tomás Robles Valladares
- Published
- 1997
- Full Text
- View/download PDF
64. Context awareness in network selection for dynamic environments
- Author
-
Carlos García-Rubio, Florina Almenarez Mendoza, Andrés Marín López, Daniel Díaz Sánchez, and Celeste Campo Vázquez
- Subjects
Ubiquitous computing ,Computer science ,business.industry ,Mechanism (biology) ,Distributed computing ,Context awareness ,Context (language use) ,Access control ,Multidimensional scaling ,Electrical and Electronic Engineering ,business ,Mobile device ,Domain (software engineering) - Abstract
Mobile devices of new generation are able to connect to multiple networks and to constitute new infrastructureless networks. These dynamic environments require new security paradigms and automatic mechanisms to minimize user intervention. Our goal is the definition of a new concept of distance that considers the current domain constraints and the user preferences. This paper addresses some of the problems of these complex environments by using Multidimensional Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic environment marking. Based on these ideas we have developed Pervasive Interaction Manager (PervsIM), a decision mechanism that selects the most appropriate network or peer to interact with. Besides we have defined an embedded access control module which ensures that PervsIM decisions are followed by all applications. Furthermore, several simulation results and implementation details outline how these results can be incorporated in today's mobile devices.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.