@article {NNMSVRLS, title = {Relay Selection for Secure 5G Green Communications}, journal = {Telecommunication Systems }, volume = {59}, year = {2015}, month = {05/2015}, pages = {169-187}, publisher = {Springer US}, abstract = {

In this article, we present relay selection policies in applications with secrecy requirements which are of interest in the fifth generation (5G) of wireless networks. More specifically, we provide a classification of relays based on their distinct communication attributes, such as processing, multiple antennas, storage, channel estimation, density and security level. In addition, we discuss the level of efficiency exhibited by each relay class, regarding their impact in delay-critical applications and green communications applications, while aiming at a specific security level at the physical layer. Then, relay selection policies are proposed taking into consideration the goals set by each application. Numerical evaluation of the proposed policies in terms of the average secrecy rate, average delay and power reduction show improved performance compared to other state-of-the-art solutions.\ 

}, keywords = {5G relays, Delay-critical, Power-efficient communications, Relay selection, security}, issn = {1018-4864}, doi = {10.1007/s11235-014-9890-7}, url = {http://dx.doi.org/10.1007/s11235-014-9890-7}, author = {Nikolaos Nomikos and Ana Nieto and Prodromos Makris and Dimitrios N. Skoutas and Demosthenes Vouyioukas and Panagiotis Rizomiliotis and Javier Lopez and Charalambos Skianis} } @article {vivas2010, title = {A methodology for security assurance-driven system development}, journal = {Requirements Engineering}, volume = {16}, number = {1}, year = {2011}, month = {Mar 2011}, pages = {55-73}, publisher = {Springer}, abstract = {

In this work, we introduce an assurance methodology that integrates assurance case creation with system development. It has been developed in order to provide trust and privacy assurance to the evolving European project PICOS (Privacy and Identity Management for Community Services), an international research project focused on mobile communities and community-supporting services, with special emphasis on aspects such as privacy, trust, and identity management. The leading force behind the approach is the ambition to develop a methodology for building and maintaining security cases throughout the system development life cycle in a typical system engineering effort, when much of the information relevant for assurance is produced and feedback can be provided to system developers. The first results of the application of the methodology to the development of the PICOS platform are presented.

}, issn = {0947-3602}, doi = {10.1007/s00766-010-0114-8}, author = {Jose L. Vivas and Isaac Agudo and Javier Lopez} } @article {vivas2009, title = {A security framework for a workflow-based grid development platform.}, journal = {Computer Standards and Interfaces}, volume = {32}, number = {5-6}, year = {2010}, month = {Oct 2010}, pages = {230-245}, publisher = {Elsevier}, abstract = {

This paper describes the security framework that is to be developed for the generic grid platform created for the project GREDIA. This platform is composed of several components that need to be secured. The platform uses the OGSA standards, so that the security framework will follow GSI, the portion of Globus that implements security. Thus, we will show the security features that GSI already provides and we will outline which others need to be created or enhanced.

}, issn = {0920-5489}, doi = {http://dx.doi.org/10.1016/j.csi.2009.04.001}, author = {Jose L. Vivas and Carmen Fernandez-Gago and Andres Benjumea and Javier Lopez} } @article {Dix07, title = {Temporal Logics of Knowledge and their Applications in Security}, journal = {First Workshop in Information and Computer Security (ICS{\textquoteright}06)}, volume = {186}, year = {2007}, pages = {27-42}, publisher = {Elsevier}, address = {Timisoara, Romania}, abstract = {

\ Temporal logics of knowledge are useful for reasoning about situations where the knowledge of an agent or component is important, and where change in this knowledge may occur over time. Here we investigate the application of temporal logics of knowledge to the specification and verification of security protocols. We show how typical assumptions relating to authentication protocols can be specified. We consider verification methods for these logics, in particular, focusing on proofs using clausal resolution. Finally we present experiences from using a resolution based theorem prover applied to security protocols specified in temporal logics of knowledge.

}, keywords = {security, temporal resolution}, issn = {1571-0661}, doi = {"DOI: 10.1016/j.entcs.2006.11.043"}, author = {Clare Dixon and Carmen Fernandez-Gago and Michale Fisher and Wiebe van der Hoek} } @article {javierlopez2005c, title = {Specification and Design of Advanced Authentication and Authorization Services}, journal = {Computer Standards \& Interfaces}, volume = {27}, number = {5}, year = {2005}, month = {Jun 2005}, pages = {467-478}, publisher = {Elsevier}, abstract = {

A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical studies show that it is common at the business process level that customers and end users are able to express their security needs. Among the security needs of Internet applications, authentication and authorization services are outstanding and, sometimes, privacy becomes a parallel requirement. In this paper, we introduce a methodology for the specification of security requirements and use a case study to apply our solution. We further detail the resulting system after extending it with an Authentication and Authorization Infrastructure.

}, issn = {0920-5489}, doi = {10.1016/j.csi.2005.01.005}, author = {Javier Lopez and Jose A. Montenegro and Jose L. Vivas and Eiji Okamoto and Ed Dawson} } Error | Network, Information and Computer Security Lab.

Error

Error message

  • Warning: Cannot modify header information - headers already sent by (output started at /var/www/includes/common.inc:2820) in drupal_send_headers() (line 1501 of /var/www/includes/bootstrap.inc).
  • TypeError: Argument 1 passed to xmlsitemap_node_create_link() must be an instance of stdClass, boolean given, called in /var/www/sites/all/modules/xmlsitemap/xmlsitemap_node/xmlsitemap_node.module on line 28 in xmlsitemap_node_create_link() (line 194 of /var/www/sites/all/modules/xmlsitemap/xmlsitemap_node/xmlsitemap_node.module).
The website encountered an unexpected error. Please try again later.
by Dr. Radut