Gabriel Lopez Millan-rekin lankidetzan egindako argitalpenak (37)

2011

  1. Formal description of the SWIFT identity management framework

    Future Generation Computer Systems, Vol. 27, Núm. 8, pp. 1113-1123

  2. User-centric privacy management in future network infrastructure

    Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards (IGI Global), pp. 32-64

2010

  1. Advanced policies for the administrative delegation in federated environments

    Proceedings - 3rd International Conference on Dependability, DEPEND 2010

  2. Distributed access control management in federated identity systems

    CEUR Workshop Proceedings

  3. PKI-based trust management in inter-domain scenarios

    Computers and Security, Vol. 29, Núm. 2, pp. 278-290

  4. SWIFT: Advanced identity management

    2010 5th International ICST Conference on Communications and Networking in China, ChinaCom 2010

2009

  1. A SWIFT take on identity management

    Computer, Vol. 42, Núm. 5, pp. 58-65

  2. Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure

    Journal of Network and Computer Applications, Vol. 32, Núm. 4, pp. 808-823

  3. SWIFT: Servicios avanzados para la gestión de identidad

    Novática: Revista de la Asociación de Técnicos de Informática, Núm. 202, pp. 12-17

  4. Towards the homogeneous access and use of PKI solutions: Design and implementation of a WS-XKMS server

    Journal of Systems Architecture, Vol. 55, Núm. 4, pp. 289-297

  5. Trusted network access control in the eduroam federation

    NSS 2009 - Network and System Security

2008

  1. A proposal for extending the eduroam infrastructure with authorization mechanisms

    Computer Standards and Interfaces, Vol. 30, Núm. 6, pp. 418-423

  2. A proposal for the definition of operational plans to provide dependability and security

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  3. Levels of assurance and reauthentication in federated environments

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Managing the lifecycle of XACML delegation policies in federated environments

    IFIP International Federation for Information Processing

  5. Using microsoft office infopath to generate XACML policies

    Communications in Computer and Information Science

2007

  1. A network access control approach based on the AAA architecture and authorization attributes

    Journal of Network and Computer Applications, Vol. 30, Núm. 3, pp. 900-919

  2. A proposal for extending the eduroam infrastructure with authorization mechanisms

    Proceedings of the 5th International Workshop on Security in Information Systems - WOSIS 2007; In Conjunction with ICEIS 2007

  3. Bootstrapping a global SSO from network access control mechanisms

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Deploying authorisation mechanisms for federated services in eduroam (DAMe)

    Internet Research, Vol. 17, Núm. 5, pp. 479-494