Publications dans lesquelles il/elle collabore avec Manuel Gil Perez (16)

2013

  1. RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms

    Journal of Network and Systems Management, Vol. 21, Núm. 1, pp. 128-167

2011

  1. An advanced certificate validation service and architecture based on XKMS

    Software - Practice and Experience, Vol. 41, Núm. 3, pp. 209-236

  2. Mobility in collaborative alert systems: Building trust through reputation

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2010

  1. Advanced policies for the administrative delegation in federated environments

    Proceedings - 3rd International Conference on Dependability, DEPEND 2010

  2. Distributed access control management in federated identity systems

    CEUR Workshop Proceedings

  3. Event-driven architecture based on patterns for detecting complex attacks

    International Journal of Critical Computer-Based Systems, Vol. 1, Núm. 4, pp. 283-309

  4. PKI-based trust management in inter-domain scenarios

    Computers and Security, Vol. 29, Núm. 2, pp. 278-290

2009

  1. Towards a policy-driven framework for managing service dependability

    Proceedings - 2009 2nd International Conference on Dependability, DEPEND 2009

2008

  1. A proposal for the definition of operational plans to provide dependability and security

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  2. ACVS: An advanced certificate validation service in service-oriented architectures

    Proceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008

  3. Design-time learning for operational planning improvement

    Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.

  4. Event-driven architecture for intrusion detection systems based on patterns

    Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.

  5. Secure overlay networks for federated service provision and management

    Computers and Electrical Engineering, Vol. 34, Núm. 3, pp. 173-191

2005

  1. Deploying secure cryptographic services in multi-domain IPv6 networks

    Proceedings - International Conference on Advanced Information Networking and Applications, AINA