UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 74
41.
  • Implementation and evaluati... Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures
    García-Rodríguez, Jesús; Torres Moreno, Rafael; Bernal Bernabe, Jorge ... Journal of information security and applications, November 2021, 2021-11-00, Letnik: 62
    Journal Article
    Recenzirano
    Odprti dostop

    Despite the latest efforts to foster the adoption of privacy-enhancing Attribute-Based Credential (p-ABC) systems in electronic services, those systems are not yet broadly adopted. The main reasons ...
Celotno besedilo

PDF
42.
  • Federated Network Intelligence Orchestration for scalable and automated FL-based anomaly detection in B5G Networks
    Saura, Pablo Fernandez; Bernabe Murcia, Jose Manuel; Zarca, Alejandro Molina ... 2023 IEEE Future Networks World Forum (FNWF), 2023-Nov.-13
    Conference Proceeding
    Odprti dostop

    Network Intelligence management in Beyond 5G networks embraces the exciting challenge of addressing scalability, dynamicity, interoperability, privacy, and security concerns. These are essential ...
Celotno besedilo
43.
Celotno besedilo
44.
  • QoS and Resource aware Security Orchestration System
    Bagaa, Miloud; Taleb, Tarik; Bernabe, Jorge Bernal ... GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020-Dec.
    Conference Proceeding
    Odprti dostop

    Network Function Virtualization (NFV) and Software Distributed Networking (SDN) technologies play a crucial role in enabling 5G system and beyond. A synergy between these both technologies has been ...
Celotno besedilo

PDF
45.
  • OLYMPUS: A distributed privacy-preserving identity management system
    Moreno, Rafael Torres; Rodriguez, Jesus Garcia; Lopez, Cristina Timon ... 2020 Global Internet of Things Summit (GIoTS), 2020-June
    Conference Proceeding
    Odprti dostop

    Despite the latest initiatives and research efforts to increase user privacy in digital scenarios, identity-related cybercrimes such as identity theft, wrong identity or user transactions ...
Celotno besedilo

PDF
46.
  • Semantic-aware multi-tenanc... Semantic-aware multi-tenancy authorization system for cloud architectures
    Bernal Bernabe, Jorge; Marin Perez, Juan M.; Alcaraz Calero, Jose M. ... Future generation computer systems, March 2014, 2014-03-00, Letnik: 32
    Journal Article
    Recenzirano

    Cloud computing is an emerging paradigm to offer on-demand IT services to customers. The access control to resources located in the cloud is one of the critical aspects to enable business to shift ...
Celotno besedilo
47.
  • Detection of semantic confl... Detection of semantic conflicts in ontology and rule-based information systems
    Alcaraz Calero, Jose M.; Marín Pérez, Juan M.; Bernal Bernabé, Jorge ... Data & knowledge engineering, 11/2010, Letnik: 69, Številka: 11
    Journal Article
    Recenzirano

    Nowadays, managers of information systems use ontologies and rules as a powerful tool to express the desired behaviour for the system. However, the use of rules may lead to conflicting situations ...
Celotno besedilo
48.
  • OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services
    Moreno, Rafael Torres; Bernabe, Jorge Bernal; Skarmeta, Antonio ... 2019 Global IoT Summit (GIoTS), 2019-June
    Conference Proceeding
    Odprti dostop

    The OLYMPUS EU project is addressing the challenges associated to the use of privacy-preserving identity management solutions by establishing an inter-operable European identity management framework, ...
Celotno besedilo

PDF
49.
  • Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges
    Enrique Mármol Campos; Pablo Fernández Saura; González-Vidal, Aurora ... arXiv (Cornell University), 08/2021
    Paper, Journal Article
    Odprti dostop

    The application of Machine Learning (ML) techniques to the well-known intrusion detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks through an effective and ...
Celotno besedilo
50.
  • A required security and privacy framework for smart objects
    Skarmeta, Antonio; Hernandez-Ramos, Jose L.; Bernal Bernabe, Jorge 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015), 12/2015
    Conference Proceeding

    The large scale deployment of the Internet of Things (IoT) increases the urgency to adequately address trust, security and privacy issues. We need to see the IoT as a collection of smart and ...
Celotno besedilo
3 4 5 6 7
zadetkov: 74

Nalaganje filtrov