Jorge
Bernal Bernabe
Profesores Titulares de Universidad
Jose María
Alcaraz Calero
Publications by the researcher in collaboration with Jose María Alcaraz Calero (20)
2024
-
Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach
2024 IEEE 10th International Conference on Network Softwarization, NetSoft 2024
2021
-
Adaptive Network Slicing in Multi-Tenant 5G IoT Networks
IEEE Access, Vol. 9, pp. 14048-14069
-
Advanced spatial network metrics for cognitive management of 5G networks
Soft Computing, Vol. 25, Núm. 1, pp. 215-232
2020
-
Enabling Roaming across Heterogeneous IoT Wireless Networks: LoRaWAN MEETS 5G
IEEE Access, Vol. 8, pp. 103164-103180
-
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks
IEEE Transactions on Network and Service Management, Vol. 17, Núm. 2, pp. 1068-1081
-
Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-Enabled IoT networks
IEEE Journal on Selected Areas in Communications, Vol. 38, Núm. 6, pp. 1262-1277
2019
-
Towards Automatic Deployment of Virtual Firewalls to Support Secure mMTC in 5G Networks
INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
-
Towards Automatic Deployment of Virtual Firewalls to Support Secure mMTC in 5G Networks
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS)
2018
-
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks
Security and Communication Networks, Vol. 2018
2014
-
Semantic-aware multi-tenancy authorization system for cloud architectures
Future Generation Computer Systems, Vol. 32, Núm. 1, pp. 154-167
-
Taxonomy of trust relationships in authorization domains for cloud computing
Journal of Supercomputing, Vol. 70, Núm. 3, pp. 1075-1099
2013
-
Analyzing the security of Windows 7 and Linux for cloud computing
Computers and Security, Vol. 34, pp. 113-122
-
Rule-driven architecture for managing information systems
Building Next-Generation Converged Networks: Theory and Practice (CRC Press), pp. 417-435
2012
-
Security policy specification
Network and Traffic Engineering in Emerging Distributed Computing Applications (IGI Global), pp. 66-93
-
Towards an architecture to bind the java and OWL languages
Journal of Research and Practice in Information Technology, Vol. 44, Núm. 1, pp. 17-41
2011
-
Semantic web-based management of routing configurations
Journal of Network and Systems Management, Vol. 19, Núm. 2, pp. 209-229
-
Semantic-based authorization architecture for Grid
Future Generation Computer Systems
-
Towards a semantic-aware collaborative working environment
Computing and Informatics, Vol. 30, Núm. 1, pp. 7-30
-
Towards an authorization system for cloud infrastructure providers
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography
2010
-
Detection of semantic conflicts in ontology and rule-based information systems
Data and Knowledge Engineering, Vol. 69, Núm. 11, pp. 1117-1137